How To Update Console Extentions
How To Update Console Extentions
Microsoft Endpoint Manager is an integrated solution for managing all of your devices. Microsoft brings
together Configuration Manager and Intune, without a complex migration, and with simplified licensing.
Continue to leverage your existing Configuration Manager investments, while taking advantage of the power of
the Microsoft cloud at your own pace.
The following Microsoft management solutions are all now part of the Microsoft Endpoint Manager brand:
Configuration Manager
Intune
Desktop Analytics
Autopilot
Other features in the Device Management Admin Console
For more information, see Microsoft Endpoint Configuration Manager FAQ.
Introduction
Use Configuration Manager to help you with the following systems management activities:
Increase IT productivity and efficiency by reducing manual tasks and letting you focus on high-value projects.
Maximize hardware and software investments.
Empower user productivity by providing the right software at the right time.
Configuration Manager helps you deliver more effective IT services by enabling:
Secure and scalable deployment of applications, software updates, and operating systems.
Real-time actions on managed devices.
Cloud-powered analytics and management for on-premises and internet-based devices.
Compliance settings management.
Comprehensive management of servers, desktops, and laptops.
Configuration Manager extends and works alongside many Microsoft technologies and solutions. For example,
Configuration Manager integrates with:
Microsoft Intune to co-manage a wide variety of mobile device platforms
Microsoft Azure to host cloud services to extend your management services
Windows Server Update Services (WSUS) to manage software updates
Certificate Services
Exchange Server and Exchange Online
Group Policy
DNS
Windows Automated Deployment Kit (Windows ADK) and the User State Migration Tool (USMT)
Windows Deployment Services (WDS)
Remote Desktop and Remote Assistance
Configuration Manager also uses:
Active Directory Domain Services and Azure Active Directory for security, service location, configuration, and
to discover the users and devices that you want to manage.
Microsoft SQL Server as a distributed change management database—and integrates with SQL Server
Reporting Services (SSRS) to produce reports to monitor and track management activities.
Site system roles that extend management functionality and use the web services of Internet Information
Services (IIS).
Delivery Optimization, Windows Low Extra Delay Background Transport (LEDBAT), Background Intelligent
Transfer Service (BITS), BranchCache, and other peer caching technologies to help manage content on your
networks and between devices.
To be successful with Configuration Manager in a production environment, thoroughly plan and test the
management features. Configuration Manager is a powerful management application, with the potential to
affect every computer in your organization. When you deploy and manage Configuration Manager with careful
planning and consideration of your business requirements, Configuration Manager can reduce your
administrative overhead and total cost of ownership.
User interfaces
The Configuration Manager console
After you install Configuration Manager, use the Configuration Manager console to configure sites and clients,
and to run and monitor management tasks. This console is the main point of administration, and lets you
manage multiple sites.
You can install the Configuration Manager console on additional computers, and restrict access and limit what
administrative users can see in the console by using Configuration Manager role-based administration.
For more information, see Use the Configuration Manager console.
Software Center
Software Center is an application that's installed when you install the Configuration Manager client on a
Windows device. Users use Software Center to request and install software that you deploy. Software Center lets
users do the following actions:
Browse for and install applications, software updates, and new OS versions
View their software request history
View device compliance against your organization's policies
You can also show custom tabs in Software Center to meet additional business requirements.
For more information, see the Software Center user guide.
Next steps
Before you install Configuration Manager, familiarize yourself with the basic concepts and terms:
If you're familiar with System Center 2012 Configuration Manager, see What's changed from System
Center 2012 Configuration Manager.
For a high-level technical overview of Configuration Manager, see Fundamentals of Configuration
Manager.
When you're familiar with the basic concepts, use this documentation library to help you successfully deploy
and use Configuration Manager. Start with the following articles:
Features and capabilities of Configuration Manager
Choose a device management solution
Evaluate Configuration Manager by building your own lab environment
Find help for using Configuration Manager
What happened to System Center Configuration
Manager?
2/16/2022 • 2 minutes to read • Edit Online
Starting in version 1910, Configuration Manager current branch is now part of Microsoft Endpoint Manager.
Version 1906 and earlier are still branded System Center Configuration Manager. The Microsoft Endpoint
Manager brand will appear in the product and documentation over the coming months.
There's no change to the other components of the System Center suite.
Prior product versions, such as System Center 2012 Configuration Manager, aren't rebranded.
For more information, see the following articles:
What is Configuration Manager?
Microsoft Endpoint Configuration Manager FAQ
Find help for using Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
Product feedback
From the Configuration Manager console, you can share feedback directly to the Microsoft product group. In the
upper right corner of the console, select the smiley face icon. There are three types of feedback:
Product documentation
To access the most current product documentation, start at the library index.
For tips on searching, providing feedback, and more information about using the product documentation, see
How to use the docs.
Next steps
Product feedback
Accessibility features
How to use the docs
How to use the console
Software Center user guide
How to get support in Microsoft Endpoint Manager admin center
Product feedback for Configuration Manager
2/16/2022 • 8 minutes to read • Edit Online
NOTE
This wizard is in the Configuration Manager console. Support Center has a similar feedback experience.
Starting in version 2107, error messages include a link to Repor t error to Microsoft . This action opens the
standard send a frown window to provide feedback. It automatically includes details about the user interface
and the error to better help Microsoft engineers diagnose the error. Aside from making it easier to send a frown,
it also includes the full context of the error message when you share a screenshot.
Starting in Configuration Manager 2111, when you Repor t error to Microsoft the error information included
with the feedback can't be altered or removed.
Starting in Configuration Manager 2111, wizards and some property pages include an icon to provide feedback
allowing you to quickly send feedback right from your current activity.
Prerequisites
Update the Configuration Manager console to the latest version.
On the computer where you run the console, allow it to access the following internet endpoints to send
diagnostic data to Microsoft:
petrol.office.microsoft.com
ceuswatcab01.blob.core.windows.net
ceuswatcab02.blob.core.windows.net
eaus2watcab01.blob.core.windows.net
eaus2watcab02.blob.core.windows.net
weus2watcab01.blob.core.windows.net
weus2watcab02.blob.core.windows.net
umwatsonc.events.data.microsoft.com
*-umwatsonc.events.data.microsoft.com
Send a smile
To send feedback on something that you like about Configuration Manager:
1. In the upper-right corner of the Configuration Manager console, select the feedback icon. Choose Send a
smile .
2. On the first page of the Provide feedback wizard:
Tell us what you liked : Enter a detailed description of why you're filing this feedback.
You can contact me about this feedback : To allow Microsoft to contact you about this
feedback if necessary, select this option and specify a valid email address.
Include screenshot : Select this option to add a screenshot. By default it uses the full screen,
select Refresh to capture the latest image. Select Browse to select a different image file.
3. Select Next to send the feedback. You may see a progress bar as it packages the content to send.
4. When the progress is complete, select Details to see the transaction ID or any errors that occurred.
Send a frown
Before you file a frown, prepare your information:
If you have multiple issues, send a separate report for each issue. Don't include multiple issues in a single
report.
Provide clear details on the issue. Share any research that you've gathered so far. More detailed
information is better to help Microsoft investigate and diagnose the issue.
Do you need immediate assistance? If so, contact Microsoft support for urgent issues. For more
information, see Support options and community resources.
Is this feedback a suggestion to improve the product? If so, share a new idea instead. For more
information, see Send a suggestion.
Is the issue with the product documentation? You can file feedback directly on the documentation. For
more information, see Doc feedback.
To send feedback on something that you didn't like about the Configuration Manager product:
1. In the upper-right corner of the Configuration Manager console, select the feedback icon. Choose Send a
frown .
2. On the first page of the Provide feedback wizard:
Issue categor y : Select a category that's most appropriate for your issue.
Describe your issue with as much detail as possible.
You can contact me about this feedback : To allow Microsoft to contact you about this
feedback if necessary, select this option and specify a valid email address.
Send a suggestion
When you Send a suggestion , it opens the Feedback for Configuration Manager site.
For more information, including the different status values, see How Microsoft uses feedback.
Status messages
When you Send a smile or Send a frown , it creates a status message when you submit the feedback. This
message provides a record of:
When you submitted the feedback
Who submitted it
The feedback ID
The message ID identifies if the feedback submission was successful:
53900 : Success
53901 : Failed
You can use the built-in status message query, Feedback sent to Microsoft to easily display these status
messages. You can also display status messages in the Monitoring workspace, under System Status in the
Status Message Queries node. Start with the All Status Messages query and select your time frame. When
the messages load, select Filter messages , and filter for message ID 53900 or 53901. If you create feedback
that you save for later submission, the site doesn't create a status message.
NOTE
For more information about the cd.latest folder, see the CD.Latest folder.
The UploadOfflineFeedback utility supports the use of a proxy server. You can specify the following parameters:
-x , --proxy : Specify the proxy server address.
-o , --port : Specify the port for the proxy server.
-u , --user : Specify the user name to authenticate to the proxy server.
-w , --password : Specify the password for the specified user name. If you use an asterisk ( * ), the tool
prompts for the password. The password isn't displayed in the prompt. This value is recommended. Including
the password in plain text on the command line is less secure.
-i , --SkipConnectionCheck : Skips the network connection check, and just starts to upload the feedback with
the specified settings.
If a cmdlet returns an error, use the following command to get exception details:
Next steps
How to use the docs
How to use the console
How to get support in Microsoft Endpoint Manager admin center
How to use the docs
2/16/2022 • 7 minutes to read • Edit Online
This article provides resources and tips for using the Microsoft Endpoint Manager documentation library. It
applies to Configuration Manager, Microsoft Intune, and Autopilot, and covers the following areas:
How to search
Submitting doc bugs, enhancements, questions, and new ideas
How to get notified of changes
How to contribute to docs
For general help and support, see:
Find help for Configuration Manager
Get support in Microsoft Endpoint Manager
TIP
Also visit the Documentation node in the Community workspace of the Configuration Manager console. This node
includes up-to-date information about Configuration Manager documentation and support articles. For more
information, see Using the Configuration Manager console.
Information in this article also applies to the Configuration Manager PowerShell documentation in the sccm-
docs-powershell-ref repository.
Search
Use the following search tips to help you find the information that you need:
When using your preferred search engine to locate content, include a keyword along with your search
keywords. For example, ConfigMgr for Configuration Manager and Intune for Intune.
Look for results from docs.microsoft.com/mem. Results from docs.microsoft.com/previous-versions ,
technet.microsoft.com , or msdn.microsoft.com are for older product versions.
To further focus the search results to the current content library, include site:docs.microsoft.com
in your query to scope the search engine.
Use search terms that match terminology in the user interface and online documentation. Avoid unofficial
terms or abbreviations that you might see in community content. For example, search for:
"management point" rather than "MP"
"deployment type" rather than "DT"
"Intune management extension" rather than "IME"
To search within the current article, use your browser's Find feature. With most modern web browsers,
press Ctrl +F and then enter your search terms.
Each article on docs.microsoft.com includes the following fields to assist with searching the content:
Search in the upper right corner. To search all articles, enter terms in this field. Articles in this
content library automatically include one of the following search scopes: ConfigMgr , Intune , or
Autopilot .
Filter by title above the left table of contents. To search the current table of contents, enter terms
in this field. This field only matches terms that appear in the article titles for the current node. For
example, Configuration Manager Core Infrastructure (
docs.microsoft.com/mem/configmgr/core ) or Intune Apps (
https://docs.microsoft.com/mem/intune/apps/ ). The last item in the search results gives you the
option to search for the terms in the entire content library.
Having problems finding something? File feedback! When you file an issue about search results, provide the
search engine you're using, the keywords you tried, and the target article. This feedback helps Microsoft
optimize the content for better search.
Add a custom search engine
With many modern web browsers, you can create a custom search engine. Use this feature to quickly and easily
search docs.microsoft.com . For example, with Microsoft Edge, version 77 and later, use the following process:
1. In Microsoft Edge, version 77 and later, open Settings .
2. In the left menu, select Privacy, search, and ser vices .
3. Scroll to the bottom of the Ser vices group and select Address bar and search .
4. Select Manage search engines .
5. Select Add and specify the following information:
Search engine : Enter a friendly name to identify it in the list of search engines. For example,
Microsoft docs .
Keyword : Specify a short term to use in the address bar to activate this search engine. For
example, memdocs .
URL with %s in place of quer y : For example,
https://docs.microsoft.com/en-us/search/index?search=%s&scope=ConfigMgr
NOTE
This example is specific to the ConfigMgr scope. You can remove the scope variable to search all
docs.microsoft.com or use a different scope.
The Microsoft Docs search engine requires a locale in the address. For example, en-us . You can change
your entry to use a different locale.
After you add this search engine, type your keyword in the browser address bar, press Tab , then type your
search terms, and press Enter . It will automatically search Microsoft Docs for your specified terms using the
defined scope.
About feedback
Select the Feedback link in the upper right of any article to go to the Feedback section at the bottom. Feedback
is integrated with GitHub Issues. For more information about this integration with GitHub Issues, see the docs
platform blog post.
To share docs feedback about the current article, select This page . A GitHub account is a prerequisite for
providing documentation feedback. Once you sign in, there's a one-time authorization for the MicrosoftDocs
organization. It then opens the GitHub new issue form. Add a descriptive title and detailed feedback in the body,
but don't modify the document details section. Then select Submit new issue to file a new issue for the target
article in the MEMDocs GitHub repository.
To see whether there's already feedback for this article, select View all page feedback . This action opens a
GitHub issue query for this article. By default it displays both open and closed issues. Review any existing
feedback before you submit a new issue. If you find a related issue, select the face icon to add a reaction, add a
comment to the thread, or Subscribe to receive notifications.
Types of feedback
Use GitHub Issues to submit the following types of feedback:
Doc bug: The content is out of date, unclear, confusing, or broken.
Doc enhancement: A suggestion to improve the article.
Doc question: You need help with finding existing documentation.
Doc idea: A suggestion for a new article.
Kudos: Positive feedback about a helpful or informative article!
Localization: Feedback about content translation.
Search engine optimization (SEO): Feedback about problems searching for content. Include the search
engine, keywords, and target article in the comments.
If you create an issue for something not related to docs, Microsoft will close the issue and redirect you to a
better feedback channel. For example:
Product feedback for Configuration Manager or Intune
Product questions
Support requests for Configuration Manager or Microsoft Endpoint Manager
To share feedback on the fundamental docs.microsoft.com platform, see Docs feedback. The platform includes
all of the wrapper components such as the header, table of contents, and right menu. Also how the articles
render in the browser, such as the font, alert boxes, and page anchors.
Notifications
To receive notifications when content changes in the documentation library, use the following steps:
1. Use the docs search to find an article or set of articles.
Search for a single article by title, for example: What's new in Microsoft Intune.
TIP
To refine the search to a single article, use the full title that displays in the docs.microsoft.com search
results. You can also use a string from the first paragraph, as shown in this example.
https://docs.microsoft.com/api/search/rss?
search=%22What%27s+new+in+microsoft+intune%22%2B%22learn+what%27s+new%22&locale=en-
us&facet=&%24filter=scopes%2Fany%28t%3A+t+eq+%27Intune%27%29
NOTE
The above RSS feed URL example includes the &locale=en-us variable. The locale variable is required,
but you can change it to another supported locale. For example, &locale=ja-jp .
NOTE
Use other keywords or the Docs search filters to further refine your search query.
2. At the bottom of the list of results, select the RSS link.
3. Use this feed in an RSS application to receive notifications when there's a change to any of the search
results. Refer to the RSS application's documentation on how to configure and tune it.
TIP
You can also Watch the MEMDocs repository on GitHub. This method can generate many notifications. It also doesn't
include changes from the private repository that Microsoft uses.
Contribute
The Microsoft Endpoint Manager documentation library, like most content on docs.microsoft.com, is open-
sourced on GitHub. This library accepts and encourages community contributions. For more information on
how to get started, see the Contributor Guide. The only prerequisite is to create a GitHub account.
Basic steps to contribute
1. From the target article, select Edit in the upper right corner. This action opens the source file in GitHub.
2. To edit the source file, select the pencil icon.
3. Make changes in the markdown source. For more information, see How to use Markdown for writing
Docs.
4. In the Propose file change section, enter the public commit comment describing what you changed. Then
select Propose file change .
5. Scroll down and verify the changes you made. Select Create pull request to open the form. Describe
why you made this change. Select Create pull request .
The writing team receives your pull request, and assigns it to the appropriate writer. The author reviews the text,
and does a quick edit pass on it. They'll either approve and merge the changes, or contact you for more
information about the update.
What to contribute
If you want to contribute, but don't know where to start, see the following suggestions:
Review an article for accuracy. Then update the ms.date metadata using mm/dd/yyyy format. This
contribution helps keep the content fresh.
Add clarifications, examples, or guidance based on your experience. This contribution uses the power of
the community to share knowledge.
NOTE
Large contributions require signing a Contribution License Agreement (CLA) if you aren't a Microsoft employee. GitHub
automatically requires you to sign this agreement when a contribution meets the threshold. You only need to sign this
agreement once.
Contribution tips
Follow these general guidelines when you contribute:
Don't surprise us with large pull requests. Instead, file an issue and start a discussion. Then we can agree
on a direction before you invest a large amount of time.
Read the Microsoft style guide. Know the Top 10 tips for Microsoft style and voice.
Follow the GitHub Flow workflow.
Blog and tweet (or whatever) about your contributions, frequently!
(This list was borrowed from the .NET contributing guide.)
Accessibility features in Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
NOTE
To improve the accessibility features of the Configuration Manager console, update .NET to version 4.7 or later on the
computer running the console.
For more information on the accessibility changes made in .NET 4.7.1 and 4.7.2, see What's new in accessibility in the .NET
Framework.
Keyboard shortcuts
Console workspaces
To access a workspace, use the following keyboard shortcuts:
K EY B O A RD SH O RTC UT W O RK SPA C E
Ctrl + 3 Monitoring
Ctrl + 4 Administration
Ctrl + T Set the focus to the top node in the navigation pane. If the
focus was already in that pane, the focus is set to the last
node you visited.
Ctrl + I Set the focus to the breadcrumb bar, below the ribbon.
CMPivot shortcuts
Most web browser keyboard shortcuts will work in CMPivot.
K EY B O A RD SH O RTC UT P URP O SE
Ctrl + W Scroll up
Ctrl + + Zoom in
Use the following keyboard shortcuts to quickly move focus to different areas of the window:
K EY B O A RD SH O RTC UT P URP O SE
Alt + B Back
Alt + H Home
Alt + T Filter
Next steps
For more information on the fundamentals of navigating Configuration Manager user interfaces, see the
following articles:
Using the Configuration Manager console
Software Center user guide
NOTE
The information in this article might apply only to users who license Microsoft products in the United States. If you
obtained this product outside of the United States, you can use the subsidiary information card that came with your
software package or visit the Microsoft Accessibility website for contact information for Microsoft support services. You
can contact your subsidiary to find out whether the type of products and services that are described in this section are
available in your area. Information about accessibility is available in other languages, including Japanese and French.
Software Center user guide
2/16/2022 • 8 minutes to read • Edit Online
To navigate the Start menu, look under the Microsoft Endpoint Manager group for the Software Center
icon.
NOTE
The above Start menu path is for versions from November 2019 (version 1910) or later. In earlier versions, the folder
name is Microsoft System Center .
If you can't find Software Center in the Start menu, contact your IT administrator.
Applications
Select the Applications tab (1) to find and install applications that your IT admin deploys to you or this
computer.
All (2): Shows all available applications that you can install.
Required (3): Your IT admin enforces these applications. If you uninstall one of these applications,
Software Center reinstalls it.
Filters (4): Your IT admin may create categories of applications. If available, select the drop-down list to
filter the view to only those applications in a specific category. Select All to show all applications.
Sor t by (5): Rearrange the list of applications. By default this list sorts by Most recent . Recently
available applications display with a New banner that's visible for seven days.
Search (6): Still can't find what you're looking for? Enter keywords in the Search box to find it!
Switch the view (7): Select the icons to switch the view between list view and tile view. By default the
applications list shows as graphic tiles.
Install an application
Select an application from the list to see more information about it. Select Install to install it. If an app is already
installed, you may have the option to Uninstall .
Some apps may require approval before they install.
When you try to install it, you can enter a comment and then Request the app.
Software Center shows the request history, and you can cancel the request.
When an administrator approves your request, you can install the app. If you wait, Software Center
automatically installs the app during your non-business hours.
Install multiple applications
Install more than one application at a time instead of waiting for one to finish before starting the next. The
selected apps need to qualify:
The app is visible to you
The app isn't already downloading or installed
Your IT admin doesn't require approval to install the app
To install more than one application at a time:
1. Select the multi-select icon in the upper right corner:
2. Select two or more apps to install. Select the checkbox to the left of each app in the list.
3. Select the Install Selected button to start.
The apps install as normal, only now in succession.
Share an application
To share a link to a specific app, after you select the app, select the Share icon in the upper right corner:
Copy the string, and paste elsewhere, such as an email message. For example,
softwarecenter:SoftwareID=ScopeId_73F3BB5E-5EDC-4928-87BD-4E75EB4BBC34/Application_b9e438aa-f5b5-432c-9b4f-
6ebeeb132a5a
. Anyone else in your organization with Software Center can use the link to open the same application.
Updates
Select the Updates tab (1) to view and install software updates that your IT admin deploys to this computer.
All (2): Shows all updates that you can install
Required (3): Your IT admin enforces these updates.
Sor t by (4): Rearrange the list of updates. By default this list sorts by Application name: A to Z .
Search (5): Still can't find what you're looking for? Enter keywords in the Search box to find it!
To install updates, select Install All (6).
To only install specific updates, select the icon to enter multi-select mode (7): Check the updates to install, and
then select Install Selected .
Operating Systems
Select the Operating Systems tab (1) to view and install versions of Windows that your IT admin deploys to
this computer.
All (2): Shows all Windows versions that you can install
Required (3): Your IT admin enforces these upgrades.
Sor t by (4): Rearrange the list of updates. By default this list sorts by Application name: A to Z .
Search (5): Still can't find what you're looking for? Enter keywords in the Search box to find it!
Installation status
Select the Installation status tab to view the status of applications. You may see the following states:
Installed : Software Center already installed this application on this computer.
Downloading : Software Center is downloading the software to install on this computer.
Failed : Software Center wasn't able to install the software.
Scheduled to install after : Shows the date and time of the device's next maintenance window to install
upcoming software. Maintenance windows are defined by your IT admin.
The status can be seen in the All and the Upcoming tab.
You can install before the maintenance window time by selecting the Install Now button.
Device compliance
Select the Device compliance tab to view the compliance status of this computer.
Select Check compliance to evaluate this device's settings against the security policies defined by your IT
admin.
Options
Select the Options tab to view additional settings for this computer.
Work information
Indicate the hours that you typically work. Your IT admin may schedule software installations outside your
business hours. Allow at least four hours each day for system maintenance tasks. Your IT admin can still install
critical applications and software updates during business hours.
Select the earliest and latest hours that you use this computer. By default these values are from 5:00 AM
through 10:00 PM .
Select the days of the week that you typically use this computer. By default Software Center only selects
the weekdays.
Specify whether you regularly use this computer to do your work. Your administrator might automatically install
applications or make additional applications available to primary computers. If the computer you're using is a
primary computer, select I regularly use this computer to do my work .
Power management
Your IT admin may set power management policies. These policies help your organization conserve electricity
when this computer isn't in use.
To make this computer exempt from these policies, select Do not apply power settings from my IT
depar tment to this computer . By default this setting is disabled and the computer applies power settings.
Computer maintenance
Specify how Software Center applies changes to software before the deadline.
Automatically install or uninstall required software and restar t the computer only outside of
the specified business hours : This setting is disabled by default.
Suspend Software Center activities when my computer is in presentation mode : This setting is
enabled by default.
When instructed by your IT admin, select Sync Policy . This computer checks with the servers for anything new,
such as applications, software updates, or operating systems.
Remote Control
Specify remote access and remote control settings for your computer.
Use remote access settings from your IT depar tment : By default, your IT department defines the settings
to remotely assist you. The other settings in this section show the state of the settings that your IT department
defines. To change any settings, first disable this option.
Level of remote access allowed
Do not allow remote access : IT administrators can't remotely access this computer to assist you.
View only : An IT administrator can only remotely view your screen.
Full : An IT administrator can remotely control this computer. This setting is the default option.
Allow remote control of this computer by administrators when I am away . This setting is Yes by
default.
When an administrator tries to control this computer remotely
Ask for permission each time : This setting is the default option.
Do not ask for permission
Show the following during remote control : These visual notifications are both enabled by default to
let you know that an administrator is remotely accessing the device.
Status icon in the notification area
A session connection bar on the desktop
Play sound : This audible notification lets you know that an administrator is remotely accessing the
device.
When session begins and ends : This setting is the default option.
Repeatedly during session
Never
Custom tabs
Your IT admin can remove the default tabs or add additional tabs to Software Center. Custom tabs are named by
your admin, and they open a web site that the admin specifies. For instance, you might have a tab called "Help
Desk" that opens your IT organization's help desk web site.
If you browse the Start menu, look for the Configuration Manager console icon in the Microsoft Endpoint
Manager group.
2. Type in the FQDN of the site server. If you've previously connected to site server, select the server from
the drop-down list.
3. Select Connect .
TIP
You can specify the minimum authentication level for administrators to access Configuration Manager sites. This feature
enforces administrators to sign in to Windows with the required level. For more information, see Plan for the SMS
Provider.
Navigation
Some areas of the console may not be visible depending on your assigned security role. For more information
about roles, see Fundamentals of role-based administration.
Workspaces
The Configuration Manager console has four workspaces :
Assets and Compliance
Software Librar y
Monitoring
Administration
Reorder workspace buttons by selecting the down arrow and choosing Navigation Pane Options . Select an
item to Move Up or Move Down . Select Reset to restore the default button order.
Minimize a workspace button by selecting Show Fewer Buttons . The last workspace in the list is minimized
first. Select a minimized button and choose Show More Buttons to restore the button to its original size.
Nodes
Workspaces are a collection of nodes . One example of a node is the Software Update Groups node in the
Software Librar y workspace.
Once you are in the node, you can select the arrow to minimize the navigation pane.
Use the navigation bar to move around the console when you minimize the navigation pane.
In the console, nodes are sometimes organized into folders. When you select the folder, it usually displays a
navigation index or a dashboard .
NOTE
You can use PowerShell to manage console folders with the following cmdlets:
Get-CMFolder
New-CMFolder
Remove-CMFolder
Set-CMFolder
Ribbon
The ribbon is at the top of the Configuration Manager console. The ribbon can have more than one tab and can
be minimized using the arrow on the right. The buttons on the ribbon change based on the node. Most of the
buttons in the ribbon are also available on context menus.
Details pane
You can get additional information about items by reviewing the details pane. The details pane can have one or
more tabs. The tabs vary depending on the node.
Columns
You can add, remove, reorder, and resize columns. These actions allow you to display the data you prefer.
Available columns vary depending on the node. To add or remove a column from your view, right-click on an
existing column heading and select an item. Reorder columns by dragging the column heading where you
would like it to be.
At the bottom of the column context menu, you can sort or group by a column. Additionally, you can sort by a
column by selecting its header.
Command-line options
The Configuration Manager console has the following command-line options:
O P T IO N DESC RIP T IO N
Next steps
Console notifications
Console tips
Accessibility features
Task sequence editor
Configuration Manager console notifications
2/16/2022 • 6 minutes to read • Edit Online
Environments with the following operating systems installed on client devices receive a notification:
Windows 7, Windows Server 2008 (non-Azure), and Windows Server 2008 R2 (non-Azure) without ESU.
Selecting More info takes you to the Management insights Security group to review the Update
clients running Windows 7 and Windows Ser ver 2008 rule.
Versions of Windows 10 Semi-Annual Channel that are past the end-of-support date for Enterprise and
Education and Home and Pro editions.
Selecting More info takes you to the Management insights Simplified Management group to
review the Update clients to a suppor ted Windows 10 version rule.
You can also view the Product Lifecycle Dashboard to see information about which operating systems are out of
support. This information (such as the support lifecycle for Windows 10 versions) is provided for your
convenience and only for use internally within your company. You should not solely rely on this information to
confirm update compliance. Be sure to verify the accuracy of the information provided to you.
Improvements starting in version 2006
You have an option to receive Messages from Microsoft
If you configure Azure services to cloud-attach your site, you'll see notifications with an action to renew the
secret key. The site evaluates the state of the following alerts once per hour:
One or more Azure AD app secret keys will expire soon
One or more Azure AD app secret keys have expired
IMPORTANT
When you use an imported Azure AD app, you aren't notified of an upcoming expiration date from console notifications.
NOTE
For push notifications from Microsoft to show in the console, the service connection point needs access to
configmgrbits.azureedge.net . It also needs access to this endpoint for updates and servicing, so you may have
already allowed it.
2. The notification will say New custom console extensions are available .
3. Select the link Install custom console extensions to launch the install.
4. When the install completes, select Close to restart the console and enable the new extension.
NOTE
When you upgrade to Configuration Manager 2107, you will be prompted to install the WebView2 console extension
again. For more information about the WebView2 installation, see the WebView2 installation section if the Community
hub article.
Log files
For more information and troubleshooting assistance, see the SmsAdminUI.log file on the console computer.
By default, this log file is at the following path:
C:\Program Files (x86)\Microsoft Endpoint Manager\AdminConsole\AdminUILog\SmsAdminUI.log .
Next steps
Use the console
Console tips
Accessibility features
Manage Configuration Manager console extensions
2/16/2022 • 8 minutes to read • Edit Online
IMPORTANT
If this setting is used, your old style extensions that aren't approved through the Console Extensions node will
no longer be able to be used. The setting, Only allow console extensions that are approved for the
hierarchy , is enabled by default if you installed from the 2103 baseline image. The setting remains disabled
by default, if you upgraded from a version prior to 2103. If the setting was enabled in error, disabling the setting
allows the old style extensions to be used again.
Prerequisites
The Configuration Manager console needs to be able to connect to the administration service and the
administration service needs to be functional.
WARNING
If this setting is enabled , your old style extensions that aren't approved through the Console Extensions node will no
longer be able to be used. The setting, Only allow console extensions that are approved for the hierarchy , is
enabled by default if you installed from the 2103 baseline image. The setting remains disabled by default, if you
upgraded from a version prior to 2103. If the setting was enabled in error, disabling the setting allows the old style
extensions to be used again.
NOTE
Currently, when an unsigned extension isn't enabled for user notification, in the Console Extensions node, the
Required column remains blank instead of populating a value of No .
2. The notification will say New custom console extensions are available .
3. Select the link Install custom console extensions to launch the install.
4. When the install completes, select Close to restart the console and enable the new extension.
NOTE
When you upgrade to Configuration Manager 2107, you will be prompted to install the WebView2 console extension
again. For more information about the WebView2 installation, see the WebView2 installation section if the Community
hub article.
Next steps
Console extensions from Community hub
Import console extensions
Configuration Manager console notifications
Console tips
Import Configuration Manager console extensions
2/16/2022 • 6 minutes to read • Edit Online
C O N F IGURAT IO N
M A N A GER VERSIO N 2103 2107 2111 O R L AT ER
Import an unsigned No Yes, when you allow Yes, when you allow
extension unsigned unsigned
NOTE
Currently, when an unsigned extension isn't enabled for user notification, in the Console Extensions node, the
Required column remains blank instead of populating a value of No .
$adminServiceProvider = "SMSProviderServer.contoso.com"
$cabFilePath = "C:\Testing\MyExtension.cab"
$adminServiceURL =
"https://$adminServiceProvider/AdminService/v1/ConsoleExtensionMetadata/AdminService.UploadExtension"
$cabFileName = (Get-Item -Path $cabFilePath).Name
$Data = Get-Content $cabFilePath
$Bytes = [System.IO.File]::ReadAllBytes($cabFilePath)
$base64Content = [Convert]::ToBase64String($Bytes)
$Headers = @{
"Content-Type" = "Application/json"
}
$Body = @{
CabFile = @{
FileName = $cabFileName
FileContent = $base64Content
}
} | ConvertTo-Json
$result = Invoke-WebRequest -Method Post -Uri $adminServiceURL -Body $Body -Headers $Headers -
UseDefaultCredentials
$adminServiceProvider = "SMSProviderServer.contoso.com"
$cabFilePath = "C:\Testing\MyExtension.cab"
$adminServiceURL =
"https://$adminServiceProvider/AdminService/v1/ConsoleExtensionMetadata/AdminService.UploadExtension"
$cabFileName = (Get-Item -Path $cabFilePath).Name
$Data = Get-Content $cabFilePath
$Bytes = [System.IO.File]::ReadAllBytes($cabFilePath)
$base64Content = [Convert]::ToBase64String($Bytes)
$Headers = @{
"Content-Type" = "Application/json"
}
$Body = @{
CabFile = @{
FileName = $cabFileName
FileContent = $base64Content
}
AllowUnsigned = $true
} | ConvertTo-Json
$result = Invoke-WebRequest -Method Post -Uri $adminServiceURL -Body $Body -Headers $Headers -
UseDefaultCredentials
if ($result.StatusCode -eq 200) {Write-Host "$cabFileName was published successfully."}
else {Write-Host "$cabFileName publish failed. Review AdminService.log for more information."}
NOTE
Currently, when an unsigned extension isn't enabled for user notification, in the Console Extensions node, the
Required column remains blank instead of populating a value of No .
Next steps
Manage console extensions
Console extensions from Community hub
Develop custom console extensions
Configuration Manager console changes and tips
2/16/2022 • 14 minutes to read • Edit Online
General tips
Export to CSV
(Introduced in version 2111)
Starting in Configuration Manager 2111, you can export the contents of a grid view in the console along with
the column headers to a comma-separated values (CSV) file that can be used to import to Excel or other
applications. While you could previously cut and paste from a grid view, exporting to CSV makes extracting a
large number of rows faster and easier. You can export either all or selected items from the following nodes:
Device Collections
User Collections
Devices
Users
To export the information, select Expor t to CSV file from either the ribbon or the right-click menu. Choose
Expor t selected items to only export items you've already selected, or you can choose to Expor t all items .
TIP
The default limit on search results is 1,000. You can change this default value. In the Configuration Manager
console, go to the Search tab of the ribbon. In the Options group, select Search Settings . Change the Search
Results value. A larger number of search results might take longer to display.
By default, the upper maximum limit is 100,000. To change this limit, set the DWORD value
Quer yResultCountMaximum in the following registry key:
HKEY_CURRENT_USER\Software\Microsoft\ConfigMgr10\AdminUI
The in-console setting corresponds to the Quer yResultCountLimit value in the same key. An administrator can
configure these values in the HKLM hive for all users of the device. The HKCU value overrides the HKLM setting.
Configuration Manager returned a large number of results. You can narrow your results by using search. Or,
click here to view a maximum of 100000 results.
There's now additional blank space in between this warning and the search field. This move helps to prevent
inadvertently selecting the warning to display more results.
Send feedback
Submit product feedback from the console.
Send a smile : Send feedback on what you liked
Send a frown : Send feedback on what you didn't like
Send a suggestion : Takes you to the product feedback site to share your idea
For more information, see Product Feedback.
Navigate to collection
(Introduced in version 2107)
You can now navigate to a collection from the Collections tab in the Devices node. Select View Collection
from either the ribbon or the right-click menu in the tab.
Added maintenance window column
(Introduced in version 2107)
A Maintenance window column was added to the Collections tab in the Devices node.
NOTE
Viewing the currently logged on user requires user discovery and user device affinity.
For more information on how to show a non-default column, see How to use the admin console.
Improvement to device search performance
When searching in a device collection, it doesn't search the keyword against all object properties. When you're
not specific about what to search, it searches across the following four properties:
Name
Primary user(s)
Currently logged on user
Last logon user name
This behavior significantly improves the time it takes to search by name, especially in a large environment.
Custom searches by specific criteria are unaffected by this change.
1. In the Configuration Manager console, navigate to Monitoring > Over view > Deployments .
2. Select the software update group or software update for which you want to monitor the deployment status.
3. On the Home tab, in the Deployment group, select View Status .
4. Right-click on either a specific deployment status for the devices, or on a single device under Asset Details
pane.
5. Select Evaluate Software Update Deployments to send a notification to the selected devices to run an
evaluation cycle for software update deployments.
Import objects to current folder
(Introduced in version 2010)
When you import an object in the Configuration Manager console, it now imports to the current folder.
Previously, Configuration Manager always put imported objects in the root node. This new behavior applies to
applications, packages, driver packages, and task sequences.
See task sequence size in the console
(Introduced in version 2010)
When you view the list of task sequences in the Configuration Manager console, add the Size (KB) column. Use
this column to identify large task sequences that can cause problems. For more information, see Reduce the size
of task sequence policy.
Order by program name in task sequence
(Introduced in version 1906)
In the Software Librar y workspace, expand Operating Systems , and select the Task Sequences node. Edit a
task sequence, and select or add the Install Package step. If a package has more than one program, the drop-
down list now sorts the programs alphabetically.
Task sequences tab in applications node
(Introduced in version 1906)
In the Software Librar y workspace, expand Application Management , go to the Applications node, and
select an application. In the details pane, switch to the new Task sequences tab. This tab lists the task
sequences that reference this application.
Drill through required updates
(Introduced in version 1906)
1. Go to one of the following places in the Configuration Manager console:
Software Librar y > Software Updates > All Software Updates
Software Librar y > Windows Ser vicing > All Windows Updates
Software Librar y > Office 365 Client Management > Office 365 Updates
2. Select any update that is required by at least one device.
3. Look at the Summar y tab and find the pie chart under Statistics .
4. Select the View Required hyperlink next to the pie chart to drill down into the device list.
5. This action takes you to a temporary node under Devices where you can see the devices requiring the
update. You can also take actions for the node such as creating a new collection from the list.
NOTE
Starting on April 21, 2020, Office 365 ProPlus is being renamed to Microsoft 365 Apps for enterprise . For more
information, see Name change for Office 365 ProPlus. You may still see references to the old name in the Configuration
Manager console and supporting documentation while the console is being updated.
Monitoring workspace
Collection evaluation time
(Introduced in version 2111)
When viewing a collection, you could previously see the amount of time the site took to evaluate the collection
membership. This data is now also available in the Monitoring workspace. When you select a collection in
either subnode of the Collection Evaluation node, the details pane displays this collection evaluation time
data.
Next steps
Use the console
Console notifications
Accessibility features
Fundamentals of Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
Hierarchies of sites
When you install Configuration Manager for the first time, the first Configuration Manager site that you install
determines the scope of your hierarchy. The first Configuration Manager site is the foundation from which you
will manage devices and users in your enterprise. This first site must be either a central administration site or a
stand-alone primary site.
A central administration site is suitable for large-scale deployments, provides a central point of administration,
and provides the flexibility to support devices that are distributed across a global network infrastructure. After
you install a central administration site, you will need to install one or more primary sites as child sites. This
configuration is necessary because a central administration site does not directly support management of
devices, which is the function of a primary site. A central administration site supports multiple child-primary
sites. The child-primary sites are used to directly manage devices, and to control network bandwidth when your
managed devices are in different geographical locations.
A stand-alone primary site is suitable for smaller deployments, and can be used to manage devices without
having to install additional sites. Although a stand-alone primary site can limit the size of your deployment, it
does support a scenario to expand your hierarchy at a later time by installing a new central administration site.
With this site expansion scenario, your stand-alone primary site becomes a child-primary site, and you can then
install additional child-primary sites below your new central administration site. You can then expand your initial
deployment for future growth of your enterprise.
TIP
A stand-alone primary site and a child-primary site are really the same type of site: a primary site. The difference in name
is based on the hierarchy relationship that is created when you also use a central administration site. This hierarchy
relationship can also limit the installation of certain site system roles that extend Configuration Manager functionality. This
limitation of roles occurs because certain site system roles can only be installed on the top-tier site of the hierarchy, a
central administration site, or a stand-alone primary site.
After you install your first site, you can install additional sites. If your first site was a central administration site,
then you can install one or more child-primary sites. After you install a primary site (stand-alone, or child-
primary), you can then install one or more secondary sites.
A secondary site can only be installed as a child site below a primary site. This site type extends the reach of a
primary site to manage devices in locations that have a slow network connection to the primary site. Even
though a secondary site extends the primary site, the primary site manages all of the clients. The secondary site
provides support for devices in the remote location. It provides support by compressing and then managing the
transfer of information across your network that you send (deploy) to clients, and that clients send back to the
site.
The following diagrams show some example site designs.
Upgrade
Upgrade or in-place upgrade, is used when converting your Configuration Manager 2012 site or hierarchy to
one that runs Configuration Manager current branch.
When you upgrade System Center 2012 Configuration Manager to Configuration Manager current branch, you
continue to use the same servers to host your sites and site servers, and you retain your existing data and
configurations for Configuration Manager. This is different from Migration which is a way to retain your
configurations and data about managed devices while using new Configuration Manager current branch sites
installed to new hardware.
For more details, see Upgrade to Configuration Manager.
Update
Update is used for installing in-console updates for Configuration Manager, and for out-of-band updates which
are updates that cannot be delivered from within the Configuration Manager console. In-console updates can
modify the version of your Current Branch site (or Technical Preview site) so that it runs a higher version. For
example, if your site runs version 1806, you can install an update for version 1810. Updates can also install fixes
for a known issue, without modifying the site version.
Typically, updates add security fixes, quality improvements, and new features to your existing deployment. If you
use the Technical Preview branch, an update can install a newer version of the Technical Preview.
You choose when to install the in-console update, starting at the top-tier site of your hierarchy.
You can install any update that is available from within the console. For example, if your site runs version
1802 and both 1806 and 1810 are offered, you should consider installing version 1810 because each version
includes the features that were first made available in previously released versions.
After a new update completes installation at your top-tier site, child primary sites automatically start the
process to update. However, you can set Service Windows to control the timing of updates.
Secondary sites do not automatically install updates. Instead, you manually start the update from within the
Configuration Manager console.
For more, see Updates for Configuration Manager, and Technical Preview for Configuration Manager.
Install
Install is used when creating a new Configuration Manager hierarchy from scratch, or adding additional sites to
an existing hierarchy.
When you install a new primary site or central administration site, the location of setup.exe and its related
source files that you use depends on your installation scenario.
For more, see Prepare to install sites.
Fundamentals of managing devices with
Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
User-based management
Configuration Manager supports collections of Azure Active Directory and Active Directory Domain Services
users. When you use a user collection, you can install software on all computers that members of the collection
use. To make sure that the software you deploy only installs on the devices that are specified as a user's primary
device, set up user device affinity. A user can have one or more primary devices.
One of the ways that users can control their software deployment experience is to use the Software Center
client interface. The Software Center is automatically installed on client computers and is run from the
Windows Star t menu. The Software Center lets users manage their own software and do the following tasks:
Install software
Schedule software to automatically install outside working hours
Configure when Configuration Manager can install software on a device
Configure the access settings for remote control, if remote control is set up in Configuration Manager
Configure options for power management, if an administrator sets up this option
Browse for, install, and request software
Configure preference settings
When it's set up, specify a primary device for user device affinity
For more information, see the following articles:
Plan for Software Center
Link users and devices with user device affinity
Software Center user guide
Fundamentals of client management tasks for
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
Security layers
Security for Configuration Manager consists of the following layers:
Windows OS and network security
Network infrastructure: firewalls, intrusion detection, public key infrastructure (PKI)
Configuration Manager security controls
SMS Provider
Site database permissions
Windows OS and network security
The first layer is provided by Windows security features for both the OS and the network. This layer includes the
following components:
File sharing to transfer files between Configuration Manager components.
Access Control Lists (ACLs) to help secure files and registry keys.
Internet Protocol Security (IPsec) to help secure communications.
Group policy to set security policy.
Distributed Component Object Model (DCOM) permissions for distributed applications, like the
Configuration Manager console.
Active Directory Domain Services to store security principals.
Windows account security, including some groups that Configuration Manager creates during setup.
Network infrastructure
Network security components, like firewalls and intrusion detection, help provide defense for the whole
environment. Certificates issued by industry standard public key infrastructure (PKI) implementations help
provide authentication, signing, and encryption.
Configuration Manager security controls
By default, only local administrators have rights to the files and registry keys that the Configuration Manager
console requires on computers where you install it.
SMS Provider
The next layer of security is based on access to the SMS Provider. The SMS Provider is a Configuration Manager
component that grants a user access to query the site database for information. The SMS Provider primarily
exposes access through Windows Management Instrumentation (WMI), but also a REST API called the
administration service.
By default, access to the provider is restricted to members of the local SMS Admins group. This group at first
contains only the user who installed Configuration Manager. To grant other accounts permission to the Common
Information Model (CIM) repository and the SMS Provider, add the other accounts to the SMS Admins group.
You can specify the minimum authentication level for administrators to access Configuration Manager sites. This
feature enforces administrators to sign in to Windows with the required level. For more information, see Plan
for the SMS Provider.
Site database permissions
The final layer of security is based on permissions to objects in the site database. By default, the Local System
account and the user account that you used to install Configuration Manager can administer all objects in the
site database. Grant and restrict permissions to other administrative users in the Configuration Manager console
by using role-based administration.
Role-based administration
Configuration Manager uses role-based administration to help secure objects like collections, deployments, and
sites. This administration model centrally defines and manages hierarchy-wide security access settings for all
sites and site settings.
An administrator assigns security roles to administrative users and group permissions. The permissions are
connected to different Configuration Manager object types, for example, to create or change client settings.
Security scopes include specific instances of objects that an administrative user is responsible to manage. For
example, an application that installs the Configuration Manager console.
The combination of security roles, security scopes, and collections define the objects that an administrative user
can view and manage. Configuration Manager installs some default security roles for typical management tasks.
Create your own security roles to support your specific business requirements.
For more information, see Fundamentals of role-based administration.
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
Privacy
Before you implement Configuration Manager, consider your privacy requirements. Although enterprise
management products offer many advantages because they can effectively manage lots of clients, this software
might affect the privacy of users in your organization. Configuration Manager includes many tools to collect
data and monitor devices. Some tools might raise privacy concerns in your organization.
For example, when you install the Configuration Manager client, it enables many management settings by
default. This configuration causes the client software to send information to the Configuration Manager site. The
site stores client information in the site database. The client information isn't directly sent to Microsoft. For more
information, see Diagnostics and usage data.
Next steps
Fundamentals of role-based administration
Plan for security
Fundamentals of role-based administration for
Configuration Manager
2/16/2022 • 9 minutes to read • Edit Online
Benefits
The following items are benefits of role-based administration in Configuration Manager:
Sites aren't used as administrative boundaries. In other words, don't expand a standalone primary site to
a hierarchy with a central administration site to separate administrative users.
You create administrative users for a hierarchy and only need to assign security to them one time.
All security assignments are replicated and available throughout the hierarchy. Role-based administration
configurations replicate to each site in the hierarchy as global data, and then are applied to all
administrative connections.
IMPORTANT
Intersite replication delays can prevent a site from receiving changes for role-based administration. For more
information about how to monitor intersite database replication, see Data transfers between sites.
There are built-in security roles that are used to assign the typical administration tasks. Create your own
custom security roles to support your specific business requirements.
Administrative users see only the objects that they have permissions to manage.
You can audit administrative security actions.
Security roles
Use security roles to grant security permissions to administrative users. Security roles are groups of security
permissions that you assign to administrative users so that they can do their administrative tasks. These security
permissions define the actions that an administrative user can do and the permissions that are granted for
particular object types. As a security best practice, assign the security roles that provide the least permissions
that are required for the task.
Configuration Manager has several built-in security roles to support typical groupings of administrative tasks.
You can create your own custom security roles to support your specific business requirements.
The following table summarizes all of the built-in roles:
Application deployment manager Can deploy applications. Administrative users in this role can
view a list of applications. They can manage deployments for
applications, alerts, and packages. They can view collections
and their members, status messages, queries, conditional
delivery rules, and App-V virtual environments.
Company resource access manager Grants permissions to create, manage, and deploy company
resource access profiles. For example, Wi-Fi, VPN, Exchange
ActiveSync email, and certificate profiles.
Endpoint protection manager Grants permissions to create, modify, and delete endpoint
protection policies. They can deploy these policies to
collections, create and modify alerts, and monitor endpoint
protection status.
Operating system deployment manager Grants permissions to create OS images and deploy them to
computers, manage OS upgrade packages and images, task
sequences, drivers, boot images, and state migration
settings.
Remote tools operator Grants permissions to run and audit the remote
administration tools that help users resolve computer issues.
Administrative users in this role can run remote control,
remote assistance, and remote desktop from the
Configuration Manager console.
Software update manager Grants permissions to define and deploy software updates.
Administrative users in this role can manage software
update groups, deployments, and deployment templates.
TIP
If you have permissions, you can view the list of all security roles in the Configuration Manager console. To view the roles,
go to the Administration workspace, expand Security , and then select the Security Roles node.
You can't modify the built-in security roles, other than add administrative users. You can copy the role, make
changes, and then save these changes as a new custom security role. You can also import security roles that
you've exported from another hierarchy like a lab environment. For more information, see Configure role-based
administration.
Review the security roles and their permissions to determine whether you'll use the built-in security roles, or
whether you have to create your own custom security roles.
Role permissions
Each security role has specific permissions for different object types. For example, the application author role
has the following permissions for applications:
Approve
Create
Delete
Modify
Modify folder
Move object
Read
Run report
Set security scope
This role also has permissions for other objects.
For more information on how to view the permissions for a role, or change the permissions for a custom role,
see Configure role-based administration.
Plan for security roles
Use this process to plan for Configuration Manager security roles in your environment:
1. Identify the tasks that administrative users need to do in Configuration Manager. These tasks might relate
to one or more groups of management tasks. For example, deploying operating systems and settings for
compliance.
2. Map these administrative tasks to one or more of the built-in roles.
3. If some of the administrative users do the tasks of multiple roles, assign the users to the multiple roles.
Don't create a custom role that combines the permissions.
4. If the tasks that you identified don't map to the built-in security roles, create and test custom roles.
For more information, see Create custom security roles and Configure security roles.
Collections
Collections specify the users and devices that an administrative user can view or manage. For example, to
deploy an application to a device, the administrative user needs to be in a security role that grants access to a
collection that contains the device.
For more information about collections, see Introduction to collections.
Before you configure role-based administration, decide whether you have to create new collections for any of
the following reasons:
Functional organization. For example, separate collections of servers and workstations.
Geographic alignment. For example, separate collections for North America and Europe.
Security requirements and business processes. For example, separate collections for production and test
computers.
Organization alignment. For example, separate collections for each business unit.
For more information, see Configure collections to manage security.
Security scopes
Use security scopes to provide administrative users with access to securable objects. A security scope is a named
set of securable objects that are assigned to administrator users as a group. All securable objects are assigned to
one or more security scopes. Configuration Manager has two built-in security scopes:
All : Grants access to all scopes. You can't assign objects to this security scope.
Default : This scope is used for all objects by default. When you install Configuration Manager, it assigns
all objects to this security scope.
If you want to restrict the objects that administrative users can see and manage, create your own custom
security scopes. Security scopes don't support a hierarchical structure and can't be nested. Security scopes can
contain one or more object types, which include the following items:
Alert subscriptions
Applications and application groups
App-V virtual environments
Boot images
Boundary groups
Configuration items and baselines
Custom client settings
Distribution points and distribution point groups
Driver packages
Endpoint protection policies (all)
Folders
Global conditions
Migration jobs
OneDrive for Business profiles
OS images
OS upgrade packages
Packages
Queries
Remote connection profiles
Scripts
Sites
Software metering rules
Software update groups
Software updates packages
Task sequences
User data and profiles configuration items
Windows Update for Business policies
There are also some objects that you can't include in security scopes because they're only secured by security
roles. Administrative access to these objects can't be limited to a subset of the available objects. For example,
you might have an administrative user who creates boundary groups that are used for a specific site. Because
the boundary object doesn't support security scopes, you can't assign this user a security scope that provides
access to only the boundaries that might be associated with that site. Because a boundary object can't be
associated to a security scope, when you assign a security role that includes access to boundary objects to a
user, that user can access every boundary in the hierarchy.
Objects that don't support security scopes include but aren't limited to the following items:
Active Directory forests
Administrative users
Alerts
Boundaries
Computer associations
Default client settings
Deployment templates
Device drivers
Migration site-to-site mappings
Security roles
Security scopes
Site addresses
Site system roles
Software updates
Status messages
User device affinities
Create security scopes when you have to limit access to separate instances of objects. For example:
You have a group of administrative users who need to see production applications and not test
applications. Create one security scope for production applications and another for test applications.
One group of administrative users requires Read permission to specific software update groups. Another
group of administrative users requires Modify and Delete permissions for other software update groups.
Create different security scopes for these software update groups.
For more information, see Configure security scopes for an object.
Next steps
Configure role-based administration for Configuration Manager
Configuration Manager and Windows as a service
2/16/2022 • 3 minutes to read • Edit Online
Overview of Configuration Manager current branch Provides a brief summary of the key points for the servicing
model for Configuration Manager current branch
Support lifecycle Explains the current branch support and servicing model.
Removed and deprecated items Provides early notice about future changes that might affect
your use of Configuration Manager.
Updates to Configuration Manager current branch Explains the easy in-console method of applying feature
updates to Configuration Manager.
Get available updates Explains the two modes available to get new Configuration
Manager feature updates.
Install new Configuration Manager feature updates Explains the simple installation steps for feature updates.
Support for Windows ADK Provides a support matrix for the Windows Assessment and
Deployment Kit (Windows ADK).
Technical Previews for Configuration Manager Provides information about the Configuration Manager
technical preview program.
Windows as a service
A RT IC L E DESC RIP T IO N
Manage Windows as a service Explains how to use servicing plans to deploy Windows
feature updates.
A RT IC L E DESC RIP T IO N
Upgrade Windows via task sequence The details of creating a task sequence to upgrade Windows
with additional recommendations.
Optimize Windows update delivery Use Configuration Manager to manage update content to
stay current with Windows.
Use Desktop Analytics Desktop Analytics allows you to assess and analyze the
readiness of devices in your environment for an upgrade to
Windows.
Windows Update for Business integration (optional) Explains how to define and deploy Windows Update for
Business (WUfB) policies using Configuration Manager.
Use co-management with Microsoft Intune and Windows Provides an overview of co-management.
Update for Business (optional)
Product lifecycle
Another important aspect of staying current with Windows and Configuration Manager is to monitor product
lifecycles. Configuration Manager has built-in features to help:
Be proactive with dashboards for planning:
Product lifecycle dashboard: View the Microsoft Lifecycle Policy for applicable products.
Windows servicing dashboard: Provides you with information about computers in your environment,
servicing plans, and compliance information.
Be reactive with notifications, management insights, and reports:
Configuration Manager console notifications: Look for in-console notifications about devices with
operating systems that are past the end of support date and that are no longer eligible to receive
security updates.
Management insights
Security: Identify clients with unsupported antimalware client versions or clients running earlier
versions of Windows that don't receive security updates by default.
Simplified management: Identify clients running an unsupported version of Windows or with
an earlier version of the Configuration Manager client.
Reports:
Data warehouse historical reporting: View computers that are missing software updates.
OS reports: View computers by OS versions and servicing details.
Software Updates compliance reports: View software update compliance details.
Power BI sample reports for software updates: Use Power BI to view software update compliance
status.
Next steps
In-place upgrade to Configuration Manager current branch from System Center 2012 Configuration
Manager
Plan for migration to Configuration Manager current branch
Use cloud services with Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
Cloud-based resources
Each option has different requirements. Investigate each in greater depth to understand the unique
prerequisites, limitations, and potential for additional costs based on use.
Azure virtual machines for cloud-based infrastructure
Configuration Manager supports using computers that run in virtual machines in Azure. You can use Azure
virtual machines in the following scenarios:
Run Configuration Manager in a virtual machine and use it to manage clients installed in other cloud-
based virtual machines.
Run Configuration Manager in a virtual machine and use it to manage clients that aren't in Azure.
Run different Configuration Manager site system roles in Azure virtual machines. Run other roles in your
on-premises network. Configure appropriate network connectivity for communications.
The same requirements for networks, operating systems, and hardware requirements that apply to installing the
Configuration Manager on your on-premises network also apply to the installation of Configuration Manager in
Azure.
An Azure subscription is required to use Azure virtual machines. You incur charges based on the number of
virtual machines you use, their configuration, and use of cloud-based resources.
Additionally, Configuration Manager sites and clients that run in Azure virtual machines are subject to the same
license requirements as on-premises installations.
For more information, see Configuration Manager on Azure FAQ.
Azure services
You can connect the site to Azure for several scenarios:
Azure Active Directory authentication and discovery. For more information, see Configure Azure services.
Cloud management gateway to manage internet-based clients. For more information, see Cloud
management gateway overview.
Deploy apps from the Microsoft Store for Business and Education. For more information, see Manage apps
from the Microsoft Store for Business and Education.
Use Windows data to gain insights into apps and drivers to help upgrade devices to Windows 10. For more
information, see What is Desktop Analytics?.
Microsoft Endpoint Manager tenant attach
These are different than using an Azure virtual machine, on which you deploy a site system role.
Run as a service in Azure, not on a virtual machine.
Automatically scale to meet increased content requests from clients.
Support clients on the internet and the intranet.
An Azure subscription is required for these scenarios. You incur charges based on the amount of data that
transfers to and from the service.
Additional Configuration Manager capabilities
Some Configuration Manager capabilities can connect to cloud-based services, like:
Windows Server Update Services (WSUS)
Download updates for Configuration Manager
These additional capabilities don't require you to have an Azure subscription. You don't have to set up specific
connections, certificates, or services in the cloud. Instead, they are automatically managed by Configuration
Manager for you. All you need to do is ensure applicable site systems and devices can access the internet-based
URLs.
Applies to: Configuration Manager (current branch & technical preview branch) & System Center Configuration
Manager (long-term servicing branch)
There are three branches of Configuration Manager available:
Current branch
Long-term servicing branch
Technical preview branch
Use this article to help you choose the right branch.
TIP
All sites in a hierarchy must run the same branch. It isn't supported to have a hierarchy with different branches at
different sites.
Current branch
This branch is licensed for use in a production environment. Use this branch to get the latest features and
functionalities. If you have one of the following licenses, you can use this branch:
System Center Datacenter
System Center Standard
System Center Configuration Manager
Equivalent subscription rights
For more information about Software Assurance and licensing options, see Licensing and branches for
Configuration Manager and Frequently asked questions for Configuration Manager branches and licensing.
Microsoft plans to release updates for Configuration Manager current branch a few times per year. Each update
version remains in support for 18 months from its general availability (GA) release date. Technical support is
provided for the entire period of support. However, our support structure is dynamic, evolving into two distinct
servicing phases that depend on the availability of the latest current branch version. (For more information, see
Support for Configuration Manager current branch versions. Updates to newer versions are available as in-
console updates.
To install the current branch as a new site, use baseline media. Also use baseline media to upgrade from System
Center 2012 Configuration Manager with Service Pack 2 or System Center 2012 R2 Configuration Manager
with Service Pack 1. Access to this media depends on how your organization licenses Configuration Manager.
You can also use the baseline media to install a new site that is an evaluation edition of the current branch. The
evaluation edition doesn't require a license. You can use the evaluation edition for 180 days. It supports upgrade
to a licensed edition of the current branch. To install only an evaluation edition, get it from the Evaluation Center.
NOTE
Use baseline media to install sites for a new Configuration Manager hierarchy. If you previously installed a baseline
version, use in-console updates to update your sites to a new version.
Sites that are updated using in-console updates result in sites that are the same as the new site installed using the
baseline media.
For more information, see Updates for Configuration Manager.
Applies to: Configuration Manager (current branch), & System Center Configuration Manager (long-term
servicing branch)
Use this article to learn about the licensing requirements for the installation options available with
Configuration Manager. These installation options include the following branches:
Current branch
Long-term servicing branch (LTSB)
Evaluation installation of the current branch
Technical preview branch
Licensing overview
Customers with active Software Assurance (SA) on Configuration Manager licenses or with equivalent
subscription rights as of October 1, 2016 have rights to use the October 2016 version 1606 release of
Configuration Manager. Customers with rights to Configuration Manager on or after October 1, 2016 will find
two licensed options upon installation: current branch and long-term servicing branch (LTSB).
For the complete terms and conditions for the products you purchase through Microsoft Volume Licensing
programs, see Licensing Terms and Documentation.
Licensed branches
This article references the Software Assurance agreement or equivalent subscription rights. This Microsoft
licensing agreement grants rights to install and use Configuration Manager.
Current branch
The current branch requires an active Software Assurance agreement or equivalent rights to Configuration
Manager. For more information, see Software Assurance and the Current Branch.
This branch is supported for use in production environments that want to receive regular quality and feature
updates from Microsoft. It provides access to use all features and improvements.
Beginning with the 1710 release, each update version remains in support for 18 months from its general
availability release date. For more information, see Support for Configuration Manager current branch versions.
Long-term servicing branch (LTSB )
The LTSB requires a current Software Assurance agreement with Microsoft as of October 1, 2016. For more
information, see Software Assurance and the LTSB.
This branch is supported for use in production environments. It's intended for use by customers that have let
their Software Assurance (SA) or equivalent subscriptions rights to Configuration Manager expire after October
1, 2016. This branch is limited when compared to the Current Branch.
Critical security updates for Configuration Manager are made available to this branch but no new features are
made available.
Evaluation installation of the current branch
The evaluation version doesn't require a Software Assurance agreement with Microsoft. Evaluation installs are
always the current branch, and you can use them for 180 days.
You can upgrade the evaluation installation to a full installation of the current branch. You can't upgrade an
evaluation installation to the long-term servicing branch.
Technical preview branch
The technical preview branch is also available. This branch is a limited build of Configuration Manager that lets
you try out new features. You install the technical preview using different media than the licensed versions. For
more information, see Technical Preview.
Licensing resources
To learn more about product licensing details, use the following resources.
Microsoft Volume Licensing Service Center (VLSC )
Overview of VLSC
Microsoft Volume Licensing Product Terms
Volume license customers can get a summary of their licenses from the Volume License Service Center.
Go to the Licenses menu, and select Licenses Summar y .
VLSC videos
For training videos on how VLSC works, go to Microsoft Volume Licensing Service Center training and
resources and select How-to videos .
Where to look up your active Software Assurance agreement (starting at 43 seconds)
How to get permissions for VLSC. You can delegate VLSC read and write permissions to other people in
your organization.
Next steps
Frequently asked questions for Configuration Manager branches and licensing
Use the Configuration Manager client software for
extended interoperability with future versions of a
Current Branch site
2/16/2022 • 2 minutes to read • Edit Online
How it works
Typically, when you install a new in-console update for Configuration Manager, clients automatically update their
client software so they can use those new features. With this scenario, you still update to the current branch
receiving the new features and updates. Most devices update the Configuration Manager client software with
each version update you install. However, on a subset of critical systems that you don't want to receive client
software updates, you install the extended interoperability client. These clients don't install new client software
until you explicitly deploy a new version of the client software to them.
Supported versions
The following table lists the versions of the Configuration Manager client that are supported for this scenario:
TIP
The EIC is supported for at least two years from the date of release. For more information on release dates, see Support
for Configuration Manager current branch versions.
Plan to update the extended interoperability client on devices that you manage with the current branch before
support for the client expires. To do so, download a new version of the client from Microsoft, and then deploy
that updated client software to your devices that use the current extended interoperability client.
Limitations
Updates for the extended interoperability client software aren't available by using in-console updates. For
more information on how to update the EIC, see How to upgrade an excluded client.
The EIC only supports the following features:
Software updates
Hardware and software inventory
Packages and programs
Next steps
How to exclude clients from upgrade
To make sure that clients are installed correctly on the devices you want, see How to monitor clients.
Introduction to the long-term servicing branch of
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
TIP
The Configuration Manager LTSB isn't related to the System Center suite long-term servicing channel (LTSC). For more
information, see Overview of System Center release options.
Next Steps
If you decide that the Configuration Manager LTSB is the correct branch for your environment, install a new
LTSB site as part of a new hierarchy, or upgrade a System Center 2012 Configuration Manager site and
hierarchy.
Supported Configurations for the Long-Term
Servicing Branch of System Center Configuration
Manager
2/16/2022 • 6 minutes to read • Edit Online
Client management
The following sections identify the client operating systems that you can manage with the LTSB. The LTSB does
not support the addition of new operating systems as supported clients.
Windows computers
You can use the LTSB to manage the following Windows computer operating systems with the Configuration
Manager client software that is included with Configuration Manager. For more information, see How to deploy
clients to Windows computers.
Suppor ted operating systems:
Windows Server 2016
Windows Server 2012 R2 (x64): Standard, Datacenter (Note 1)
Windows Server 2012 (x64): Standard, Datacenter (Note 1)
Windows Storage Server 2012 R2 (x64)
Windows Storage Server 2012 (x64)
Windows 10 Enterprise 2015 LTSB (x86, x64)
Windows 10 Enterprise 2016 LTSB (x86, x64)
Windows 8.1 (x86, x64): Professional, Enterprise
The Server Core installation of Windows Server 2012 R2 (x64) (Note 2)
The Server Core installation of Windows Server 2012 (x64) (Note 2)
(Note 1) Datacenter releases are supported but not certified for Configuration Manager.
(Note 2) To support client push installation, the computer that runs this operating system version must run the
File Server role service for the File and Storage Services server role. For information about installing Windows
features on a Server Core computer, see Install Server Roles and Features on a Server Core Server.
Windows Embedded
You can use the LTSB to manage the following Windows Embedded devices by installing the client software on
the device. For more information, see Planning for client deployment to Windows Embedded devices.
Requirements and limitations:
All client features are supported on supported Windows Embedded systems that do not have write filters
enabled.
Clients that use one of the following are supported for all features except power management:
Enhanced Write Filters (EWF)
RAM File-Based Write Filters (FBWF)
Unified Write Filters (UWF)
Before you can monitor detected malware on Windows Embedded devices based on Windows XP, you
must install the Microsoft Windows WMI scripting package on the embedded device. Use Windows
Embedded Target Designer to install this package. The WBEMDISP.DLL and WBEMDISP.TLB files must exist
and be registered in the %windir%\System32\WBEM folder on the embedded device to ensure that
detected malware is reported.
Suppor ted operating systems:
Windows 10 Enterprise 2016 LTSB (x86, x64)
Windows 10 Enterprise 2015 LTSB (x86, x64)
Windows Embedded 8.1 Industry (x86, x64)
NOTE
The LTSB does not support the management of devices that connect through an online service, like Exchange Online
(Microsoft 365).
SQL Server versions supported for the site database and reporting
point
The LTSB supports the following versions of SQL Server to host the site database and reporting point. For each
supported version, the same configuration requirements and limitations that appear in Support for SQL Server
versions for the current branch apply to the LTSB. This support includes the use of a SQL Server Always On
failover cluster instance or an availability group.
Suppor ted versions:
SQL Server 2016: Standard, Enterprise
SQL Server 2014 SP2: Standard, Enterprise
SQL Server 2014 SP1: Standard, Enterprise
SQL Server 2012 SP3: Standard, Enterprise
SQL Server 2008 R2 SP3: Standard, Enterprise, Datacenter
SQL Server 2016 Express
SQL Server 2014 Express SP2
SQL Server 2014 Express SP1
SQL Server 2012 Express SP3
NOTE
Microsoft does not validate the expiration date you enter and will not use this date for license validation. Instead, you can
use it as a reminder of your expiration date. This is useful because Configuration Manager periodically checks for new
software updates offered online, and your software assurance license status should be current to be eligible to use these
additional updates.
You can specify the date value on the Product Key page of the Setup Wizard when you run Setup from the
Configuration Manager version 1606 baseline media.
You can also specify this date by selecting Hierarchy Settings Proper ties > Licensing in the
Configuration Manager console.
For more information, see "Software Assurance agreements" in Licensing and branches for Configuration
Manager.
Additional pre -upgrade configurations
Prior to starting an upgrade of System Center 2012 Configuration Manager to the LTSB, you must take the
following additional steps as part of pre-upgrade checklist.
Uninstall the site system roles that the LTSB does not support:
Asset Intelligence synchronization point
Microsoft Intune connector
Cloud-based distribution points
For more information, see Upgrade to Configuration Manager.
New scripted installation options
The version 1606 baseline media supports a new unattended script file key for scripted installations of a new
top-level site. This applies to installing a new stand-alone primary site or adding a central administration site as
part of a site expansion scenario.
When using an unattended script to install a licensed branch, you must add the following section, key names,
and values to the Options section of your script. You don't need to use these values to script the install of an
Evaluation edition of the Current Branch:
SABranchOptions
Key Name: SAActive
Values: 0 or 1.
Details: 0 installs a non-licensed Evaluation edition of Current Branch, and 1 installs a licensed edition.
CurrentBranch
Values: 0 or 1.
Details: 0 installs the Long-Term Servicing Branch, and 1 installs the Current Branch.
For example, to install a licensed Current Branch edition you would use:
Key Name: SABranchOptions
SAActive = 1
CurrentBranch = 1
IMPORTANT
SABranchOptions only works with Setup from the baseline media. It does not apply when you run Setup from the
CD.Latest folder of a site you previously installed using the version 1606 baseline media.
SABranchOptions does not apply to scripted upgrades from System Center 2012 Configuration Manager and always
results in the Current Branch.
For more information, see Use a command line to install Configuration Manager sites.
Recovery
When you recover a site, you must restore the site or site database to its original branch. You cannot recover a
Current Branch site database to a LTSB installation, or vice versa.
Upgrade the long-term servicing branch to the
current branch
2/16/2022 • 2 minutes to read • Edit Online
NOTE
Qualifying baseline media is a media that has a version that is equal to or later than your LTSB installation.
For example, because the LTSB is based on version 1606, you cannot use the baseline 1511 media to convert to
the Current Branch. Instead, you run setup from the same version 1606 baseline media that you used to install
the LTSB site, and choose the licensing option for the Current Branch. Alternately, if a later baseline of the
Current Branch has been released, you can run setup from that baseline media.
For a list of baseline versions, see Baseline and update versions in Updates for Configuration Manager.
Co-management
Co-management is one of the primary ways to attach your existing Configuration Manager deployment to the
Microsoft 365 cloud. It enables you to concurrently manage Windows devices by using both Configuration
Manager and Microsoft Intune. Co-management lets you cloud-attach your existing investment in Configuration
Manager by adding new functionality like conditional access. For more information, see What is co-
management?
Desktop Analytics
Desktop Analytics is a cloud-based service that integrates with Configuration Manager. The service provides
insight and intelligence for you to make more informed decisions about the update readiness of your Windows
clients. It combines data from your organization with data aggregated from millions of devices connected to
Microsoft cloud services. For more information, see What is Desktop Analytics?
Cloud-attached management
Use features like the cloud management gateway and Azure Active Directory to manage internet-based clients.
For more information, see the following articles:
Cloud management gateway overview
Plan for Azure AD
Azure services
Real-time management
Use CMPivot to immediately query online devices, then filter and group the data for deeper insights. Also use
the Configuration Manager console to manage and deploy Windows PowerShell scripts to clients. For more
information, see CMPivot and Create and run PowerShell scripts.
Application management
Helps you create, manage, deploy, and monitor applications to a range of different devices that you manage.
Deploy, update, and manage Microsoft 365 Apps from the Configuration Manager console. Additionally,
Configuration Manager integrates with the Microsoft Store for Business and Education to deliver cloud-based
apps. For more information, see Introduction to application management.
OS deployment
Deploy an in-place upgrade of Windows, or capture and deploy OS images. Image deployment can use PXE,
multicast, or bootable media. It can also help redeploy existing devices using Windows AutoPilot. For more
information, see Introduction to OS deployment.
Software updates
Manage, deploy, and monitor software updates in the organization. Integrate with Windows Delivery
Optimization and other peer caching technologies to help control network usage. For more information, see
Introduction to software updates.
Compliance settings
Helps you to assess, track, and remediate the configuration compliance of client devices in the organization.
Additionally, you can use compliance settings to configure a range of features and security settings on devices
you manage. For more information, see Ensure device compliance.
Endpoint Protection
Provides security, antimalware, and Windows Firewall management for computers in your organization. This
area includes management and integration with the following Windows Defender suite features:
Windows Defender Antivirus
Microsoft Defender for Endpoint
Windows Defender Exploit Guard
Windows Defender Application Guard
Windows Defender Application Control
Windows Defender Firewall
For more information, see Endpoint Protection.
Inventory
Helps you identify and monitor assets.
Hardware inventory
Collects detailed information about the hardware of devices in your organization. For more information, see
Introduction to hardware inventory.
Software inventory
Collects and reports information about the files that are stored on client computers in your organization. For
more information, see Introduction to software inventory.
Asset Intelligence
Provides tools to collect inventory data and monitor software license usage in your organization. For more
information, see Introduction to Asset Intelligence.
Power management
Manage and monitor the power consumption of client computers in the organization. Configure power plans,
and use Wake-on-LAN to do maintenance outside of business hours. For more information, see Introduction to
power management.
Remote control
Provides tools to remotely administer client computers from the Configuration Manager console. For more
information, see Introduction to remote control.
Reporting
Use the advanced reporting capabilities of SQL Server Reporting Services from the Configuration Manager
console. This feature provides hundreds of default reports. For more information, see Introduction to reporting.
Software metering
Monitor and collect software usage data from Configuration Manager clients. You can use this data to determine
whether software is used after it's installed. For more information, see Monitor app usage with software
metering.
Next steps
For more information about how to plan and install Configuration Manager to support these management
capabilities in your environment, see Get ready for Configuration Manager.
What's new in Configuration Manager incremental
versions
2/16/2022 • 2 minutes to read • Edit Online
Supported versions
Use the following links to discover what's new with each supported version:
What's new in version 2111
What's new in version 2107
What's new in version 2103
What's new in version 2010
What's new in version 2006
Each update version remains in support for 18 months from its initial availability date. Stay current with the
most recent update version. For more information, see Support for Configuration Manager current branch
versions.
See also
Release notes
What's new in version 2111 of Configuration
Manager current branch
2/16/2022 • 11 minutes to read • Edit Online
Application management
Improvements to application groups
TIP
Starting with this release, app groups are no longer a pre-release feature.
Software updates
Approvals for orchestration group scripts
TIP
Starting with this release, orchestration groups are no longer a pre-release feature.
Pre and post-scripts for orchestration groups now require approval to take effect. If you select a script from a
file, author, or modify your own script, approval for the script is required from another admin. When selecting an
approved script from the Scripts library, no other approval is needed. To assist you with script approval, the
following two tabs were added to the details pane for Orchestration Groups :
Summar y : Contains information about the selected orchestration group, including the Approval State of
scripts.
Scripts : Lists information about pre and post-scripts, including the timeout, approver, and approval state for
each script.
For more information, see Approvals for orchestration group scripts.
Improvements to ADR search criteria
We've added the following options in the Date Released or Revised search criteria for automatic deployment
rules:
Older than 30 days
Older than 60 days
Older than 90 days
Older than 6 months
Older than 1 year
For more information, see Automatically deploy software updates.
Enable update notifications from Microsoft 365 Apps
You can now configure the end-user experience for Microsoft 365 Apps updates. This client setting allows you to
enable or disable notifications from Microsoft 365 Apps for these updates. The new Enable update
notifications from Microsoft 365 Apps option has been added to the Software Updates group of client
settings.
For more information, see About client settings in Configuration Manager.
Cloud-attached management
Simplified cloud attach configuration
We've simplified the process to cloud attach your Configuration Manager environment. You can now choose to
use a streamlined set of recommended defaults when cloud attaching your environment. By using the
recommended default settings, your eligible devices will be cloud attached and you'll enable capabilities like rich
analytics, cloud console, and real-time device querying.
For more information, see the Overview for cloud attach and Enable cloud attach.
Improvements to cloud management gateway
Starting in this release, cloud management gateway (CMG) deployments with a virtual machine scale set
support Azure US Government cloud environments.
For more information, see CMG - Virtual machine scale sets.
Site infrastructure
Improvements to external notifications
Starting in Configuration Manager current branch version 2107, you could enable the site to send notifications
to an external system or application. This feature used a PowerShell script to manage the status filter rules and
subscriptions.
This release adds support in the Configuration Manager console to create or edit a subscription for external
notifications. It supports events for status filter rules and application approval requests.
For more information, see External notifications.
.NET version 4.6.2 prerequisite check is an error
Configuration Manager current branch version 2107 has a warning prerequisite rule that checks for Microsoft
.NET Framework version 4.6.2. This version of .NET is required on site servers, specific site systems, clients, and
the Configuration Manager console.
Starting in this release, this prerequisite rule for .NET 4.6.2 is an error. Until you upgrade .NET, you can't continue
installing or updating the site to this version of Configuration Manager.
For more information, see List of prerequisite checks for Configuration Manager.
IMPORTANT
When the Configuration Manager client updates to version 2111 or later, client notifications are dependent upon .NET
4.6.2 or later. Until you update .NET to version 4.6.2 or later, and restart the device, users won't see notifications from
Configuration Manager. Other client-side functionality may be affected until the device is updated and restarted. For more
information, see More details about Microsoft .NET.
Client management
Improvements to client health dashboard
This release includes multiple improvements to the Client health dashboard .
New actions in the ribbon:
Choose Default Collection : Set a persistent user preference
Client Status Settings : Configure the periods of time to evaluate client health
More prominent Overall client health tile
Filters condensed on a single tile
The Combined (All) and Combined (Any) scenarios are replaced by a new tile, Clients with any
failure
New tile for Health trends by scenario
For more information, see Client health dashboard.
Software Center
Software Center notifications display with logo
If you enable Software Center customizations, the logo that you specify for Windows notifications is separate
from the Software Center logo. This logo helps users to trust these notifications. When you deploy software to a
client, the user sees notifications with your logo. For example:
For more information, see About client settings: Software Center and Plan for Software Center.
OS deployment
Task sequence check for TPM 2.0
To help you better deploy Windows 11, the Check Readiness step in the task sequence now includes checks for
TPM 2.0.
For more information, see Task sequence steps: Check Readiness.
Improvements to the Windows servicing dashboard
We now display a Windows 11 Latest Feature Updates chart in the Windows Ser vicing dashboard. The
new chart makes it easier to determine how many of your Windows 11 clients are on the latest feature update.
To display the dashboard, go to Software Librar y > Over view > Windows Ser vicing .
For more information, see The Windows servicing dashboard.
Tools
Options for Support Center Data Collector and Client Tools
New command-line options have been added to the Support Center Data Collector and Client Tools. The
following options were added:
Launch as current user without elevation
Specify machine name
Disable integrated authentication
Display help
For more information, see Support Center.
Improvements to Support Center Log File Viewer and OneTrace
The Support Center Log File Viewer and OneTrace now display status messages in an easy to read format.
Entries starting with >> are status messages that are automatically converted into a readable format when a
log is opened. Search or filter on the >> string to find status messages in the log.
For more information, see Support Center log file viewer and Support Center OneTrace.
Deprecated features
Learn about support changes before they're implemented in removed and deprecated items.
The following features are deprecated. You can still use them now, but Microsoft plans to end support in the
future.
Managing apps from the Microsoft Store for Business and Education with Configuration Manager
Asset intelligence
On-premises MDM
For more information, see Removed and deprecated features for Configuration Manager.
As previously announced, version 2111 drops support for the following features:
Third-party add-ons that use Microsoft .NET Framework version 4.6.1 or earlier, and rely on Configuration
Manager libraries. Such add-ons need to use .NET 4.6.2 or later. For more information, see External
dependencies require .NET 4.6.2.
Other updates
Starting with this version, the following features are no longer pre-release:
Application groups
Orchestration groups
Similarly, the Microsoft Connected Cache in Configuration Manager is now generally available for production
use.
For more information on changes to the Windows PowerShell cmdlets for Configuration Manager, see version
2111 release notes.
Aside from new features, this release also includes other changes such as bug fixes. For more information, see
Summary of changes in Configuration Manager current branch, version 2111.
Next steps
As of December 15, 2021, version 2111 is globally available for all customers to install.
When you're ready to install this version, see Installing updates for Configuration Manager and Checklist for
installing update 2111.
TIP
To install a new site, use a baseline version of Configuration Manager.
Learn more about:
Installing new sites
Baseline and update versions
NOTE
To better align with other releases within Microsoft Endpoint Manager, starting this year the current branch version
names will be 2103, 2107, and 2111. They will still release every four months, and release at the same time of the year.
Always review the latest checklist for installing this update. For more information, see Checklist for installing
update 2107. After you update a site, also review the Post-update checklist.
To take full advantage of new Configuration Manager features, after you update the site, also update clients to
the latest version. While new functionality appears in the Configuration Manager console when you update the
site and console, the complete scenario isn't functional until the client version is also the latest.
Cloud-attached management
Cloud attach your environment during site update
Microsoft Endpoint Manager is an integrated solution for managing all of your devices. Cloud attach brings
together Configuration Manager and Intune into a single console called Microsoft Endpoint Manager admin
center . Starting with this release, sites that aren't already onboarded to Microsoft Endpoint Manager will be
prompted to optionally cloud attach as part of the upgrade wizard. Environments are considered cloud attached
if at least one of the following features are already enabled:
Tenant attach
Co-management
Endpoint analytics
For more information, see Install in-console updates.
Convert a CMG to virtual machine scale set
Starting in current branch version 2010, you could deploy the cloud management gateway (CMG) with a virtual
machine scale set in Azure. This support was primarily to unblock customers with a Cloud Solution Provider
(CSP) subscription.
In this release, any customer with a CMG that uses the classic cloud service deployment can convert to a virtual
machine scale set. Microsoft recommends that new CMG deployments use a virtual machine scale set.
For more information, see Plan for CMG: virtual machine scale set and Modify a CMG: Convert.
Select VM size for CMG
When you deploy a CMG with a virtual machine scale set, you can now choose the virtual machine (VM) size.
The following three options are available:
Lab (B2s)
Standard (A2_v2). This size continues to be the default setting.
Large (A4_v2)
This control gives you greater flexibility with your CMG deployment. You can adjust the size for test labs or if
you support large environments. For example, the smaller Lab size is ideal for testing with a smaller number of
clients at less cost. For production deployments, either use the default Standard size or add more capacity with
the Large size.
For more information, see Cost of CMG: Virtual machine scale set.
Tenant attach: BitLocker recovery keys
Get BitLocker recovery keys for a tenant-attached device from the Microsoft Endpoint Manager admin center.
For example, a help desk technician who doesn't have access to Configuration Manager could use the web-
based admin center to help an end user get a recovery key for their device.
For more information, see Tenant attach: BitLocker recovery keys.
Tenant attach support for US Government cloud
United States Government customers can now use the following Microsoft Endpoint Manager tenant attach
features in the US Government cloud:
Account onboarding
Tenant sync to Intune
Device sync to Intune
Device actions in the Microsoft Endpoint Manager admin center
For more information, see Microsoft Endpoint Manager tenant attach: Prerequisites.
Renamed Co -management node to Cloud Attach
To better reflect the other cloud services that Configuration Manager offers, the Co-management node has
been renamed to the Cloud Attach node. Other changes you may notice include the ribbon button being
renamed from Configure Co-management to Configure Cloud Attach and the Co-management
Configuration Wizard was renamed to Cloud Attach Configuration Wizard .
For more information, see Co-management, Tenant attach, and Endpoint analytics.
Desktop Analytics
Support for the Windows diagnostic data processor configuration
Desktop Analytics now supports the new Windows diagnostic data processor configuration. This configuration
provides you greater control of your Windows diagnostic data. Microsoft acts as a data processor, processing
Windows diagnostic data for the controller.
For more information, see What's new in Desktop Analytics.
Site infrastructure
Support for Windows Server 2022 and the ADK for Windows 11
Configuration Manager now supports Windows Server 2022 as site systems and clients. For more information,
see the following articles:
Supported operating systems for site system servers
Supported OS versions for clients
Upgrade on-premises infrastructure
It also supports the Windows ADK for Windows 11 and Server 2022. For more information, see Support for
Windows ADK.
TIP
Configuration Manager supports Windows Insider builds, which is a great way to test the latest version of Windows 11
with Configuration Manager version 2107.
Real-time management
Simplified CMPivot permissions requirements
We've simplified the CMPivot permissions requirements. The new permissions are applicable for CMPivot
standalone and CMPivot in the on-premises console. The following changes have been made:
CMPivot no longer requires SMS Scripts read permission
The SMS Provider still requires this permission if the administration service falls back to it because of
a 503 (Service Unavailable) error, as seen in the CMPivot.log.
The default scope permission isn't required.
For more information, see permissions for CMPivot.
Improvements to CMPivot
We've made the following improvements to CMPivot:
Added a Key value to the Registry entity
Added a new RegistryKey entity that returns all registry keys matching the given expression
Added maxif and minif aggregators that can be used with the summarize operator
Improvements to query autocomplete suggestions in the query editor
For more information, see Changes to CMPivot and CMPivot overview.
Client management
Support for Windows 11
Starting with version 2107, Configuration Manager supports Windows 11. For more information, see Support
for Windows 11.
Custom properties for devices
Many customers have other data that's external to Configuration Manager but useful for deployment targeting,
collection building, and reporting. This data is typically non-technical in nature, not discoverable on the client,
and comes from a single external source. For example, a central IT Infrastructure Library (ITIL) system or asset
database, which has some of the following device attributes:
Physical location
Organizational priority
Category
Cost center
Department
You can use the administration service to set this data on devices. The site stores the property's name and its
value in the site database as the new Device Custom Proper ties class. You can then use the custom
properties in Configuration Manager for reporting or to create collections.
For more information, see Custom properties for devices.
Client encryption uses AES -256
Starting in this release, when you enable the site to Use encr yption , the client uses the AES-256 algorithm.
This setting requires clients to encrypt inventory data and state messages before it sends to the management
point.
For more information, see Cryptographic controls technical reference.
Clients store Configuration Manager self-signed certificates in hardware TPM
Configuration Manager uses self-signed certificates for client identity and to help protect communication
between the client and site systems. When you update the site and clients to version 2107, the client stores its
certificate from the site in a hardware-bound key storage provider (KSP). This KSP is typically the trusted
platform module (TPM). The certificate is also marked non-exportable.
If the client also has a PKI-based certificate, it continues to use that certificate for TLS HTTPS communication. It
uses its self-signed certificate for signing messages with the site.
For more information, see Certificates overview.
Hardware inventory for client log settings
You can now inventory client log file settings such as log levels and size. This behavior allows you to track
settings that you change by the Client Diagnostics actions. This new inventory class isn't enabled by default.
For more information, see About log files.
Support for macOS Big Sur
Configuration Manager now supports the macOS Big Sur version 11. For more information, see Supported OS
versions for clients and devices.
Software Center
Support for enhanced HTTP
When you enable the site for enhanced HTTP, Software Center and the Company Portal now prefer secure
communication over HTTPS to get user-available applications from the management point.
For more information, see Plan for Software Center and Use the Company Portal app on co-managed devices.
Application management
Implicit uninstall of applications
Many customers have lots of collections because for every application they need at least two collections: one for
install and another for uninstall. This practice adds overhead of managing more collections, and can reduce site
performance for collection evaluation.
Starting in this release, you can enable an application deployment to support implicit uninstall. If a device is in a
collection, the application installs. Then when you remove the device from the collection, the application
uninstalls.
For more information, see Uninstall applications.
OS deployment
Support layered keyboard driver during OS deployment
This release adds support for layered keyboard drivers during OS deployment. This driver specifies other types
of keyboards that are common with Japanese and Korean languages.
For more information, see Task sequence steps - Apply OS Image.
Protection
Audit mode for potentially unwanted applications
An Audit option for potentially unwanted applications (PUA) was added in the Antimalware policy settings.
Use PUA protection in audit mode to detect potentially unwanted applications without blocking them. PUA
protection in audit mode is useful if your company is conducting an internal software security compliance check
and you'd like to avoid any false positives.
For more information, see real-time protection settings.
Software updates
Run software updates evaluation from deployment status
You can now right-click and notify devices to run a software updates evaluation cycle from the software update
deployment status. You can target a single device under the Asset Details pane or select a group of devices
based on their deployment status.
For more information, see Configuration Manager console changes and tips.
Management insights rule for TLS/SSL software update points
Management insights has a new rule to detect if your software update points are configured to use TLS/SSL. To
review the Configure software update points to use TLS/SSL rule, go to Administration >
Management Insights > All Insights > Software Updates .
For more information, see the Management insights software updates group.
List third-party update catalogs
To help you find custom catalogs that you can import for third-party software updates, there's now a
documentation page with links to catalog providers. Choose More Catalogs from the ribbon in the Third-
par ty software update catalogs node. Right-clicking on Third-Par ty Software Update Catalogs node
also displays a More Catalogs menu item. Selecting More Catalogs opens a link to a documentation page
containing a list of third-party software update catalog providers.
For more information, see Third-party software updates and list of third-party software update catalog
providers.
Improvements for managing automatic deployment rules
The following items were added to help you better manage your automatic deployment rules (ADRs):
Deployment types for automatic deployment rules
You can now specify the deployment type for the software update deployment created by an ADR. Select
Required to create a mandatory software update deployment or select Available to create an optional
software update deployment.
For more information, see Create an automatic deployment rule.
Updated Product parameter for New-CMSoftwareUpdateAutoDeploymentRule cmdlet
The -Product parameter for New-CMSoftwareUpdateAutoDeploymentRule was updated. When there are multiple
products with the same name, -Product now selects all of them.
Script to apply deployment package settings for automatic deployment rule
If you create an ADR with the No deployment package option, you're unable to go back and add one later. To
help you resolve this issue, we've uploaded a script into Community hub.
For more information, see Automatic deployment rules.
Community hub
Publish query to Community hub from CMPivot
You can now publish a CMPivot query to the Community hub directly from the CMPivot window. Submitting
your queries directly through CMPivot makes contributing to the Community hub easier.
For more information, see Contribute to Community hub and CMPivot.
Support for console extensions in Community hub
When you use Configuration Manager version 2103 or later, you can now download console extensions from
the Community hub and have it applied to all consoles connected to a hierarchy. Manage the approval and
installation of console extensions used in your environment from the Console extensions node.
For more information, see Console extensions from Community hub.
Tools
Improvements to Support Center
Starting in this release, the Content view in the Suppor t Center Client Tools has been renamed to
Deployments . From Deployments , you can review all of the deployments currently targeted to the device. The
new view is grouped by Categor y and Status . The view can be sorted and filtered to help you find the
deployments you're interested in. Select a deployment in the results pane to display more information in the
details pane.
For more information, see Support Center Client Tools user interface reference.
Improvements to CMTrace
This release includes multiple performance improvements to the CMTrace log viewer. If you have a copy of
CMTrace in a non-default location, consider removing it and using a copy in one of the default paths. If it's in a
custom location that meets your business requirements, then make sure you have a process to keep it up to
date. A script is available in the Community Hub to help you locate and update versions of CMTrace to the latest
version.
For more information, see CMTrace.
RBAViewer location change
RBAViewer has moved from <installdir>\tools\servertools\rbaviewer.exe . It's now located in the Configuration
Manager console directory. After you install the console, RBAViewer.exe will be in the same directory. The default
location is C:\Program Files (x86)\Microsoft Endpoint Manager\AdminConsole\bin\rbaviewer.exe .
For more information, see Configuration Manager tools.
Deprecated features
Learn about support changes before they're implemented in removed and deprecated items.
The cloud-based distribution point (CDP) is deprecated. Starting in version 2107, you can't create new
CDP instances. To provide content to internet-based devices, enable the CMG to distribute content.
The support lifecycle for SQL Server 2012 ends on July 12, 2022. Plan to upgrade database servers in
your environment, including SQL Server Express at secondary sites.
As previously announced, version 2107 drops support for the following features:
Log Analytics connector for Azure Monitor. This feature was called the OMS Connector in the Azure Services
node.
Other updates
Starting with this version, the following features are no longer pre-release:
Cloud management gateway (CMG) with virtual machine scale set
For more information on changes to the Windows PowerShell cmdlets for Configuration Manager, see version
2107 release notes.
Aside from new features, this release also includes other changes such as bug fixes. For more information, see
Summary of changes in Configuration Manager current branch, version 2107.
The following update rollup (11121541) is available in the console starting on October 27, 2021: Update rollup
for Configuration Manager current branch, version 2107.
Hotfixes
The following additional hotfixes are available to address specific issues:
ID T IT L E DAT E IN - C O N SO L E
Next steps
As of August 23, 2021, version 2107 is globally available for all customers to install.
When you're ready to install this version, see Installing updates for Configuration Manager and Checklist for
installing update 2107.
TIP
To install a new site, use a baseline version of Configuration Manager.
Learn more about:
Installing new sites
Baseline and update versions
NOTE
To better align with other releases within Microsoft Endpoint Manager, starting this year the current branch version
names will be 2103, 2107, and 2111. They will still release every four months, and release at the same time of the year.
Always review the latest checklist for installing this update. For more information, see Checklist for installing
update 2103. After you update a site, also review the Post-update checklist.
To take full advantage of new Configuration Manager features, after you update the site, also update clients to
the latest version. While new functionality appears in the Configuration Manager console when you update the
site and console, the complete scenario isn't functional until the client version is also the latest.
Site infrastructure
New prerequisite checks
When you install or update to version 2103, there are several new warning prerequisite checks.
Enable the site for HTTPS-only or enhanced HTTP
If your site is configured to allow HTTP communication without enhanced HTTP, you'll see this warning. To
improve the security of client communications, in the future Configuration Manager will require HTTPS
communication or enhanced HTTP. Plan to configure the site for HTTPS only or to Use Configuration
Manager-generated cer tificates for HTTP site systems . For more information, see the description of this
prerequisite check.
Deprecated Azure Monitor connector
We continue to see broad adoption of native Azure Monitor log query groups as customers shift more of their
workloads to the cloud. Because of this reason, starting in November 2020, the Configuration Manager feature
to synchronize collections to Azure Monitor was deprecated.
When you update to this release, this check warns about the presence of the Log Analytics connector for Azure
Monitor. (This feature is called the OMS Connector in the Azure Services wizard.) This connector is deprecated,
and will be removed from the product in a future release. At that time, this check will be an error that blocks
upgrade.
SQL Server Express version
If you have a secondary site that uses SQL Server Express edition, this check warns if the version is earlier than
SQL Server 2016 with service pack 2 (13.0.5026.0).
Microsoft recommends that you keep SQL Server Express up to date. For more information, see Security for site
administration.
Allow exclusion of organizational units (OU ) from Active Directory User Discovery
You can now exclude OUs from Active Directory User Discovery.
Collections
Improvements to the collection relationships viewer
Starting in version 2010, you can view dependency relationships between collections in a graphical format. The
relationships for a collection were presented as two hierarchical trees, one for dependents and the other for
dependencies. In this release, you can view both parent and child relationships together in a single graph. This
change allows you to quickly see an overview of all the relationships of a collection at once and then drill down
into specific related collections. It also includes other filtering and navigation improvements.
For more information, see Manage collections: View collection relationships.
Improvements to query preview
You now have more options when using the collection query preview. The following improvements have been
made to previewing collection queries:
Limit the number of rows returned
Your limit can be between 1 to 10,000 rows. The default is 5000 rows.
Omit duplicate rows from the result set
If the Omit duplicate rows option isn't selected, the original query statement will be executed as is,
even if the query contains the word distinct .
When the Omit duplicate rows option is selected, if the query already contains the word distinct ,
then the query runs as it is. When the query doesn't contain the word distinct , it's added to the query
for the preview (mean override).
Review statistics for the query preview such as number of rows returned and elapsed time.
For more information, see How to create collections.
Improvements to collection evaluation view
The following improvements were made to the collection evaluation view:
The central administration site (CAS) now displays a summary of collection evaluation status for all the
primary sites in the hierarchy
Drill through from collection evaluation status queue to a collection
Copy text to the clipboard from the collection evaluation page
Configure the refresh interval for the collection evaluation statistics page
For more information, see How to view collection evaluation.
Software Center
Change foreground color for Software Center branding
Software Center already provides various controls for you to customize the branding to support your
organization's brand. For some customers, their brand color doesn't work well with the default white font color
for a selected item. To better support these customers and improve accessibility, you can now configure a
custom color for the foreground font.
For more information, see About client settings - Software Center.
Improved user experience and security with Software Center custom tabs
Since current branch version 1906, you can add up to five custom tabs to Software Center. These custom tabs let
you give your users easy access to common web apps and other sites. Previously, to display websites Software
Center used the Windows built-in Internet Explorer browser control.
Starting in this release, Software Center can now use the Microsoft Edge WebView2 browser control. The
WebView2 browser control provides improved security and user experience. For example, more websites should
work with these custom tabs without displaying script errors or security warnings.
For more information, see About client settings - Software Center.
Application management
Disable application deployments
You can now disable application deployments. Other objects already have similar behaviors:
Software update deployments: Disable the deployment
Phased deployments: Suspend the phase
Package: Disable the program
Task sequence: Disable the task sequence
Configuration baseline: Disable the baseline
For device-based deployments, when you disable the deployment or object, use the client notification action to
Download Computer Policy . This action immediately tells the client to update its policy from the site. If the
deployment hasn't already started, the client receives the updated policy that the object is now disabled.
For more information, see Disable and delete application deployments.
OS deployment
Windows 10 Servicing dashboard changes
We've simplified the Windows 10 Servicing dashboard to make it more relevant. The new Quality Update
Versions chart displays the top five revisions of Windows 10 across your devices. The Latest Feature Update
chart shows the number of devices that installed the latest feature update. The Windows 10 Usage chart,
showing the distribution of Windows 10 major releases, was renamed to Feature Update Versions . Servicing
plan and Windows 10 ring information were removed from the dashboard.
For more information, see Windows 10 servicing dashboard.
Deploy a feature update with a task sequence
You can now upgrade a client's Windows OS by using a feature update deployed with a task sequence. This
integration combines the simplicity of Windows servicing with the flexibility of task sequences. Servicing uses
content that you synchronize through the software update point. This process simplifies the need to manually
get, import, and maintain the Windows image content used with a standard task sequence to upgrade Windows.
The size of the servicing ESD file is generally smaller than the OS upgrade package and WIM image file. You can
also use Windows features such as Dynamic Update and Delivery Optimization.
This type of task sequence extends support to Windows 10 on ARM64 devices.
For more information, see the following articles:
For scenario guidance and planning, see Upgrade Windows to the latest version.
For prerequisites, see Create a task sequence to upgrade an OS.
For the new setting on the task sequence step, see About task sequence steps: Upgrade OS.
Task sequence error shows more check readiness details
The task sequence progress can now display more information about readiness checks. If a task sequence fails
because the client doesn't meet the requirements configured in the Check readiness task sequence step, the
user can now see more details about the failed prerequisites.
IMPORTANT
If you have any active user state migrations, before you update the Configuration Manager client on those devices,
restore the user state. Otherwise, the updated client will fail to restore the user state when it tries to use a different
encryption algorithm.
Protection
Improvements to BitLocker management
In current branch version 2010, you can manage BitLocker policies and escrow recovery keys over a cloud
management gateway (CMG). This support included a couple of limitations.
Starting in this release, BitLocker management policies over a CMG support the following capabilities:
Recovery keys for removable drives
TPM password hash, otherwise known as TPM owner authorization
For more information on BitLocker management over CMG, see Deploy BitLocker management.
This release also provides support for the following features:
Enhanced HTTP
The recovery service on management points that use a database replica.
For more information, see Plan for BitLocker management.
Software updates
Approved scripts for orchestration groups
You can now select from scripts that have already been approved when configuring pre and post-scripts for an
orchestration group. When in the Create Orchestration Group Wizard , you'll see a new page called Script
Picker . Select your pre and post scripts from your list of scripts that are already approved. You can still add
scripts manually on the pre and post-script pages. Additionally, you can also edit scripts that you pre-populated
from the Script Picker .
For more information, see Orchestration groups.
Change default maximum run time for software updates
Configuration Manager sets the following maximum run time for these categories of software updates:
Feature updates for Windows : 120 minutes
Non-feature updates for Windows : 60 minutes
Updates for Microsoft 365 Apps (Office 365 updates): 60 minutes
All other software updates outside these categories, such as third-party updates, were given a maximum run
time of 10 minutes. Starting in Configuration Manager 2103, the default maximum run time for these updates is
60 minutes rather than 10 minutes. The new maximum run time will only apply to new updates that are
synchronized from Microsoft Update. It doesn't change the run time on existing updates.
For more information, see Plan for software updates.
TLS certificate pinning for devices scanning HTTPS -configured WSUS servers
Further increase the security of HTTPS scans against WSUS by enforcing certificate pinning. To fully enable this
behavior:
Ensure your software update points are configured to use TLS/SSL
Add the certificates for your WSUS servers to the new WindowsServerUpdateServices certificate store on your
clients
Verify the Enforce TLS cer tificate pinning for Windows Update client for detecting updates
software updates client setting is set to Yes (default).
For more information, see Configure a software update point to use TLS/SSL with a PKI certificate and Client
settings for software updates.
Community hub
Download Power BI report templates from Community hub
Community hub now supports contributing and downloading Power BI report template files. This integration
allows administrators to easily share and reuse Power BI reports. Contributing and downloading Power BI report
template is also available for current branch versions of Configuration Manager.
For more information, see Power BI report templates in Community hub and Using Community hub.
Download configuration items and configuration baselines from Community hub
You can now download configuration items and configuration baselines from Community hub.
For more information, see Using Community hub.
Access the top queries shared in the Community hub from CMPivot
You can now access the top CMPivot queries shared in the Community hub from on-premises CMPivot. By
leveraging pre-created CMPivot queries shared by the broader community, CMPivot users gain access to a
wider variety of queries. On-premises CMPivot accesses the Community hub and returns a list of the top
downloaded CMPivot queries. Users can review the top queries, customize them, and then run on-demand. This
improvement gives a wider selection of queries for immediate usage without having to construct them and also
allows information sharing on how to build queries for future reference.
For more information, see Changes to CMPivot in version 2103.
PowerShell
Starting in version 2103, the ConfigurationManager PowerShell module requires Microsoft .NET version 4.7.2 or
later.
Known issue with updateable PowerShell help
Starting in version 2010, you could use the Update-Help cmdlet to download the latest information for the
Configuration Manager PowerShell module.
Because of a change in how the updateable content is structured and published with the release of version 2103,
don't use Update-Help on a version 2010 site. Update the site to version 2103, and then update the local help
content.
The cmdlet will successfully download content on a version 2010 console, but Get-Help will only return default
usage information. Before the release of version 2103, if you used Update-Help with a version 2010 site, you
can continue to use Get-Help now.
For more information, see PowerShell version 2103 release notes.
Deprecated features
Learn about support changes before they're implemented in removed and deprecated items.
The following features are now deprecated:
Microsoft Edge legacy browser profiles. For more information, see New Microsoft Edge to replace
Microsoft Edge Legacy with April’s Windows 10 Update Tuesday release
The following compliance settings for Company resource access :
Certificate profiles
VPN profiles
Wi-Fi profiles
Windows Hello for Business settings
Email profiles
This deprecation includes the co-management resource access workload. Use Microsoft Intune to deploy
resource access profiles.
Sites that allow HTTP client communication. Configure the site for HTTPS or Enhanced HTTP. For more
information, see Enable the site for HTTPS-only or enhanced HTTP.
Other updates
Starting with this version, the following features are no longer pre-release:
Remove the central administration site
For more information on changes to the Windows PowerShell cmdlets for Configuration Manager, see version
2103 release notes.
Aside from new features, this release also includes additional changes such as bug fixes. For more information,
see Summary of changes in Configuration Manager current branch, version 2103.
The following update rollup (10036164) is available in the console starting on June 11, 2021: Update rollup for
Configuration Manager current branch, version 2103.
Hotfixes
The following additional hotfixes are available to address specific issues:
ID T IT L E DAT E IN - C O N SO L E
Next steps
As of April 19, 2021, version 2103 is globally available for all customers to install.
When you're ready to install this version, see Installing updates for Configuration Manager and Checklist for
installing update 2103.
TIP
To install a new site, use a baseline version of Configuration Manager.
Learn more about:
Installing new sites
Baseline and update versions
Cloud-attached management
Cloud management gateway with virtual machine scale set for CSP
Cloud management gateway (CMG) deployments can now use a virtual machine scale set in Azure to support
Cloud Solution Provider (CSP) subscriptions. This feature is currently pre-release. At this time, it's intended only
for CSP customers that don't already have a CMG in another subscription.
For more information, see CMG topology design: virtual machine scale sets.
Disable Azure AD authentication for onboarded tenants
You can now disable Azure Active Directory (Azure AD) authentication for tenants not associated with users and
devices. When you onboard Configuration Manager to Azure AD, it allows the site and clients to use modern
authentication. Currently, Azure AD device authentication is enabled for all onboarded tenants, whether or not it
has devices. For example, you have a separate tenant with a subscription that you use for compute resources to
support a cloud management gateway. If there aren't users or devices associated with the tenant, disable Azure
AD authentication.
For more information, see Configure Azure services.
Validate internet access for the service connection point
If you use Desktop Analytics or tenant attach, the service connection point now checks important internet
endpoints. These checks help make sure that the cloud-connected services are available. It also helps you
troubleshoot issues by quickly determining if network connectivity is a problem.
For more information, see About the service connection point.
Desktop Analytics
For more information on the monthly changes to the Desktop Analytics cloud service, see What's new in
Desktop Analytics.
Support for new Windows 10 diagnostic data levels
Microsoft is increasing transparency by categorizing the diagnostic data that Windows 10 collects:
Basic diagnostic data is recategorized as Required
Full is recategorized as Optional
If you previously configured devices for Enhanced or Enhanced (Limited) , in an upcoming release of
Windows 10, they'll use the Required level. This change may impact the functionality of Desktop Analytics.
For more information, see Enable data sharing.
Support for Windows 10 Enterprise LTSC 2019
The Windows 10 long-term servicing channel (LTSC) was designed for devices where functionality and features
don't change over time. This servicing model prevents Windows 10 Enterprise LTSC devices from receiving the
usual feature updates. It provides only quality updates to make sure that device security stays up to date. Some
customers want to shift from LTSC to the semi-annual servicing channel, to have access to new features,
services, and other major changes. You can now use Configuration Manager to enroll LTSC devices to Desktop
Analytics. Once you enroll these devices, you can evaluate them in your deployment plans.
For more information, see Desktop Analytics prerequisites
Site infrastructure
Monitor scenario health
You can now use Configuration Manager to monitor the health of end-to-end scenarios. Monitoring scenario
health enhances awareness of system latency and component backlogs which are critical for cloud service-
attached features. Configuration Manager simulates activities to expose performance metrics and failure points.
These synthetic activities are similar to methods that Microsoft uses to monitor some components in its cloud
services. Use this additional data to better understand timeframes for activities. If failures occur, it can help focus
your investigation.
This release includes the following two scenarios:
SQL Ser ver Ser vice Broker : The service broker is a required configuration for the site database. Many
of the core subsystems in Configuration Manager use the service broker.
Client action health : Monitor the health of the fast channel used for client actions. If your environment
is tenant attached with devices uploaded, this feature helps you see potential issues with client actions
from the Microsoft Endpoint Manager admin center. You can also use this feature for on-premises client
actions. For example, CMPivot, run scripts, and device wake-up.
For more information, see Monitor scenario health.
Report setup and upgrade failures to Microsoft
If the setup or update process fails to complete successfully, you can now report the error directly to Microsoft. If
a failure occurs, the Repor t update error to Microsoft button is enabled. When you use the button, an
interactive wizard opens allowing you to provide more information to us. In technical previews, this button is
always enabled even when the setup completes successfully.
For more information, see Install in-console updates.
Delete Aged Collected Diagnostic Files task
You now have a new maintenance task available for cleaning up collected diagnostic files. Delete Aged
Collected Diagnostic Files uses a default value of 14 days when it looks for diagnostic files to clean up. This
task doesn't affect regular collected files. The new maintenance task is enabled by default.
For more information, see the following articles:
Client diagnostic section of the Client notification article
Reference for maintenance tasks in Configuration Manager.
Improvements to the administration service
The Configuration Manager REST API, the administration service, requires a secure HTTPS connection. With the
previous methods to enable HTTPS, enabling IIS on the SMS Provider was a prerequisite.
Starting in this release, you no longer need to enable IIS on the SMS Provider for the administration service.
When you enable the site for enhanced HTTP, it creates a self-signed certificate for the SMS Provider, and
automatically binds it without requiring IIS.
For more information, see Prerequisites for the administration service.
Improvements to the Azure migration tool
The tool to extend and migrate an on-premises site to Microsoft Azure now includes the following
improvements:
Support environments with virtual networks other than ExpressRoute
Support a hierarchy
Support a site with a collocated site database
For more information, see Extend and migrate on-premises site to Microsoft Azure.
Client management
Wake machine at deployment deadline using peer clients on the same remote subnet
Wake on LAN (WoL) has always posed a problem in complex, subnetted networks. Good networking best
practice reduces the size of broadcast domains to mitigate against the risk of broadcast traffic adversely
affecting the network. The most common way to limiting network broadcast is by not allowing broadcast
packets to be routed between subnets. Another option is to enable subnet directed broadcasts but most
organizations don't allow the magic packet to traverse internal routers.
In version 1810, the introduction of peer wake-up allowed an administrator to wake a device or collection of
devices, on demand using the client notification channel. Overcoming the need for the server to be in the same
broadcast domain as the client.
This latest improvement allows the Configuration Manager site to wake devices at the deadline of a deployment.
Instead of the site server issuing the magic packet directly, the site uses the client notification channel. It finds an
online machine in the last known subnet of the target device. It then instructs the online client to issue the WoL
packet for the target device.
For more information, see How to configure Wake on LAN.
Improved Windows Server restart experience for non-administrator accounts
For a low-rights user on a device that runs Windows Server, by default they aren't assigned the user rights to
restart Windows. When you target a deployment to this device, this user can't manually restart. For example,
they can't restart Windows to install software updates.
Starting in this release, you can now control this behavior as needed. In the Computer Restar t group of client
settings, enable the following setting: When a deployment requires a restar t, allow low-rights users to
restar t a device running Windows Ser ver .
For more information, see Device restart notifications: Client settings.
Collections
Collection query preview
You can now preview the query results when you're creating or editing a query for collection membership.
Preview the query results from the query statement properties dialog. When you select Edit Quer y
Statement , select the green triangle on the query properties for the collection to show the Quer y Results
Preview window. Select Stop if you want to stop a long running query.
For more information, see Configure a query rule.
Collection evaluation view
We've integrated the functionality of Collection Evaluation Viewer into the Configuration Manager console. This
change provides administrators a central location to view and troubleshoot the collection evaluation process.
For more information, see Collection evaluation view.
View collection relationships
You can now view dependency relationships between collections in a graphical format. It shows limiting, include,
and exclude relationships.
If you want to change or delete collections, view the relationships to understand the impact of the proposed
change. Before you create a deployment, look at the potential target collection for any include or exclude
relationships that might affect the deployment.
For more information, see How to manage collections.
Application management
Improvements to available apps via CMG
An internet-based, domain-joined device that isn't joined to Azure Active Directory (Azure AD) and
communicates via a cloud management gateway (CMG) can now get apps deployed as available. The Active
Directory domain user of the device needs a matching Azure AD identity. When the user starts Software Center,
Windows prompts them to enter their Azure AD credentials. They can then see any available apps.
For more information, see Prerequisites to deploy user-available applications.
OS deployment
Deploy an OS over CMG using bootable media
Starting in current branch version 2006, the cloud management gateway (CMG) supported running a task
sequence with a boot image when you start it from Software Center. With this release, you can now use
bootable media to reimage internet-based devices that connect through a CMG. This scenario helps you better
support remote workers. If Windows won't start so that the user can access Software Center, you can now send
them a USB drive to reinstall Windows.
For more information on this scenario and other related scenarios, see the new article to Deploy a task sequence
over the internet.
Deploy a task sequence deployment type to a user collection
You can now deploy an application with a task sequence deployment type to a user-based collection. A user-
targeted deployment still runs in the context of the local System account.
For more information, see Task sequence deployment type.
Manage task sequence size
Large task sequences cause problems with client processing. To further help manage the size of task sequences,
this release continues to iterate on improvements.
Starting in this release Configuration Manager restricts actions for a task sequence that's greater than 2
MB in size. For example, the task sequence editor will display an error if you try to save changes to a large
task sequence.
When you view the list of task sequences in the Configuration Manager console, add the Size (KB)
column. Use this column to identify large task sequences that can cause problems.
For more information, see Reduce the size of task sequence policy.
Analyze SetupDiag errors for feature updates
With the release of Windows 10, version 2004, the SetupDiag diagnostic tool is included with Windows Setup. If
there's an issue with the upgrade, SetupDiag automatically runs to determine the cause of the failure.
Configuration Manager now gathers and summarizes SetupDiag results from feature update deployments with
Windows 10 servicing.
For more information, see Manage Windows as a service.
Improvements to task sequence performance settings
Starting in Configuration Manager version 1910, to improve the overall speed of the task sequence, you could
activate the Windows power plan for High Performance . Starting in this release, you can now use this option
on devices with modern standby and other devices that don't have that default power plan.
For more information, see Performance improvements for power plans.
Protection
Improvements to BitLocker management
You can now manage BitLocker policies and escrow recovery keys over a cloud management gateway (CMG).
This change also provides support for BitLocker management via internet-based client management (IBCM).
There's no change to the setup process for BitLocker management. This improvement supports domain-joined
and hybrid domain-joined devices.
For more information, see Plan for BitLocker management.
Expanded Windows Defender Application Control management
Windows Defender Application Control enforces an explicit list of software allowed to run on devices. In this
release, we've expanded Windows Defender Application Control policies to support devices running Windows
Server 2019 or later.
For more information, see Windows Defender Application Control management with Configuration Manager.
Software updates
Enable user proxy for software update scans
Beginning with the September 2020 cumulative update, HTTP-based WSUS servers will be secure by default. By
default, a client that scans for updates against an HTTP-based WSUS can't use a user proxy. If you still require a
user proxy despite the security trade-offs, a new software updates client setting is available to allow these
connections. For more information about the changes for scanning WSUS, see September 2020 changes to
improve security for Windows devices scanning WSUS. To make sure that the best security protocols are in
place, use the TLS protocol. This protocol helps to secure your software update infrastructure.
For more information about enabling a proxy for software update scans, see Client settings for software
updates.
Notifications for devices no longer receiving updates
To help you manage security risk in your environment, you'll be notified in-console about devices with operating
systems that are past the end of support date. These devices may no longer receive security updates.
Additionally, a new Management Insights rule was added to detect Windows 7, Windows Server 2008, and
Windows Server 2008 R2 without Extended Security Updates (ESU).
For more information, see Management insights and Console notifications.
Immediate distribution point fallback for clients downloading software update delta content
There's a new client setting for software updates. If delta content is unavailable from distribution points in the
current boundary group, you can allow immediate fallback to a neighbor or the site default boundary group
distribution points. This setting is useful when using delta content for software updates since the timeout setting
per download job is five minutes.
For more information, see Client settings for software updates.
There's also a new status message query, Feedback sent to Microsoft . Use this query to easily find feedback
status messages.
For more information, see Product feedback.
Improvements to in-console notifications
You now have an updated look and feel for in-console notifications. Notifications are more readable and the
action link is easier to find. Additionally, the age of the notification is displayed to help you find the latest
information. If you dismiss or snooze a notification, that action is now persistent for your user across consoles.
For more information, see Improvements to Configuration Manager console notifications.
Improvements to the Configuration Manager console
You can now copy discovery data from devices and users in the console. Copy the details to the clipboard,
or export them all to a file. These new actions make it easier for you to quickly get this data from the
console. For example, copy the MAC address of a device before you reimage it.
Various areas in the Configuration Manager console now use the fixed-width font Consolas. This font
provides consistent spacing and makes it easier to read.
You now have an easier way to view status messages for objects. Select an object in the Configuration
Manager console, and then select Show Status Messages from the ribbon.
Now when you import an object in the Configuration Manager console, it imports to the current folder.
Previously, Configuration Manager always put imported objects in the root node. This new behavior
applies to applications, packages, driver packages, and task sequences.
To assist you when creating scripts and queries in the Configuration Manager console, you'll now see
syntax highlighting and code folding, where available.
For more information, see Configuration Manager console changes and tips.
Content management
Improvements to client data sources dashboard
The client data sources dashboard now offers an expanded selection of filters to view information about where
clients get content. These new filters include:
Single boundary group
All boundary groups
Internet clients
Clients not associated with a boundary group
The dashboard also includes a new tile for Content downloads using fallback source . This information
helps you understand how often clients download content from an alternate source.
For more information, see Monitor content: Client Data Sources dashboard.
Improvements to the content library cleanup tool
If you remove content from a distribution point while the site system is offline, an orphaned record can exist in
WMI. Over time, this behavior can eventually lead to a warning status on the distribution point. To mitigate the
issue in the past, you had to manually remove the orphaned entries from WMI. The content library cleanup tool
in delete mode can now remove these orphaned content records from WMI.
For more information, see the Content library cleanup tool.
PowerShell
Update PowerShell help
You can now use the Update-Help cmdlet to get the latest information for the Configuration Manager
PowerShell module. This content is the same as what's published on docs.microsoft.com for the
ConfigurationManager module.
For more information, see Configuration Manager PowerShell cmdlets: Update help.
WARNING
Because of a change in how the updateable content is structured and published with the release of version 2103, don't
use Update-Help on a version 2010 site. Update the site to version 2103, and then update the local help content.
For more information, see PowerShell version 2103 release notes.
Deprecated features
Learn about support changes before they're implemented in removed and deprecated items.
The following features are now deprecated:
The collection evaluation viewer
Connector for Azure Monitor
Other updates
For more information on changes to the Windows PowerShell cmdlets for Configuration Manager, see version
2010 release notes.
Aside from new features, this release also includes additional changes such as bug fixes. For more information,
see Summary of changes in Configuration Manager current branch, version 2010.
Hotfixes
The following additional hotfixes are available to address specific issues:
ID T IT L E DAT E IN - C O N SO L E
Next steps
As of December 11, 2020, version 2010 is globally available for all customers to install.
When you're ready to install this version, see Installing updates for Configuration Manager and Checklist for
installing update 2010.
TIP
To install a new site, use a baseline version of Configuration Manager.
Learn more about:
Installing new sites
Baseline and update versions
Endpoint analytics
Endpoint analytics data collection enabled by default
The Enable Endpoint analytics data collection client setting is now enabled by default. This setting allows
your managed endpoints to send data, such as startup performance insights, to your Configuration Manager
site server. This change affects local data collection only. Endpoint analytics data isn't uploaded to the Microsoft
Endpoint Manager admin center until you enable data upload in Configuration Manager. The new default value
applies to the default client settings and any custom client settings created after upgrading to version 2006.
If you're upgrading from version 2002 to version 2006, existing custom client settings values are retained.
The default value for Enable Endpoint analytics data collection in Configuration Manager version 2002
is No .
If you're upgrading to version 2006 from Configuration Manager version 1910 or prior, any pre-existing
custom client settings that contain the Computer Agent group of settings inherits the new default of Yes
for Enable Endpoint analytics data collection .
For more information, see Configure Endpoint analytics data collection in Configuration Manager.
Site infrastructure
VPN boundary type
To simplify managing remote clients, you can now create a new boundary type for VPNs. Previously, you had to
create boundaries for VPN clients based on the IP address or subnet. This configuration could be challenging or
not possible because of the subnet configuration or the VPN design.
Now when a client sends a location request, it includes additional information about its network configuration.
Based on this information, the server determines whether the client is on a VPN.
For more information, see Define boundaries.
Management insights to optimize for remote workers
This release adds a new group of management insights, Optimize for remote workers . These insights help
you create better experiences for remote workers and reduce load on your infrastructure. The insights in this
release primarily focus on VPN:
Define VPN boundar y groups
Configure VPN connected clients to prefer cloud based content sources
Disable peer to peer content sharing for VPN connected clients
For more information, see Management insights.
Improved support for Azure Virtual Desktop
The Windows 10 Enterprise multi-session platform is available in the list of supported OS versions on
objects with requirement rules or applicability lists.
For more information on Configuration Manager's support for Azure Virtual Desktop, see Supported OS
versions for clients and devices.
Intranet clients can use a CMG software update point
Intranet clients can now access a CMG software update point when it's assigned to a boundary group. For more
information, see Configure boundary groups.
Cloud-attached management
Use the Company Portal app on co -managed devices
The Company Portal is now the cross-platform app portal experience for Microsoft Endpoint Manager. By
configuring co-managed devices to also use the Company Portal, you can provide a consistent user experience
on all devices.
For more information, see Use the Company Portal app on co-managed devices.
Use Microsoft Azure China 21Vianet for co -management
You can now select the Azure China Cloud as your Azure environment when enabling co-management. For
more information, see How to enable co-management.
Notification for Azure AD app secret key expiration
If you configure Azure services to cloud-attach your site, the Configuration Manager console now displays
notifications for the following circumstances:
One or more Azure AD app secret keys will expire soon
One or more Azure AD app secret keys have expired
For more information, see Renew secret key.
Desktop Analytics
For more information on the monthly changes to the Desktop Analytics cloud service, see What's new in
Desktop Analytics.
Change to diagnostic data labels
To better align with the Desktop Analytics requirements for Windows diagnostic data, these settings have new
labels:
Required Basic
N/A Enhanced
Optional Full
If you previously configured any devices at the Enhanced level, when you upgrade to version 2006, they'll
revert to Optional (limited) . They will then send less data to Microsoft. This change shouldn't impact what you
see in Desktop Analytics.
For more information, see Enable data sharing for Desktop Analytics.
Real-time management
Improvements to CMPivot
The following improvements have been made in CMPivot:
CMPivot from the console and CMPivot standalone have been converged
Run CMPivot from an individual device or multiple devices without having to select or create a collection
From CMPivot query results, you can select an individual device or multiple devices then launch a separate
CMPivot instance scoped to your selection.
For more information, see CMPivot starting in version 2006.
Client management
Install and upgrade the client on a metered connection
Previously, if the device was connected to a metered network, new clients wouldn't install. Existing clients only
upgraded if you allowed all client communication. For devices that are frequently roaming on a metered
network, they would be unmanaged or on an older client version. Starting in this release, you can install and
upgrade the client when you set the client setting Client communication on metered internet
connections to Allow or Limit . With this setting, you can allow the client to stay current, but still manage the
client communication on a metered network.
To define the behavior for a new client installation, there's a new ccmsetup parameter /AllowMetered . When
you allow client communication on a metered network for ccmsetup, it downloads the content, registers with
the site, and downloads the initial policy. Any further client communication follows the configuration of the
client setting from that policy.
For more information, see the following articles:
About client settings
About client installation parameters and properties
Improvements to managing device restarts
Configuration Manager provides many options to manage device restarts and restart notifications. You can now
configure a client setting to prevent devices from automatically restarting when a deployment requires it. This
setting gives you more control in unique situations. By default, the client setting Configuration Manager can
force a device to restar t is enabled, so Configuration Manager can still force devices to restart. This setting
only applies to application, software update, and package deployments that require a restart.
For more information, see device restart notifications.
Application management
Improvements to available apps via CMG
This release fixes an issue with Software Center and Azure Active Directory (Azure AD) authentication. For a
client detected as on the intranet but communicating via the cloud management gateway (CMG), previously
Software Center would use Windows authentication. When it tried to get the list of user-available apps, it would
fail. It now uses Azure Active Directory (Azure AD) identity for devices joined to Azure AD. These devices can be
cloud-joined or hybrid-joined.
For more information, see Prerequisites to deploy user-available apps.
Microsoft 365 Apps for enterprise
Office 365 ProPlus was renamed to Microsoft 365 Apps for enterprise on April 21, 2020. Starting in version
2006, the following changes have been made:
The Configuration Manager console has been updated to use the new name.
This change also includes update channel names for Microsoft 365 Apps.
A banner notification was added to the console to notify you if one or more automatic deployment rules
reference obsolete channel names in the Title criteria for Microsoft 365 Apps updates.
For more information, see Microsoft 365 Apps channel names and Microsoft 365 Apps readiness dashboard.
OS deployment
Task sequence media support for cloud-based content
Task sequence media can now download cloud-based content. For example, you send a USB key to a user at a
remote office to reimage their device. Or an office that has a local PXE server, but you want devices to prioritize
cloud services as much as possible. Instead of further taxing the WAN to download large OS deployment
content, boot media and PXE deployments can now get content from cloud-based sources. For example, a cloud
management gateway (CMG) that you enable to share content.
NOTE
The device still needs an intranet connection to the management point.
For more information, see Bootable media support for cloud-based content.
Improvements to task sequences via CMG
This release includes the following improvements to deploy task sequences to devices that communicate via a
cloud management gateway (CMG):
Support for OS deployment: With a task sequence that uses a boot image to deploy an OS, you can
deploy it to a device that communicates via CMG. The user needs to start the task sequence from
Software Center. For more information, see Supported configurations for CMG.
This release fixes the two known issues from Configuration Manager current branch version 2002. You
can now run a task sequence on a device that communicates via CMG in the following circumstances:
A workgroup device that you register with a bulk registration token
You configure the site for Enhanced HTTP and the management point is HTTP
Improvements to BitLocker task sequence steps
You can now specify the disk encryption mode on the Enable BitLocker and Pre-provision BitLocker task
sequence steps. By default, the steps continue to use the default encryption method for the OS version.
The Enable BitLocker step also now includes a setting to Skip this step for computers that do not have a
TPM or when TPM is not enabled . When you enable this setting, the step logs an error on a device without a
TPM or a TPM that doesn't initialize, and the task sequence continues. This setting makes it easier to manage the
task sequence behavior on devices that can't fully support BitLocker.
For more information, see Task sequence steps.
Management insight rules for OS deployment
When the size of the task sequence policy exceeds 32 MB, the client fails to process the large policy. The client
then fails to run the task sequence deployment. To help you manage the policy size of task sequences, this
release includes the following management insights:
Large task sequences may contribute to exceeding maximum policy size
Total policy size for task sequences exceeds policy limit
TIP
These rules are in a new group for Operating System Deployment . The existing rule for Unused boot images is
now in this group too.
Protection
CMG support for endpoint protection policies
While the cloud management gateway (CMG) has supported endpoint protection policies, devices required
access to on-premises domain controllers. Starting in this release, clients that communicate via a CMG can
immediately apply endpoint protection policies without an active connection to Active Directory.
For more information, see Supported configurations for CMG.
BitLocker management support for hierarchies
You can now install the BitLocker self-service portal and the administration and monitoring website at the
central administration site.
For more information, see Set up BitLocker portals.
Other updates
For more information on changes to the Windows PowerShell cmdlets for Configuration Manager, see
PowerShell version 2006 release notes.
For more information on changes to the administration service REST API, see Administration service release
notes.
Aside from new features, this release also includes additional changes such as bug fixes. For more information,
see Summary of changes in Configuration Manager current branch, version 2006.
The following revised update rollup (4575789) is available in the console starting on November 30, 2020:
Revised update rollup for Microsoft Endpoint Configuration Manager current branch, version 2006.
Note this revision supersedes the original release of KB 4578605 Update rollup for Microsoft Endpoint
Configuration Manager version 2006.
Hotfixes
The following additional hotfixes are available to address specific issues:
ID T IT L E DAT E IN - C O N SO L E
Next steps
As of August 31, 2020, version 2006 is globally available for all customers to install.
When you're ready to install this version, see Installing updates for Configuration Manager and Checklist for
installing update 2006.
TIP
To install a new site, use a baseline version of Configuration Manager.
Learn more about:
Installing new sites
Baseline and update versions
NOTE
Since October 2019, Configuration Manager is part of Microsoft Endpoint Manager. For more information, see Microsoft
Endpoint Configuration Manager FAQ.
The December 2015 release (version 1511) of Configuration Manager was the initial release of the current
Configuration Manager product from Microsoft. It's typically referred to as Configuration Manager current
branch. Current branch indicates this version supports incremental updates to the product. It also provides a
way to distinguish between this release and previous releases of Configuration Manager.
Configuration Manager current branch:
Doesn't use a year or product identifier in the product name, unlike past versions such as Configuration
Manager 2007 or System Center 2012 Configuration Manager.
Supports incremental, in-product updates, also called update versions. The initial release was version
1511. Later versions are released several times a year as in-console updates, like version 1910.
Is installed using a baseline version. While 1511 was the original baseline version, new baseline versions
are also released from time to time, like 2103. Baseline versions can be used to install a new
Configuration Manager site and hierarchy, or to upgrade from a supported version of System Center
2012 Configuration Manager.
In-console updates
Configuration Manager uses an in-console service method called Updates and Ser vicing that makes it easy
to locate and install recommended updates.
Some versions are only available as updates for existing sites from within the Configuration Manager console.
You can't use these updates to install a new Configuration Manager site. For example, the 1910 update is only
available from within the Configuration Manager console. It's used to update a site that already runs a
supported version of Configuration Manager.
Periodically, an update version is also released as a new baseline version. For example, update version 2103 is
also a baseline. Use a baseline version to install a new site or hierarchy. Don't start with an older baseline
version like 2002, and upgrade your way to the most current version. Always use the latest baseline.
For more information, see the following articles:
Updates for Configuration Manager
Baseline and update versions
Service connection point
Configuration Manager current branch includes a new site system role, the ser vice connection point :
A point of contact for many cloud-enabled features
Downloads updates for your site
Uploads diagnostics and usage data about your site to the Microsoft cloud
This site system role supports both online and offline modes of operation. For more information, see About the
service connection point.
Deprecated functionality
Some features, like native Support for Intel Active Management Technology (AMT) based-computers, are
removed from the Configuration Manager console. Other features, like Network Access Protection, are removed
entirely. Additionally, some older Microsoft products like Windows Vista, Windows Server 2008, and SQL Server
2008, are no longer supported.
For a list of deprecated features, see Removed and deprecated items.
For details about supported products, operating systems, and configurations, see Supported configurations.
Support for Intel Active Management Technology (AMT )
Configuration Manager current branch removes native support for AMT-based computers from within the
Configuration Manager console. AMT-based computers remain fully managed when you use the Intel SCS Add-
on for Microsoft Configuration Manager. The add-on provides you access to the latest capabilities to manage
AMT, while removing limitations introduced until Configuration Manager could incorporate those changes.
The removal of integrated AMT for Configuration Manager includes out-of-band management. The out-of-band
management point site system role is no longer available.
NOTE
This change doesn't affect out-of-band management in System Center 2012 Configuration Manager.
Changes in functionality
The following sections summarize some of the significant changes in feature areas between System Center
2012 R2 Configuration Manager and the version 1511 version of Configuration Manager current branch. For
more information on more recent changes in functionality, see What's new in incremental versions.
Client deployment
Configuration Manager introduces a new feature for testing new versions of the Configuration Manager client
before upgrading the rest of site with the new software. You can set up a pre-production collection in which to
pilot a new client. Once you're satisfied with the new client software in pre-production, you can promote the
client to automatically upgrade the rest of the site with the new version.
For more information on how to test clients, see How to test client upgrades in a pre-production collection.
OS deployment
Be aware of the following changes to OS deployment:
In the Create Task Sequence Wizard, a new task sequence type is available: Upgrade an operating
system from upgrade package . It creates the steps to upgrade computers from an earlier version of
Windows to Windows 10 or later. For more information, see Upgrade Windows to the latest version.
Windows PE peer cache is now available when you deploy operating systems. Computers that run a task
sequence to deploy an OS can use Windows PE peer cache to obtain content from a peer cache source,
instead of downloading content from a distribution point. This behavior helps minimize WAN traffic in
branch office scenarios where there's no local distribution point. For more information, see Prepare
Windows PE peer cache to reduce WAN traffic.
You can now view the state of Windows as a service in your environment. You can also create servicing
plans to form deployment rings, and make sure that Windows 10 or later computers are kept up to date
when new builds are released. Additionally, you can view alerts when Windows clients are near the end of
support for their build. For more information, see Manage Windows as a service.
Application management
Be aware of the following changes to application management:
Configuration Manager lets you deploy Universal Windows Platform (UWP) apps for devices running
Windows 10 and later. For more information, see Creating Windows applications.
Software Center has a new, modern look. User-available apps that previously only appeared in the
application catalog now appear in Software Center under the Applications tab. This behavior makes these
deployments more discoverable, and makes it unnecessary for users to refer to the separate application
catalog. Additionally, a Silverlight-enabled browser is no longer required. For more information, see Plan
for and configure application management.
The new Windows Installer through MDM application type lets you create and deploy Windows Installer-
based apps to enrolled PCs that run Windows 10 or later. For more information, see Creating Windows
applications.
In Configuration Manager 2012, to specify a link to an app in the Windows Store, you could either specify
the link directly, or browse to a remote computer that had the app installed. In Configuration Manager
current branch, you can still enter the link directly, but now, instead of browsing to a reference computer,
you can browse the store for the app directly from the Configuration Manager console.
Software updates
Be aware of the following changes to software updates:
Configuration Manager can now detect the difference between software update management methods
for computers. Specifically, it can differentiate between a Windows computer that connects to Windows
Update for Business (WUfB), and a computer connected to WSUS. The UseWUSer ver attribute is new,
and specifies whether the computer is managed with WUfB. You can use this setting in a collection to
remove these computers from software update management. For more information, see Integration with
Windows Update for Business.
You can now schedule and run the WSUS clean-up task from the Configuration Manager console. In
Software Update Point Component properties, when you select to run the WSUS clean-up task, it
runs at the next software updates synchronization. The expired software updates are set to a status of
declined on the WSUS server, and the Windows Update Agent on computers no longer scans these
software updates. For more information, see Schedule and run the WSUS clean up task.
Compliance settings
Be aware of the following changes to compliance settings:
Configuration Manager improves the workflow for creating configuration items. Now, when you create a
configuration item, and select supported platforms, only the settings relevant to that platform are
available. See Get started with compliance settings.
The Create Configuration Item wizard now makes it easier to choose the configuration item type you
want to create. Additionally, new and updated configuration items are available for:
Windows 10 or later devices managed with the Configuration Manager client
mac OS X devices managed with the Configuration Manager client
Windows desktop and server computers managed with the Configuration Manager client
Windows 8.1 and Windows 10 or later devices managed without the Configuration Manager client
For more information, see How to create configuration items.
Support for managing settings on macOS X computers that are managed without the Configuration
Manager client.
On-premises mobile device management
You can now manage mobile devices by using on-premises Configuration Manager infrastructure. All device and
management data are handled on-premises, and isn't part of Microsoft Intune or other cloud services. This type
of device management doesn't require client software. Configuration Manager manages devices with
functionality that's built into the device OS.
For more information, see Manage mobile devices with on-premises infrastructure.
Next steps
What's new in incremental versions
Removed and deprecated items for Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
Unless noted otherwise, a feature, product, or OS that's deprecated in Configuration Manager typically continues to be
fully supported, available, and usable.
When support is removed for a feature or OS, the feature or OS remains supported when you use a previous
version of Configuration Manager, as long as that version of Configuration Manager remains in support.
However, when you use a version of Configuration Manager released after the date or version indicated, that
version of Configuration Manager doesn't provide support.
For example, if a feature was scheduled to have its support removed with the first update released after
September 2019, support for that feature would no longer be included in update 1910, which released in
November of 2019.
With Update 1910, the feature is no longer supported.
The article is updated to indicate support was removed with version 1910.
However, if you continue to use an earlier version that supports the feature, like version 1906, you can continue
to use that feature until the version you use drops out of support.
See also
Microsoft Support Lifecycle
Support for current branch versions of Configuration Manager
Next steps
Items that are removed or deprecated are split between three categories:
Removed and deprecated features
Removed and deprecated items for site servers
Removed and deprecated items for clients
Removed and deprecated features for
Configuration Manager
2/16/2022 • 7 minutes to read • Edit Online
Deprecated features
The following features are deprecated. You can still use them now, but Microsoft plans to end support in the
future.
The Configuration Manager client for January 2022 December 31, 2022
macOS and Mac client management.
For more information, see Supported
clients: Mac computers. Migrate
management of macOS devices to
Microsoft Intune. For more
information, see Deployment guide:
Manage macOS devices in Microsoft
Intune.
The site system roles for on-premises January 2022 December 31, 2022
MDM and macOS clients: enrollment
proxy point and enrollment point .
The Microsoft Store for Business November 2021 The first release after March 1, 2023
and Education . For more
information, see Manage apps from
the Microsoft Store for Business and
Education with Configuration
Manager.
Asset intelligence . For more November 2021 The first release after November 1,
information, see Introduction to asset 2022
intelligence.
On-premises MDM . For more November 2021 The first release after November 1,
information, see On-premises MDM in 2022
Configuration Manager.
The ability to deploy a cloud September 2021 The first release after March 1, 2022
management gateway (CMG) as a
cloud ser vice (classic) . All CMG
deployments should use a virtual
machine scale set.
Azure Active Directory (Azure AD) July 2021 June 30, 2022
Graph API and Azure AD
Authentication Library (ADAL), which
is used by Configuration Manager for
some cloud-attached scenarios. If you
use cloud-attached features such as
co-management, tenant attach, or
Azure AD discovery, starting June 30,
2022, these features may not work
correctly in Configuration Manager
version 2107 or earlier. Stay current
with Configuration Manager to make
sure these features continue to work.
For more information, see CMG FAQ.
The BitLocker management March 2021 The first release after May 2022
implementation for the recovery
service has changed. The legacy
MBAM-based service is replaced by
the messaging processing engine on
the management point.
Desktop Analytics data for Windows 7, July 2021 January 31, 2022
Windows 8, and earlier versions of
Windows 10 that don't support the
Windows diagnostic data processor
configuration.
The following compliance settings for March 2021 The first release after March 1, 2022
Company resource access :
Certificate profiles, VPN profiles, Wi-Fi
profiles, Windows Hello for Business
settings, and email profiles. This
deprecation includes the co-
management resource access
workload. Use Microsoft Intune to
deploy resource access profiles.
Sites that allow HTTP client March 2021 The first release after November 1,
communication. Configure the site for 2022
HTTPS or Enhanced HTTP. For more
information, see Enable the site for
HTTPS-only or enhanced HTTP.
F EAT URE DEP REC AT IO N F IRST A N N O UN C ED SUP P O RT REM O VED
The implementation for sharing February 2019 The first release after October 5, 2022
content from Azure has changed. Use
a content-enabled cloud management
gateway. Starting in version 2107, you
can't create a traditional cloud
distribution point.
Cloud management gateway and November 2018 The first release after October 5, 2022
cloud distribution point deployments
with Azure Service Manager using a
management certificate. For more
information, see Plan for CMG.
Desktop Analytics tile and page for December 2020 March 2021
Security Updates
F EAT URE DEP REC AT IO N F IRST A N N O UN C ED SUP P O RT REM O VED
Windows Analytics and Upgrade October 14, 2019 January 31, 2020
Readiness integration. For more
information, see KB 4521815:
Windows Analytics retirement on
January 31, 2020.
The application catalog, including both May 21, 2019 Version 1910
site system roles: the application
catalog website point and web service
point. For more information, see
Remove the application catalog.
System Center Endpoint Protection for October 2018 December 31, 2018
Mac and Linux
For more information, see End of
support blog post.
The Silverlight user experience for August 11, 2017 Version 1806
the application catalog website point is
no longer supported. Users should use
the new Software Center. For more
information, see Configure Software
Center.
Software update points with a network February 27, 2016 Version 1702
load balancing (NLB) cluster
F EAT URE DEP REC AT IO N F IRST A N N O UN C ED SUP P O RT REM O VED
WINS
Windows Internet Name Service (WINS) is a legacy computer name registration and resolution service. It's a
deprecated service. You should replace WINS with Domain Name System (DNS). For more information, see
Windows Internet Name Service (WINS).
Out of Band Management
With Configuration Manager, native support for AMT-based computers from within the Configuration Manager
console has been removed.
AMT-based computers remain fully managed when you use the Intel SCS Add-on for Configuration
Manager. The add-on provides you access to the latest capabilities to manage AMT, while removing
limitations introduced until Configuration Manager could incorporate those changes.
Out of Band Management in System Center 2012 Configuration Manager is not affected by this change.
Network Access Protection
Configuration Manager has removed support for Network Access Protection. The feature has been deprecated
in Windows Server 2012 R2, and is removed from Windows 10.
For network access protection alternatives, see the Deprecated functionality section of Network Policy and
Access Services Overview.
See also
Removed and deprecated
Microsoft Support Lifecycle
Support for current branch versions of Configuration Manager
Removed and deprecated for Configuration
Manager site servers
2/16/2022 • 2 minutes to read • Edit Online
Server OS
O P ERAT IN G SY ST EM S DEP REC AT IO N F IRST A N N O UN C ED SUP P O RT REM O VED
SQL Server
SQ L SERVER VERSIO N S DEP REC AT IO N F IRST A N N O UN C ED SUP P O RT REM O VED
SQL Server 2012 July 2021 The first release after July 1, 2022
If you need to upgrade your version of SQL Server, we recommend the following methods, from easy to more
complex:
1. Upgrade SQL Server in-place (recommended).
2. Install a new version of SQL Server on a new computer. Then to point your site server at the new SQL
Server, use the database move option of Configuration Manager setup.
3. Use backup and recovery.
NOTE
Make sure to also upgrade versions of SQL Server Express at secondary sites.
Next steps
For more information, see the following articles:
Removed and deprecated
Microsoft Support Lifecycle
Support for current branch versions of Configuration Manager
Removed and deprecated items for Configuration
Manager clients
2/16/2022 • 2 minutes to read • Edit Online
See also
For more information, see the following articles:
Supported OS versions for clients and devices
Microsoft Support Lifecycle
Support for current branch versions of Configuration Manager
Supported configurations for Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
For more general information, see the Microsoft Support Lifecycle.
Products and product versions that aren't listed in these articles aren't supported with Configuration Manager
unless they're announced on the Configuration Manager blog. The content on this blog may precede an update
to this documentation.
Site and site system prerequisites: Learn about required configurations on a Windows Server to support
different site types and site system roles.
Supported operating systems for site system servers: Learn about which operating systems you can use
as a site server or site system server.
Supported operating systems for clients and devices: Learn about which operating systems you can
manage with Configuration Manager. These include Windows, Windows Embedded, macOS, and mobile
devices.
Support for Windows 11 and Support for Windows 10: Learn about the Windows 11 and Windows 10
versions that are supported as clients.
Support for the Windows ADK: Learn about the Windows Assessment and Deployment Kit (Windows
ADK) version that are supported with Configuration Manager current branch for OS deployment.
Supported operating systems for the console: Learn about which operating systems can host the
Configuration Manager console.
Support for SQL Server versions: Learn about which versions of SQL Server can host the site database
and reporting database. It also includes required and optional configurations that you can use with SQL
Server.
High-availability options: Learn about the options you can implement when designing your environment
to help maintain a high level of available service for Configuration Manager.
Support for Active Directory domains: Learn about the supported Active Directory domain configurations
that Configuration Manager requires and supports.
Support for Windows features and networks: Learn about supported Windows technologies and
limitations for use with Configuration Manager. For example, Windows BranchCache and data
deduplication.
Support for virtualization environments: Learn more about how to use supported virtual machine
technologies.
FAQ for Configuration Manager on Azure: Answers to common questions about using Configuration
Manager on an Azure environment.
Use the following articles to understand Configuration Manager size, scale, and performance:
Size and scale numbers: Learn about how many sites, roles per site, and clients are supported in different
hierarchy designs.
Recommended hardware: Learn about guidelines that can help you identify the right hardware and
configurations to host your Configuration Manager sites and key services.
Site size and performance guidelines: Site size-related performance test results, methodology, and
guidance.
Site size and performance FAQ: Answers to common Configuration Manager questions about site sizing
and performance.
Site and site system prerequisites for Configuration
Manager
2/16/2022 • 18 minutes to read • Edit Online
NOTE
.NET Framework version 4.6.2 is preinstalled with Windows Server 2016. Later versions of Windows are preinstalled with a
later version of the .NET Framework.
.NET Framework version 4.8 isn't supported on some OS versions.
For more information, see .NET Framework system requirements.
Site server
If the site server doesn't have any collocated roles that require .NET, it still requires .NET, but setup doesn't
automatically install it. Make sure the site server itself has at least .NET version 4.6.2. If possible, install .NET 4.8.
Site systems
During Configuration Manager setup, if site systems have a version earlier than 4.6.2, you'll see a prerequisite
check warning. This check is a warning instead of an error, because setup will install version 4.6.2. When .NET
updates, it usually requires Windows to restart. Site systems will send status message 4979 when a restart is
required. Configuration Manager suppresses the restart; the system doesn't restart automatically.
The behavior will differ for different types of site roles that require .NET:
The following site system roles support in-place upgrade of .NET. After upgrading .NET, if a restart is
required, it sends status message 4979. The role keeps running with the earlier .NET version. After
Windows restarts, the role starts using the new .NET version.
Asset Intelligence synchronization point
Management point
Service connection point
Data warehouse service point
The following site systems roles uninstall and reinstall when .NET is upgraded. During site update, site
component manager removes the role, and then updates .NET. If a restart is required, it sends status
message 4979. After restart, site component manager reinstalls the role with the new .NET version. The
role could be unavailable while it waits for you to restart the server.
SMS Provider for the administration service
Certificate registration point
Enrollment point
Enrollment proxy point
Reporting services point
Software update point
NOTE
Currently, you still need to enable the Windows feature for .NET Framework 3.5 on site systems that require it.
If site systems have at least version 4.6.2 but earlier than version 4.8, you'll also see a prerequisite check
warning. We recommend that you install the latest version of .NET version 4.8 to get the latest performance and
security improvements. Configuration Manager setup doesn't automatically install .NET version 4.8. A later
version of Configuration Manager will require .NET version 4.8.
There's also a new management insight to recommend site systems that don't yet have .NET version 4.8 or later.
Managing system restarts for .NET updates
Whether you update .NET before updating the site, or setup updates it, .NET may require a restart to complete
its installation. After .NET Framework is installed, it may require other updates. These updates may also require
the server to restart.
If you need to manage the device restarts before you update the site, use the following recommended process:
1. Install the latest baseline .NET version. For example, install .NET version 4.8.
2. Restart the server.
3. Scan for software updates and install the latest .NET cumulative update.
4. Restart the server.
5. Update the site to the latest current branch version.
Database server
Remote Registry service for the site database server
During installation of the Configuration Manager site, enable the Remote Registr y service on the computer
that hosts the site database.
SQL Server for the site database server
Before you install a CAS or primary site, install a supported version of SQL Server to host the site
database. For more information, see Supported SQL Server versions.
Before you install a secondary site:
You can install a supported version of SQL Server.
You can choose to have Configuration Manager install SQL Server Express. Make sure that the
server meets the requirements to run SQL Server Express.
SQL Server Native Client for the site database server
When you install a new site, Configuration Manager automatically installs SQL Server Native Client as a
redistributable component. After the site is installed, Configuration Manager doesn't upgrade SQL Server Native
Client. Make sure this component is up to date. For more information, see Prerequisite checks - SQL Server
Native Client.
Distribution point
Windows Server roles and features for the DP
Remote Differential Compression
NOTE
When the distribution point transfers content, it transfers using the Background Intelligent Transfer Ser vice (BITS)
built into Windows. The distribution point role doesn't require the optional BITS IIS Server Extension feature to be
installed, because the client doesn't upload information to it.
NOTE
WDS installs and configures automatically when you enable a distribution point to support PXE.
NOTE
WDS installs and configures automatically when you enable a distribution point to support multicast.
Make sure the SQL Server Native Client is installed and up to date. For more information, see
Prerequisite checks - SQL Server Native Client.
Enrollment point
IMPORTANT
With the deprecation of on-premises MDM and the Configuration Manager client for macOS, this site system role is also
deprecated. For more information, see Removed and deprecated features for Configuration Manager.
Windows Server roles and features for the enrollment proxy point
.NET Framework 3.5
IIS configuration for the enrollment proxy point
Common HTTP Features:
Default Document
Static Content
Application Development:
ASP.NET 3.5 (and automatically selected options)
ASP.NET 4.5 (and automatically selected options)
.NET Extensibility 3.5
.NET Extensibility 4.5
Security:
Windows Authentication
IIS 6 Management Compatibility:
IIS 6 Metabase Compatibility
.NET Framework for the enrollment proxy point
Enable the Windows feature for .NET Framework 3.5.
Install a supported version of the .NET Framework. For more information, .NET version requirements.
Computer memory for the enrollment proxy point
The computer that hosts this site system role must have a minimum of 5% of the computer's available
memory free to enable the site system role to process requests.
When this site system role is colocated with another site system role that has this same requirement, this
memory requirement for the computer doesn't increase, but remains at a minimum of 5%.
Management point
Windows Server roles and features for the MP
Depending upon the version of Windows Server, enable one of the following features:
BITS Server Extensions and the automatically selected options
Background Intelligent Transfer Services (BITS) and the automatically selected options
IIS configuration for the MP
Application Development:
ISAPI Extensions
Security:
Windows Authentication
IIS 6 Management Compatibility:
IIS 6 Metabase Compatibility
IIS 6 WMI Compatibility
To make sure that clients can successfully communicate with a management point, make sure IIS allows the
following HTTP verbs:
GET
POST
CCM_POST
HEAD
PROPFIND
.NET Framework for the MP
Install a supported version of the .NET Framework. For more information, .NET version requirements.
SQL Server Native Client for the MP
When you install a new site, Configuration Manager automatically installs SQL Server Native Client as a
redistributable component. After the site is installed, Configuration Manager doesn't upgrade SQL Server Native
Client. Make sure this component is up to date. For more information, see Prerequisite checks - SQL Server
Native Client.
NOTE
When you use a software update point on a remote site system, install the WSUS Administration Console on the site
server.
NOTE
If you're installing a new site, you can use the latest baseline version 2103 on a Windows Server 2022 site server, and
then immediately update the site to version 2107.
Client OS versions
The following client OS versions are supported for use as a distribution point Note 1:
Windows 11 (starting in Configuration Manager version 2107)
For more information on supported build versions and editions, see Support for Windows 11.
Windows 10 (x86, x64)
For more information on supported build versions and editions, see Support for Windows 10.
Windows 8.1 (x86, x64): Professional and Enterprise
This support has the following limitation:
Distribution points on this OS don't support PXE or multicast with the default Windows Deployment Services.
You can PXE-enable a distribution point on this OS with the option to Enable a PXE responder without
Windows Deployment Ser vice . For more information, see Install and configure distribution points.
General notes
Note 1: Distribution points
Distribution points support several different configurations that each have different requirements. In some
cases, these configurations support installation not only on servers, but on client operating systems. For more
information, see Manage content and content infrastructure.
Note 2: Site database servers
Site database servers aren't supported on a read-only domain controller (RODC). For more information, see
SQL Server security considerations: Installing SQL Server on a domain controller.
Additionally, secondary site servers aren't supported on any domain controller.
Next steps
Supported SQL Server versions
See also:
Recommended hardware
Site and site system prerequisites
Size and scale numbers
Supported OS versions for clients and devices for
Configuration Manager
2/16/2022 • 7 minutes to read • Edit Online
Windows computers
To manage the following Windows OS versions, use the client that's included with Configuration Manager. For
more information, see How to deploy clients to Windows computers.
Supported client OS versions
Windows 11 (starting in Configuration Manager version 2107)
NOTE
You can continue to use Microsoft Endpoint Manager to manage devices running Windows 11 the same as with
Windows 10. For more information, including some known issues, see Support for Windows 11.
Windows 10
For more information, see Support for Windows 10.
Windows 8.1 (x86, x64): Professional, Enterprise
For more information on the versions of the Windows Assessment and Deployment Kit (Windows ADK) that
Configuration Manager current branch supports, see Support for the Windows ADK.
Azure Virtual Desktop
Azure Virtual Desktop is a desktop and app virtualization service that runs on Microsoft Azure. You can use
Configuration Manager to manage these virtual devices running Windows in Azure.
Similar to a terminal server, some of these virtual devices allow multiple concurrent active user sessions. To help
with client performance, Configuration Manager disables user policies on any device that allows these multiple
user sessions. Even if you enable user policies, the client disables them by default on these devices, which
include Windows Enterprise multi-session and terminal servers.
The client only disables user policy when it detects this type of device during a new installation. For an existing
client of this type that you update to this version, the previous behavior persists. On an existing device, it
configures the user policy setting even if it detects that the device allows multiple user sessions.
If you require user policy in this scenario, and accept any potential performance impact, use client settings to
enable user policy. In the Client Policy group, configure the following setting: Enable user policy for
multiple user sessions .
Starting in version 2006, the Windows 10 Enterprise multi-session platform is available in the list of
supported OS versions on objects with requirement rules or applicability lists. Starting in version 2107, the
Windows 11 Enterprise multi-session platform is available.
NOTE
If you previously selected the top-level platform, this action automatically selected all child platforms. New platforms aren't
automatically selected. For example, if you want to add Windows 10 Enterprise multi-session , manually select it
under the Windows 10 platform.
Mac computers
IMPORTANT
Starting in January 2022, this feature of Configuration Manager is deprecated. The macOS client installation package isn't
available for new deployments, but existing deployments are supported until December 31, 2022.
Migrate management of macOS devices to Microsoft Intune:
1. First, uninstall the Configuration Manager client for macOS. For more information, see Uninstalling the Mac client.
2. Then enroll the device to Intune. For more information, see Deployment guide: Manage macOS devices in Microsoft
Intune.
Manage Apple Mac computers with the Configuration Manager client for macOS.
For more information, see How to deploy clients to Macs.
Requirements and limitations for macOS
Installing or running the Configuration Manager client for macOS on computers under an account other than
root isn't supported. Doing so can prevent key services from running correctly.
Supported versions
macOS Big Sur (11) (requires Configuration Manager client for macOS version 5.0.9000.1002 or later)
macOS Catalina (10.15) (requires Configuration Manager client for macOS version 5.0.8742.1000 or
later)
macOS Mojave (10.14)
On-premises MDM
IMPORTANT
Starting in November 2021, this feature of Configuration Manager is deprecated.
Configuration Manager has built-in capabilities for managing mobile devices that are on-premises without
installing client software. For more information, see Manage mobile devices with on-premises infrastructure.
Supported operating systems
Windows 10 Pro (x86, x64)
Windows 10 Enterprise (x86, x64)
Windows 10 IoT Enterprise (x86, x64) This version includes the long-term servicing channel (LTSC).
For more information, see Overview of Windows 10 IoT Enterprise.
Windows 10 Team for Surface Hub
Exchange Server connector
Configuration Manager supports limited management of devices that connect to your Exchange Server, without
installing the Configuration Manager client. For more information, see Manage mobile devices with
Configuration Manager and Exchange.
Supported versions of Exchange Server
Exchange Online (Microsoft 365) : This version includes Business Productivity Online Standard Suite
Exchange Ser ver 2016
Exchange Ser ver 2013
Exchange Ser ver 2010 SP1 or Exchange Ser ver 2010 SP2
Support for Windows 11 in Configuration Manager
2/16/2022 • 5 minutes to read • Edit Online
NOTE
You can continue to use Microsoft Endpoint Manager to manage devices running Windows 11 the same as with Windows
10. If another article doesn't explicitly reference Windows 11, assume that feature support for Windows 10 also includes
Windows 11. This article lists some known issues.
Windows 11 versions
Configuration Manager attempts to provide support as a client for each new Windows 11 version soon after it
becomes available. Because the products have separate development and release schedules, the support that
Configuration Manager provides depends on when each becomes available.
A Configuration Manager version drops from the matrix after support for that version ends. Similarly,
Configuration Manager doesn't support Windows 11 versions when their support lifecycle ends.
The latest version of Configuration Manager current branch receives both security and critical updates,
which can include fixes for Windows 11-specific features. When Microsoft releases a new version of
Configuration Manager current branch, prior versions only receive security updates. For more
information, see Support for Configuration Manager current branch versions.
NOTE
The best way to stay current with Windows 11 is to stay current with Configuration Manager. For more
information, see Configuration Manager and Windows as a Service.
This information supplements Supported operating systems for clients and devices.
The following table lists the versions of Windows 11 that you can use as a client with different versions of
Configuration Manager.
21H2
(10.0.22000)
For more information on Windows lifecycle, see the Windows lifecycle fact sheet and Windows release
information.
K EY
= Suppor ted
Support notes
Support for Windows 11 versions includes the following editions: Enterprise, Pro, Education, Pro
Education, and Pro for Workstation.
Windows 11 reports the Operating System property as Microsoft Windows NT Workstation 10.0 , which
is identical to Windows 10. To distinguish devices running Windows 11, use the Operating System
Build device property for build number 10.0.22000 or later.
OS deployment images and upgrade packages for Windows 11 show the image name as Windows 10.
For more information, see Using deployment tools with Windows 11 images.
The 32-bit versions of Windows PE (WinPE) in the WinPE add-ons for Windows 11 and Windows Server
2022 aren't supported. The last supported version of 32-bit WinPE is available in the WinPE add-on for
Windows 10, version 2004 . For more information, see Download and install the Windows ADK.
Configuration Manager supports the use of older versions of Windows PE as boot images, but you can't
customize them in the Configuration Manager console. For more information, see Customize boot
images with Configuration Manager.
Windows 11 on ARM64
Configuration Manager version 2107 with the update rollup supports the client on Windows 11 ARM64 devices.
The All Windows 11 (ARM64) platform is available in the list of supported OS versions on objects with
requirement rules or applicability lists.
OS deployment isn't supported, except for a feature update task sequence. You can deploy a task sequence with
a feature update to a Windows 11 on ARM64 device. For more information, see Upgrade Windows to the latest
version.
Known issues
Desktop Analytics
Desktop Analytics doesn't support Windows 11. For information about Windows 11 hardware readiness,
Microsoft recommends that you enable tenant attach and Endpoint analytics.
Windows servicing dashboard
The Windows Ser vicing dashboard currently includes Windows 11 devices with the latest version of Windows
10. It doesn't yet distinguish a version for Windows 11. For more information on this dashboard, see Manage
Windows as a service using Configuration Manager.
Software Center notifications don't display during quiet period
By default, Windows 11 enables focus assist for the first hour after a user signs on for the first time. For more
information, see Reaching the Desktop and the Quiet Period.
Software Center notifications are currently suppressed during this time. For more information, see Turn Focus
assist on or off in Windows.
Pre -provisioning BitLocker during task sequence doesn't own TPM
Applies to: Windows ADK for Windows 11
When you use a Windows 11-based boot image with an OS deployment task sequence that includes the Pre-
provision BitLocker step, the step might fail. You'll see errors similar to the following strings in the smsts.log:
To work around this issue, add a Run Command Line step to the task sequence before the Pre-provision
BitLocker step. Run the following command:
reg.exe add HKLM\SOFTWARE\Policies\Microsoft\TPM /v OSManagedAuthLevel /t REG_DWORD /d 2 /f
For more information on this registry key, see Change the TPM owner password.
Configuration Manager console with Windows Hello for Business authentication
Applies to: Azure Active Directory (Azure AD)-joined devices
If you configure the authentication level for the site to require Windows Hello for Business authentication ,
the Configuration Manager console on a Windows 11 device can't connect to the site. The adminui.log file on the
devices shows the following errors:
Description = "Current thread is not authenticated with the minimal allowed level.";
ErrorCode = 2185761792;
Next steps
Support for the Windows ADK
Support for Windows 10 in Configuration Manager
2/16/2022 • 4 minutes to read • Edit Online
TIP
Windows Server builds as a client are supported the same as the associated Windows 10 version. For example, Windows
Server 2016 is the same build version as Windows 10 LTSB 2016, and Windows Server version 1803 is the same build
version as Windows 10, version 1803.
For more information on Windows Server as a site system, see Supported operating systems for Configuration Manager
site system servers.
Windows 10 versions
Configuration Manager attempts to provide support as a client for each new Windows 10 version as soon as
possible after it becomes available. Because the products have separate development and release schedules, the
support that Configuration Manager provides depends on when each becomes available.
A Configuration Manager version drops from the matrix after support for that version ends. Similarly, support
for Windows 10 versions like the Enterprise 2015 LTSB or 1511 drops from the matrix when they're removed
from support.
The latest version of Configuration Manager current branch receives both security and critical updates,
which can include fixes for issues with Windows 10 versions. When Microsoft releases a new version of
Configuration Manager current branch, prior versions only receive security updates. For more
information, see Support for Configuration Manager current branch versions.
NOTE
The best way to stay current with Windows 10 is to stay current with Configuration Manager. For more
information, see Configuration Manager and Windows as a Service.
This information supplements Supported operating systems for clients and devices.
If you use the long-term servicing branch of Configuration Manager, see Supported configurations for
the long-term servicing branch.
The following table lists the versions of Windows 10 that you can use as a client with different versions of
Configuration Manager.
W IN DO W S 10 C O N F IGM GR C O N F IGM GR C O N F IGM GR C O N F IGM GR C O N F IGM GR
VERSIO N 2006 2010 2103 2107 2111
21H2
(10.0.19044)
Enterprise
LTSC 2021
(10.0.19044)
21H1
(10.0.19043)
20H2 No te
(10.0.19042)
2004
(10.0.19041)
1909
(10.0.18363)
All currently supported versions of Configuration Manager current branch support the following Windows 10
LTSB/LTSC editions:
Enterprise 2015 LTSB
Enterprise 2016 LTSB
Enterprise LTSC 2019
For more information on Windows lifecycle, see the Windows lifecycle fact sheet and Windows 10 release
information.
K EY
= Suppor ted
Support notes
Support for Windows 10 semi-annual channel versions includes the following editions: Enterprise, Pro,
Education, Pro Education, and Pro for Workstation.
OS deployment media shows the build number from the base version. For example, 10.0.19041 . When
Windows is installed, it applies an enablement package, which updates the build number to what's in the
above table. You can use the revision ID to distinguish the media:
NOTE
If you previously selected the top-level Windows 10 platform, this action automatically selected both All Windows 10
(64-bit) and All Windows 10 (32-bit) . If you want to add All Windows 10 (ARM64) , manually select it in the list.
OS deployment isn't supported, except for a feature update task sequence. Starting in version 2103, you can
deploy a task sequence with a feature update to a Windows 10 on ARM64 device. For more information, see
Deploy a feature update with a task sequence.
Next steps
Support for the Windows ADK
Support for Windows 11
Support for the Windows ADK in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
IMPORTANT
Windows PE is a separate installer. Make sure to download both the Windows ADK and the Windows PE add-
on for the ADK .
Windows 11
(10.1.22000)
Windows
Ser ver 2022
(10.1.20348)
Windows 10,
version 2004
(10.1.19041)
Windows 10,
version 1903
(10.1.18362)
K EY
= Suppor ted
This table only shows Windows ADK supportability in relation to the version of Configuration Manager. Microsoft
recommends using the Windows ADK that matches the version of Windows you're deploying. Use the latest Windows ADK
version when deploying the latest Windows version. The latest Windows ADK version may support deployment of older OS
versions, such as Windows 8.1. For more information on Windows ADK component supportability, see DISM supported
platforms, USMT requirements, and Choose the right ADK for your scenario.
K EY
= Backward compatible
This combination isn't tested but should work. We'll document any known issues or caveats.
Support notes
Configuration Manager only supports x86 and amd64 components of the Windows ADK. It doesn't
currently support ARM or ARM64 components.
Windows Server builds have the same Windows ADK requirement as the associated Windows client
version. For example, Windows Server 2016 is the same build version as Windows 10 LTSB 2016.
If you're deploying both Windows 11 and Windows Server 2022, use the Windows ADK for Windows 11,
which is the latest version. If you're deploying Windows Server 2022 and not Windows 11, you can use
either Windows ADK for Windows Server 2022 or Windows 11.
The 32-bit versions of Windows PE (WinPE) in the WinPE add-ons for Windows 11 and Windows Server
2022 aren't supported. The last supported version of 32-bit WinPE is available in the WinPE add-on for
Windows 10, version 2004 . For more information, see Download and install the Windows ADK.
Configuration Manager supports the use of older versions of Windows PE as boot images, but you can't
customize them in the Configuration Manager console. For more information, see Customize boot
images with Configuration Manager.
Known issues
Pre -provisioning BitLocker during task sequence doesn't own TPM
Applies to: Windows ADK for Windows 11
When you use a Windows 11-based boot image with an OS deployment task sequence that includes the Pre-
provision BitLocker step, the step might fail. You'll see errors similar to the following strings in the smsts.log:
To work around this issue, add a Run Command Line step to the task sequence before the Pre-provision
BitLocker step. Run the following command:
reg.exe add HKLM\SOFTWARE\Policies\Microsoft\TPM /v OSManagedAuthLevel /t REG_DWORD /d 2 /f
For more information on this registry key, see Change the TPM owner password.
Next steps
Support for Windows 11
Support for Windows 10
Supported OS versions for clients
Supported OS versions for Configuration Manager
consoles
2/16/2022 • 2 minutes to read • Edit Online
IMPORTANT
When you use SQL Server Standard for the database at the central administration site, you limit the total number of
clients that a hierarchy can support. See Size and scale numbers.
IMPORTANT
Starting in version 2107, support for SQL Server 2012 is deprecated. Its support lifecycle ends in July 2022. Plan to
upgrade all database servers before that time. For more information, see SQL Server.
IMPORTANT
Starting in version 2107, support for SQL Server 2012 is deprecated. Its support lifecycle ends in July 2022. Plan to
upgrade all database servers before that time. For more information, see SQL Server.
To identify the SQL Server cardinality estimation compatibility level in use for your site database, run the
following SQL query on the site database server:
For more information on SQL Server Compact Edition (CE) compatibility levels and how to set them, see ALTER
DATABASE Compatibility Level (Transact-SQL).
SQL Server features
Only the Database Engine Ser vices feature is required for each site server.
Configuration Manager database replication doesn't require the SQL Ser ver replication feature. However, this
SQL Server configuration is required when you use database replicas for management points.
Windows authentication
Configuration Manager requires Windows authentication to validate connections to the database.
SQL Server instance
Use a dedicated instance of SQL Server for each site. The instance can be a named instance or the default
instance .
SQL Server memory
Reserve memory for SQL Server by using SQL Server Management Studio. Set the Minimum ser ver
memor y setting under Ser ver Memor y Options . For more information about how to configure this setting,
see SQL Server memory server configuration options.
For a database ser ver that you install on the same computer as the site ser ver : Limit the
memory for SQL Server to 50 to 80 percent of the available addressable system memory.
For a dedicated database ser ver that's remote from the site ser ver : Limit the memory for SQL
Server to 80 to 90 percent of the available addressable system memory.
For a memor y reser ve for the buffer pool of each SQL Ser ver instance in use :
For a central administration site: Set a minimum of 8 GB.
For a primary site: Set a minimum of 8 GB.
For a secondary site: Set a minimum of 4 GB.
SQL Server nested triggers
SQL Server nested triggers must be enabled. For more information, see Configure the nested triggers server
configuration option
SQL Server CLR integration
The site database requires SQL Server common language runtime (CLR) to be enabled. This option is enabled
automatically when Configuration Manager installs. For more information about CLR, see Introduction to SQL
Server CLR Integration.
SQL Server Service Broker (SSB )
The SQL Server Service Broker is required both for intersite replication as well as for a single primary site.
TRUSTWORTHY setting
Configuration Manager automatically enables the SQL TRUSTWORTHY database property. This property is
required by Configuration Manager to be ON .
WARNING
Configuration Manager doesn't support dynamic ports. Because SQL Server named instances by default use dynamic
ports for connections to the database engine, when you use a named instance, you must manually configure the static
port that you want to use for intrasite communication.
If you have a firewall enabled on the computer that is running SQL Server, make sure that it's configured to
allow the ports that are being used by your deployment and at any locations on the network between
computers that communicate with the SQL Server.
For an example of how to configure SQL Server to use a specific port, see Configure a server to listen on a
specific TCP port.
Disjoint namespace
You can install Configuration Manager site systems and clients in a domain that has a disjoint namespace.
In a disjoint namespace, the primary DNS suffix of a computer doesn't match the Active Directory DNS domain
name of that computer. Another disjoint namespace scenario occurs if the NetBIOS domain name of a domain
controller doesn't match the Active Directory DNS domain name.
Disjoint scenarios
The following sections identify the supported scenarios for a disjoint namespace.
Scenario 1
The primary DNS suffix of the domain controller differs from the Active Directory DNS domain name.
Computers that are members of the domain can be either disjoint or not disjoint.
The domain controller is disjoint in this scenario. Computers that are members of the domain, such as site
servers and computers, can have a primary DNS suffix that either matches:
The primary DNS suffix of the domain controller
The Active Directory DNS domain name
Scenario 2
A member computer in an Active Directory domain is disjoint, even though the domain controller isn't disjoint.
In this scenario, the primary DNS suffix of a site system differs from the Active Directory DNS domain name.
The primary DNS suffix of the domain controller is the same as the Active Directory DNS domain name.
Member computers that are Configuration Manager clients can have a primary DNS suffix that either matches:
The primary DNS suffix of the disjoint site system server
The Active Directory DNS domain name
Configure disjoint namespace
To allow a computer to access domain controllers that are disjoint, change the msDS-AllowedDNSSuffixes
Active Directory attribute on the domain object container. Add both DNS suffixes to the attribute.
To make sure that the DNS suffix search list contains all the DNS namespaces in the organization, configure the
search list for each computer in the disjoint domain. Include the following suffixes in the list of namespaces:
The primary DNS suffix of the domain controller
The DNS domain name
Any additional namespaces for other servers that Configuration Manager might communicate with
You can use group policy to configure the Domain Name System (DNS) suffix search list.
IMPORTANT
When you reference a computer in Configuration Manager, enter the computer by using its primary DNS suffix. This suffix
should match the fully qualified domain name that's registered as the dnsHostName attribute in the Active Directory
domain and the service principal name that's associated with the system.
BranchCache
Use Windows BranchCache with Configuration Manager when you enable it on distribution points, and
configure clients to use it in distributed cache mode.
Configure the BranchCache settings on a deployment type for applications, on the deployment for a package,
and for task sequences. BranchCache is enabled by default.
When the requirements for BranchCache are met, this feature enables clients in remote locations to obtain
content from local clients that have a current cache of the content.
For example, when the first BranchCache-enabled client requests content from a distribution point that's
configured as a BranchCache server, the client downloads and caches the content. This content is then made
available for clients on the same subnet that requested this content.
These clients also cache the content. Other clients on the same subnet don't have to download content from the
distribution point. The content is distributed across multiple clients for future transfers.
Requirements to support BranchCache with Configuration Manager
Configure distribution points
Add the Windows BranchCache feature to the site system server that's configured as a distribution point.
Distribution points on servers that are configured to support BranchCache require no additional
configuration.
You can't add Windows BranchCache to a content-enabled cloud management gateway. CMGs do
support the download of content by clients that are configured for Windows BranchCache.
Configure clients
The clients that can support BranchCache must be configured for BranchCache distributed cache mode.
The OS setting for BITS client settings must be enabled to support BranchCache.
For information, see configure clients for BranchCache in the Windows documentation.
All Configuration Manager supported versions of Windows support BranchCache by default.
For more information, see BranchCache for Windows in the Windows Server documentation.
Computers in workgroups
Configuration Manager provides support for clients in workgroups.
Configuration Manager supports moving a client from a workgroup to a domain or from a domain to a
workgroup. For more information, see How to install Configuration Manager clients on workgroup
computers.
NOTE
Although clients in workgroups are supported, all site systems must be members of a supported Active Directory domain.
Data deduplication
Configuration Manager supports the use of data deduplication with distribution points on Windows Server
2012 or later.
IMPORTANT
The volume that hosts package source files can't be marked for data deduplication. This limitation is because data
deduplication uses reparse points. Configuration Manager doesn't support using a content source location with files
stored on reparse points.
DirectAccess
Configuration Manager supports the DirectAccess feature for communication between clients and site server
systems.
When all the requirements for DirectAccess are met, it enables Configuration Manager clients on the
internet to communicate with their assigned site as if they were on the intranet.
For server-initiated actions, such as remote control and client push installation, the initiating computer
must be running IPv6. This protocol must be supported on all intervening networking devices.
Configuration Manager doesn't support the following functionality over DirectAccess:
OS deployment
Communication between Configuration Manager sites
Communication between Configuration Manager site system servers within a site
Dual-boot computers
Configuration Manager can't manage more than one OS on a single computer. If there's more than one OS on a
computer to manage, adjust the site's discovery and client installation methods to ensure that the Configuration
Manager client is installed only on the OS that has to be managed.
IPv6
In addition to Internet Protocol version 4 (IPv4), Configuration Manager supports Internet Protocol version 6
(IPv6), with the following exceptions:
F UN C T IO N EXC EP T IO N TO IP V6 SUP P O RT
F UN C T IO N EXC EP T IO N TO IP V6 SUP P O RT
Cloud management gateway IPv4 is required to support Microsoft Azure and the cloud
management gateway.
Wake-up proxy communication IPv4 is required to support the client wake-up proxy
packets.
Next steps
Support for virtualization environments with Configuration Manager
Support for virtualization environments with
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
Virtualization environments
Windows Server 2022 (starting in version 2107)
Windows Server 2019
Windows Server 2016 Note 1
Microsoft Hyper-V Server 2016 Note 1
Windows Server 2012 R2
Microsoft Hyper-V Server 2012
Windows Server 2012
NOTE
Configuration Manager doesn't support nested virtualization, which is new with Windows Server 2016.
NOTE
These scenarios also apply to IaaS VMs on Azure Stack Hub.
The same Configuration Manager requirements for networks, supported configurations, and hardware
requirements also apply to Azure VMs.
For more information, see Configuration Manager on Azure FAQ.
IMPORTANT
Configuration Manager sites and clients that run on Azure VMs are subject to the same license requirements as on-
premises installations.
Next steps
Manage Configuration Manager clients in a virtual desktop infrastructure (VDI)
Size and scale numbers for Configuration Manager
2/16/2022 • 10 minutes to read • Edit Online
Site types
Central administration site
A central administration site supports up to 25 child primary sites.
Primary site
Each primary site supports up to 250 secondary sites.
The number of secondary sites per primary site is based on continuously connected and reliable wide
area network (WAN) connections. For locations that have fewer than 500 clients, consider a distribution
point instead of a secondary site.
For information about the number of clients and devices that a primary site can support, see Client
numbers for sites and hierarchies.
Secondary site
Secondary sites don't support child sites.
One CMG supports up to 16 virtual machine (VM) instances in the Azure cloud service.
Simultaneous client connections per each CMG VM instance depend upon the deployment model and
VM size:
Cloud ser vice (classic) : 6,000
Vir tual machine scale set (version 2010 and 2103 for Cloud Service Provider (CSP)
subscriptions): 2,000
Vir tual machine scale-set (version 2107 or later)
Lab (B2s) : 10
Standard (A2_v2) : 6,000
Large (A4_v2) : 10,000
IMPORTANT
The Lab (B2s) size VM is only intended for lab testing and small proof-of-concept environments. They
aren't intended for production use with the CMG. The B2s VMs are low cost and low performing. The
Configuration Manager technical preview branch only supports 10 clients, which is why this size supports
that number of clients.
When the CMG is under high load with more than the supported number of clients, it still handles
requests but there may be delay.
For more information, see CMG Performance and scale.
Cloud management gateway connection point
This guidance is the same for all deployment models and VM sizes.
You can install multiple instances of the CMG connection point at primary sites.
One CMG connection point can support a CMG with up to four VM instances. If the CMG has more than
four VM instances, add a second CMG connection point for load balancing. A CMG with 16 VM instances
should be linked with four CMG connection points.
NOTE
When considering hardware requirements for the CMG connection point, see Recommended hardware for remote site
system servers.
WARNING
The actual number of clients that one distribution point can support depends on the speed of the network and the
hardware configuration of the server.
The number of pull-distribution points that one source distribution point can support similarly depends on the speed of
the network and the hardware configuration of the source distribution point. But this number is also affected by the
amount of content that you've deployed. This effect is because, unlike clients that typically access content at different
times during a deployment, all pull-distribution points request content at the same time. Pull-distribution points can
request all available content, not just the content that is applicable to them. When you place a high processing load on a
source distribution point, there can be unexpected delays in distributing the content to the target distribution points.
TIP
Don't install management points on servers that are across a slow link from the primary site server or the site
database server.
Each secondary site supports a single management point that must be installed on the secondary site
server.
For information about the number of clients and devices that a management point can support, see the
Management points section.
NOTE
If you enable the management point to support a cloud management gateway, it services internet-based client requests
per normal. Sizing guidance for a management point doesn't change whether it services on-premises or internet-based
clients.
NOTE
If you enable the software update point to support a cloud management gateway, it services internet-based client
requests per normal. Sizing guidance for a software update point doesn't change whether it services on-premises or
internet-based clients.
IMPORTANT
In a hierarchy where the central administration site uses a Standard edition of SQL Server, the hierarchy supports a
maximum of 50,000 desktops and devices. To support more than 50,000 desktops and devices, you must use an
Enterprise edition of SQL Server. This requirement applies only to a central administration site. It doesn't apply to a stand-
alone primary site or a child primary site. The edition of SQL Server you use for a primary site doesn't limit its capacity to
support the stated number of clients.
The edition of SQL Server that is in use at a stand-alone primary site doesn't limit that site's capacity to support
up to the stated number of clients.
Child primary site
Each child primary site in a hierarchy with a central administration site supports the following number of clients:
150,000 total clients and devices that aren't limited to a specific group or type, as long as support doesn't
exceed the number that is supported for the hierarchy. Also see, support for embedded devices.
For example, a primary site supports 25,000 macOS devices. That number is the limit for a hierarchy. This
primary site can then support an additional 125,000 desktop computers. The total number of supported devices
for the child primary site is the supported maximum limit of 150,000.
Stand-alone primary site
A stand-alone primary site supports the following number of devices:
175,000 total clients and devices, not to exceed:
150,000 Windows clients. Also see, support for embedded devices.
25,000 devices that run macOS
50,000 devices that you manage by using on-premises MDM
For example, a stand-alone primary site that supports 150,000 desktops and 10,000 Macs can only support an
additional 15,000 mobile devices managed by on-premises MDM.
Primary sites and Windows Embedded devices
Primary sites support Windows Embedded devices that have File-Based Write Filters (FBWF) enabled. When
embedded devices don't have write filters enabled, a primary site can support a number of embedded devices
up to the allowed number of devices for that site. When embedded devices have FBWF or Unified Write Filters
(UWF) enabled, a primary site can support a maximum of 10,000 Windows embedded devices. These devices
must be configured with the exceptions listed in the important note found in the Planning for client deployment
to Windows Embedded devices. A primary site supports only 3,000 Windows Embedded devices that have EWF
enabled and that are not configured for the exceptions.
Secondary sites
Secondary sites support the following number of devices:
15,000 Windows clients
Management points
Each management point can support the following number of devices:
25,000 total clients and devices, not to exceed:
25,000 Windows clients
One of the following (not both):
10,000 devices that are managed by using on-premises MDM
10,000 devices that run macOS
Recommended hardware for Configuration
Manager
2/16/2022 • 6 minutes to read • Edit Online
Site systems
This section provides recommended hardware configurations for Configuration Manager site systems. Use
these recommendations to support the maximum number of clients and use most or all Configuration Manager
features. If your environment supports less than the maximum number of clients, and doesn't use all available
features, it might require less resources. In general, the following key factors limit performance of the overall
system:
1. Disk I/O performance
2. Available memory
3. CPU
For best performance, use RAID 10 configurations for all data drives and a 1-Gbps Ethernet network.
Site servers
M EM O RY A L LO C AT IO N F O R
SIT E C O N F IGURAT IO N C P U ( C O RES) M EM O RY ( GB ) SQ L SERVER ( % )
Management point 4 8 50
700, 000
C L IEN T S
( C EN T RA L
M IN IM UM 25, 000 50, 000 100, 000 150, 000 A DM IN IST RAT
DATA USA GE DISK SPA C E C L IEN T S C L IEN T S C L IEN T S C L IEN T S IO N SIT E)
For the Windows system disk, see sizing guidance for the installed OS version.
For content on distribution points, it depends upon your deployments. This guidance doesn't include the disk
space required for the content library on the site server or distribution points. For more information, see The
content library.
When you plan for disk space requirements, consider the following guidelines:
Each client requires about 5-10 MB of space in the database. This number depends upon the hierarchy
type, the configuration, and the number of clients. The size can be less for larger environments. Smaller
sites have greater database usage per client.
For the primary site's temp database, plan for a combined size that is 25% to 30% of the site database
.mdf file. The actual size can be smaller or larger. It depends on the performance of the site server and the
volume of incoming data over both short and long periods of time.
NOTE
When you have 50,000 or more clients at a site, plan to use four or more temp database .mdf files.
The temp database size for a central administration site is typically much smaller than for a primary site.
If you use SQL Server Express for the secondary site database, it limits the database size to 10 GB.
Clients
This section provides recommended hardware configurations for computers that you manage by using
Configuration Manager client software.
Client for Windows computers
The following minimum requirements are for Windows-based computers that you manage by using
Configuration Manager, including embedded editions:
Processor and memor y: Refer to the processor and RAM requirements for the OS.
Disk space: 500 MB of available disk space, with 5 GB recommended for the Configuration Manager
client cache. If you use customized settings to install the Configuration Manager client, less disk space is
required.
Use the client.msi property SMSCACHESIZE to set a cache size smaller than the default of 5120
MB. The minimum size is 1 MB. The following example creates a 2-MB cache:
CCMSetup.exe SMSCACHESIZE=2
TIP
Installing the client with minimal disk space is useful for Windows Embedded devices that typically have
smaller disk sizes than standard Windows computers.
The following minimum hardware requirements are for optional functionality in Configuration Manager:
OS deployment: At least 384 MB of RAM
Software Center : At least a 500-MHz processor
Remote Control: For an optimal experience, at least a Pentium 4 Hyper-Threaded 3 GHz (single core) or
comparable CPU, with at least 1-GB RAM.
DP I SET T IN G M IN IM UM RESO L UT IO N
Lab deployments
Use the following minimum hardware recommendations for lab and test deployments of Configuration
Manager. These recommendations apply to all site types, up to 100 clients:
RO L E C P U ( C O RES) M EM O RY ( GB ) DISK SPA C E ( GB )
Next steps
Site size and performance guidelines
Site size and performance FAQ
Configuration Manager site size and performance
guidelines
2/16/2022 • 17 minutes to read • Edit Online
NOTE
Customer usage data allows for testing current branch builds with the most common scenarios, configurations, and
settings for most customers. The recommendations in this article are based on these averages. Your experiences may vary
based on your environment size and configuration. In general, Configuration Manager requires common sense when it
comes to objects and intervals. Just because you can collect every file on a system, or set the interval for a cycle to one
minute, doesn't mean you should.
The following sections highlight some key settings and configurations to use when testing and modeling
processing needs for large enterprises. These guidelines help set basic system performance expectations for the
suggested hardware sizes.
Feature intervals settings
Most testing should use default intervals for the key cycles in the system. For example, hardware inventory
testing occurs once per week with a larger than default .mof file. Some recurring feature intervals, especially
hardware and software inventory cycles, can have significant effects on an environment's performance
characteristics. Environments that enable aggressive default intervals for data collection need oversized
hardware in direct proportion to the increase in activity. For example, say you have 25,000 desktop clients and
want to collect hardware inventory two times faster than the default interval. Start by sizing your site's hardware
as if you had 50,000 clients.
Objects
Tests should use the upper average of the objects that large enterprises tend to use with the system. Typical
values are thousands of collections and applications, which are deployed to hundreds of thousands of users or
systems. Tests should run simultaneously on all objects in the system at these limits. Many customers use
several features, but don't generally use all features of the product at these upper limits. Testing with all product
features helps ensure the best possible system-wide performance, and allows a buffer for features that some
customers may use above average.
Loads
Tests should also run on greater than standard average day loads, by doing simulations that generate peak
usage demands on the system. One example is simulating Patch Tuesday rollouts, to make sure the system can
return update compliance data promptly during these days of peak activity. Another example is simulating site
activity during a widespread malware outbreak, to ensure timely notification and response are possible.
Although deployed machines of the recommended size may be underused on any given day, more extreme
situations require some processing buffer.
Configurations
Run testing on a range of physical, Hyper-V, and Azure hardware, with a mixture of supported operating systems
and SQL Server versions. Always validate the worst cases for the supported configuration. In general, Hyper-V
and Azure return comparable performance results to equivalent physical hardware when configured similarly.
Current server operating systems tend to have performance that's equal to or better than earlier OS versions.
While all supported platforms meet the minimum requirements, usually the latest versions of supporting
products like Windows and SQL Server produce even better performance.
The largest variation comes from the SQL Server versions in use. For more information about SQL Server
versions, see What version of SQL Server should I run?.
While few aspects of Configuration Manager have official maximums or user interface limits that prevent
excessive usage, going beyond the guidelines can have significant adverse effects on a site's performance.
Exceeding recommended levels or ignoring sizing guidance typically requires larger hardware, and may render
your environment unmaintainable until you reduce the frequency or count of various objects.
Hardware inventory
To test baseline performance, set hardware inventory collection to once per week, with the default .mof file size
plus approximately 20% other properties. Don't enable all properties, and collect only properties you actually
need. Pay special attention when collecting properties, such as available virtual memory, that will always change
with every inventory cycle. Collecting these properties can cause excessive churn on every inventory cycle from
every client.
Software inventory
To test baseline performance, set software inventory collection to once per week, with product only details.
Collecting many files can place a significant strain on the inventory subsystem. Avoid specifying filters that
could end up collecting thousands of files across many clients, such as *.exe or *.dll .
Collections
Baseline performance testing can include several thousand collections with different kinds of scope, size,
complexity, and update settings. Site performance isn't a direct function of the sheer number of collections on a
site. Performance is also a cross-product of collections' query complexity, full and incremental updates and
change frequency, dependencies among collections, and numbers of clients in the collections.
Where possible, minimize collections that have expensive or complicated dynamic rule queries. For collections
that require these types of rules, set appropriate update intervals and update times to minimize the affect of
collection re-evaluation on the system. For example, update at midnight instead of 8:00 AM.
Enabling incremental updates on collections ensures quick and timely updates to collection membership. But
even though incremental updates are efficient, they still put load on the system. Balance the change frequency
you expect with the need for near real-time updates on membership. For example, say you expect heavy churn
in collection members, but you don't require near real-time membership updates. It's more efficient and
produces less load on the system to update the collection with a scheduled full update at some interval, than to
enable incremental updates.
When you enable incremental updates, reduce any scheduled full updates on the same collections. They're only
a backup method of evaluation, since incremental updates should keep your collection membership updated in
near real time. Best practices for collections recommends a maximum number of total collections for
incremental updates, but as the article points out, your experience can vary based on many factors.
Collections with only direct membership rules and with a limiting collection that isn't doing incremental updates
don't need scheduled full updates. Disable update schedules for these types of collections to prevent
unnecessary load on the system. If the limiting collection uses incremental updates, collections with only direct
membership rules may not reflect membership updates for up to 24 hours, or until a scheduled refresh takes
place.
While not a best practice, some organizations create hundreds or even thousands of collections as part of
various business processes. If you use automation to create collections, it's important to enable any needed
incremental updates correctly. Minimize and spread out any full update schedules to avoid hot spots of
collection evaluation during a single time period. Establish a regular grooming process to delete unused
collections, especially if you automatically create collections that you no longer need after some time.
Remember that Configuration Manager creates policies for all objects in your collections when you target tasks
like deployments to them. Membership changes, either through scheduled refresh or incremental updates, can
create much more work for the whole system. The latest current branch builds have special policy optimizations
for the All Systems and All Users collections. When targeting your entire enterprise, use the built-in collections
instead of a clone of these built-in collections.
To investigate collection performance even deeper, view collection evaluation in the console. For more
information, see How to view collection evaluation.
Discovery methods
For baseline performance testing, run server-based discovery methods once a week, enabling delta discovery as
appropriate to keep the data fresh during the week. The tests should discover an object quantity proportional to
the simulated enterprise size. The performance baseline test for heartbeat discovery should also run once a
week.
Discovery data is global data. A common performance-related problem is to misconfigure server-based
discovery methods in a hierarchy, causing duplicate discovery of the same resources from multiple primary
sites. Carefully configure discovery methods to optimize communication with the target service, such as Active
Directory domain controllers, while avoiding duplication of the same discovery scope on multiple primary sites.
NOTE
All testing sets machine power plans to allow maximum CPU power consumption and performance.
del G:\\test\testfile.dat
4. Review the output from the second test to find the total IOPS in the I/O per s column. In the following
example, the total IOPS are 3929.18 .
Total IO
| thread | bytes | I/Os | MB/s | I/O per s | AvgLat | LatStdDev |
|--------|-------------|---------|--------|-----------|--------|-----------|
| 1 | 9651814400 | 147275 | 30.68 | 490.92 | 16.294 | 10.210 |
| 2 | 9676652544 | 147654 | 30.76 | 492.18 | 16.252 | 9.998 |
| 3 | 9638248448 | 147068 | 30.64 | 490.23 | 16.317 | 10.295 |
| 4 | 9686089728 | 147798 | 30.79 | 492.66 | 16.236 | 10.072 |
| 5 | 9590931456 | 146346 | 30.49 | 487.82 | 16.398 | 10.384 |
| 6 | 9677242368 | 147663 | 30.76 | 492.21 | 16.251 | 10.067 |
| 7 | 9637330944 | 147054 | 30.64 | 490.18 | 16.319 | 10.249 |
| 8 | 9692577792 | 147897 | 30.81 | 492.99 | 16.225 | 10.125 |
| Total: | 77250887680 | 1178755 | 245.57 | 3929.18 | 16.286 | 10.176 |
DISK C O UN T, N OT
DISK T Y P E IN C L UDIN G +1 SPA RE DISK RA ID IO P S M EA SURED
The following table lists the specific devices used in this example. This information isn't a recommendation for
any specific hardware model or manufacturer.
C A C H E M EM O RY A N D
DISK T Y P E M O DEL RA ID C O N T RO L L ER C O N F IGURAT IO N
15k RPM SAS HD HP EH0300JDYTH Smart Array P822 2 GB, 20% Read / 80%
Write
SSD SATA ATA MK0200GCTYV Smart Array P420i 1 GB, 20% Read / 80%
Write
SSD SAS HP MO0800 JEFPB Smart Array P420i 1 GB, 20% Read / 80%
Write
AVA IL A B L E L IM IT IN G
A Z URE VM A Z URE DISK DISK C O UN T SPA C E IO P S M EA SURED FA C TO R
For more information on the currently available disks, see Select a disk type for Azure IaaS VMs.
See also
Site sizing and performance FAQ
Configuration Manager on Azure frequently asked questions
Size and scale numbers
Recommended hardware
Choose a device management solution
2/16/2022 • 3 minutes to read • Edit Online
Microsoft offers different solutions for managing PCs, servers, and devices. These solutions are available on-
premises, cloud-based, or a combination of both. Choose the solution that's right for the business requirements
of your organization. Base your decision on the device platforms you need to manage and the management
functionality you need.
Overview
There are several Microsoft solutions that might work best for you in different scenarios. You don't need to
choose just one.
For a small organization, a tool like the Windows administration center may be a great fit.
Approximately 75% of IT organizations use Configuration Manager to manage their devices.
Microsoft Azure provides various solutions from the cloud or on-premises with Azure Stack that primarily
target server management.
Microsoft Intune provides cloud management of clients.
You can combine Configuration Manager and Intune with co-management.
Use the following table to help compare these management technologies:
Hyper-V host Not applicable - Azure Stack - Azure Stack - Azure Stack
- Windows Admin - Windows Admin - Windows Admin
Center Center Center
- Virtual Machine - Virtual Machine - Virtual Machine
Manager Manager Manager
Windows Ser ver - Azure management - Azure management - Azure management Configuration
- Configuration - Configuration - Configuration Manager
Manager Manager Manager
Azure Vir tual Configuration Not applicable Not applicable Not applicable
Desktop Manager
Client management
This section compares the following four client management solutions:
Configuration Manager client
On-premises mobile device management (MDM) with Configuration Manager
Co-management with Microsoft Intune
Microsoft Exchange
You can use these solutions by themselves or in combination with each other. For example, use the client-based
management approach to manage the computers and servers in your organization, and also use co-
management to manage internet-based laptops. By combining approaches this way, you can cover all of your
device management needs.
There are also two tables that compare the management solutions by the following factors:
Compare by supported platforms
Compare by management functionality
Configuration Manager client
This option requires installation of the Configuration Manager client on devices. It provides the most features for
managing PCs, servers, and other devices in your environment.
For more information, see Client installation methods.
On-premises MDM
This option uses the device management capabilities built into Windows 10 or later. While not as full-featured as
client-based management, on-premises MDM provides a lighter touch approach to management. It uses on-
premises Configuration Manager resources to manage devices.
For more information, see Manage mobile devices with on-premises infrastructure.
Co -management with Microsoft Intune
Co-management is one of the primary ways to attach your existing Configuration Manager deployment to the
Microsoft 365 cloud. It enables you to concurrently manage Windows devices by using both Configuration
Manager and Microsoft Intune. Co-management lets you cloud-attach your existing investment in Configuration
Manager by adding new functionality.
For more information, see What is co-management?.
Microsoft Exchange
This option uses the Exchange Server connector to connect multiple Exchange servers to Configuration
Manager. It centralizes management of devices that can connect to Exchange ActiveSync. You can configure
Exchange mobile device management features from the Configuration Manager console. Example features
include remote device wipe and the settings control for multiple Exchange servers.
For more information, see Manage mobile devices with Configuration Manager and Exchange.
Compare solutions by supported platforms
C O N F IGURAT IO N
C O N F IGURAT IO N M A N A GER W IT H
P L AT F O RM M A N A GER C L IEN T O N - P REM ISES M DM EXC H A N GE IN T UN E
OS deployment Yes
NOTE
When planning a new installation of Configuration Manager, be aware of the release notes, which detail current issues in
the active versions. The release notes apply to all branches of Configuration Manager. When you use the technical preview
branch, find issues specific to that branch in the documentation for each version of the technical preview.
Hierarchy topology
Hierarchy topologies range from:
Simplest: A single standalone primary site
Most complex: A group of connected primary and secondary sites with a central administration site at the
top-level site of the hierarchy
The key driver of the type and count of sites that you use in a hierarchy is usually the number and type of
devices you must support.
Standalone primary site
Use a standalone primary site when it can support management of all devices and users. For more information,
see Sizing and scale numbers. This topology is also successful when your company's geographic locations can
be served by a single primary site. To help manage network traffic, use multiple management points in
boundary groups, and a carefully planned content infrastructure. For more information, see Configure boundary
groups and Fundamental concepts for content management.
This topology provides the following benefits:
Simplified administrative overhead
Simplified client site assignment and discovery of available resources and services
Elimination of possible delays introduced by database replication between sites
Option to expand a standalone primary site into a larger hierarchy with a central administration site. This
option enables you to then install new primary sites to expand the scale of your deployment.
Central administration site with one or more child primary sites
Use this topology when you require more than one primary site to support management of all your devices and
users. It's required when you need to use more than a single primary site.
This topology provides the following benefits:
It supports up to 25 primary sites that enable you to extend the scale of your hierarchy.
You always use the central administration site, unless you reinstall your sites. This option is permanent.
You can't detach a child primary site to make it a standalone primary site.
Next steps
Review the following articles for site-specific configurations:
Plan for the SMS Provider
Plan for the site database
Plan for site system servers and site system roles
Plan for security
Managing network bandwidth when deploying content within a site
Consider configurations that span sites and hierarchies
High availability options for sites and hierarchies
Extend the Active Directory schema and configure sites to publish site data
Data transfers between sites
Fundamentals of role-based administration
Manage clients on the internet
Plan for the SMS Provider
2/16/2022 • 10 minutes to read • Edit Online
About
The SMS Provider is a Windows Management Instrumentation (WMI) provider that assigns read and write
access to the Configuration Manager database at a site.
Each CAS and primary site require at least one SMS Provider. You can install more providers as needed.
The SMS Admins security group provides access to the SMS Provider. Configuration Manager
automatically creates this group on the site server, and on each computer where you install an instance of
the SMS Provider. For more information, see SMS Admins.
Secondary sites don't support the SMS Provider role.
Configuration Manager administrative users use an SMS Provider to access information that's stored in the
database. To do so, admins can use the Configuration Manager console, Resource Explorer, tools, and custom
scripts. The SMS Provider doesn't interact with Configuration Manager clients. When a Configuration Manager
console connects to a site, it queries WMI on the site server to locate an instance of the SMS Provider to use.
The SMS Provider helps enforce Configuration Manager security. It returns only the information that the console
user is authorized to view.
The SMS Provider also provides API interoperability access over HTTPS, called the administration ser vice .
This REST API can be used in place of a custom web service to access information from the site. For more
information, see What is the administration service?.
IMPORTANT
When each instance of the SMS Provider for a site is offline, Configuration Manager consoles can't connect to the site.
For more information about how to manage the SMS Provider, see Manage the SMS Provider.
Prerequisites
The SMS Provider has the following prerequisites:
In the same domain as the site server and the site database site systems
Can't have a site system role from a different site
Can't already have an SMS Provider from any site
Run a supported OS version
At least 650 MB of free disk space to support the Windows ADK components. For more information
about Windows ADK and the SMS Provider, see OS deployment requirements.
For the administration service REST API:
Starting in version 2107, the SMS Provider requires .NET version 4.6.2, and version 4.8 is
recommended. In version 2103 and earlier, this role requires .NET 4.5 or later. For more
information, Site and site system prerequisites.
In version 2006 and earlier, enable the Windows server role Web Ser ver (IIS) . Starting in version
2010, this role is no longer required.
NOTE
Every SMS Provider attempts to install the administration service, which requires a certificate. This service
has a dependency on IIS to bind that certificate to HTTPS port 443. If you enable Enhanced HTTP, then
the site binds that certificate using IIS APIs. If your site uses PKI, you need to manually bind a PKI
certificate in IIS on the SMS Provider. Unless the server already has a PKI-based certificate, the site
automatically uses the site's self-signed certificate.
Locations
When you install a site, you automatically install the first SMS Provider for the site. You can specify any of the
following supported locations for the SMS Provider:
The site server
The site database server
Another server, which meets the installation prerequisites
To view the locations of each SMS Provider for a site:
1. In the Configuration Manager console, go to the Administration workspace, expand Site
Configuration , and then select the Sites node.
2. Select a site from the list, and then choose Proper ties in the ribbon.
3. On the General tab of the site Proper ties , view the SMS Provider location field.
Each SMS Provider supports simultaneous connections from multiple requests. The only limitations on these
connections are the number of server connections that are available to Windows, and the available resources on
the server to service the connection requests.
After you install a site, you can run Configuration Manager setup on the site server again. Use setup to change
the location of an existing SMS Provider, or to install more SMS Providers at that site. Install only one SMS
Provider on a computer. A computer can't host an SMS Provider from more than one site.
Choosing a location
The following sections describe the advantages and disadvantages of installing an SMS Provider on each
supported location:
Configuration Manager site server
Advantages:
The SMS Provider doesn't use the system resources of the site database computer.
This location can provide better performance than an SMS Provider located on a computer other
than the site server or site database computer.
Disadvantages:
The SMS Provider uses system and network resources that could be dedicated to site server
operations.
SQL Server that hosts the site database
Advantages:
The SMS Provider doesn't use system resources on the site server.
This location can provide the best performance of the three locations, if sufficient server resources
are available.
Disadvantages:
The SMS Provider uses system and network resources that could be dedicated to site database
operations.
When the site database is hosted on a clustered instance of SQL Server, you can't use this location.
Computer other than the site server or site database server
Advantages:
SMS Provider doesn't use site server or site database system resources.
This type of location lets you deploy more SMS Providers to provide high availability for
connections.
Disadvantages:
The SMS Provider performance might be reduced. This behavior is because of the more network
activity that it requires to coordinate with the site server and the site database computer.
This server must be always accessible to the site database server, and to all computers with the
Configuration Manager console installed.
This location can use system resources that would otherwise be dedicated to other services.
Authentication
You can specify the minimum authentication level for administrators to access Configuration Manager sites. This
feature enforces administrators to sign in to Windows with the required level before they can access
Configuration Manager. It applies to all components that access the SMS Provider. For example, the
Configuration Manager console, SDK methods, and Windows PowerShell cmdlets.
Configuration Manager supports the following authentication levels:
Windows authentication : Require authentication with Active Directory domain credentials. This setting
is the previous behavior, and the current default setting.
Cer tificate authentication : Require authentication with a valid certificate that's issued by a trusted PKI
certificate authority. You don't configure this certificate in Configuration Manager. Configuration Manager
requires the administrator to be signed into Windows using PKI.
Windows Hello for Business authentication : Require authentication with strong two-factor
authentication that's tied to a device and uses biometrics or a PIN. For more information, see Windows
Hello for Business.
IMPORTANT
When you select this setting, the SMS Provider and administration service require the user's authentication token
to contain a multi-factor authentication (MFA) claim from Windows Hello for Business. In other words, a user of
the console, SDK, PowerShell, or administration service has to authenticate to Windows with their Windows Hello
for Business PIN or biometric. Otherwise the site rejects the user's action.
This behavior is for Windows Hello for Business, not Windows Hello.
For more information on how to configure this setting, see Configure SMS Provider authentication.
When you first connect a Configuration Manager console to a site, the connection queries WMI on the site
server. This query identifies an instance of the SMS Provider that the console uses. This specific instance of the
SMS Provider remains in use by the console until the session ends. If the session ends because the SMS
Provider server is unavailable on the network, when you reconnect the console to the site, it repeats the initial
query. It's possible the site assigns the same SMS Provider instance that's not available. If this behavior occurs,
attempt to reconnect the console until the site returns an available SMS Provider.
OS deployment requirements
The computer where you install an instance of the SMS Provider requires a supported version of the Windows
ADK.
For more information about this requirement, see Infrastructure requirements for OS deployment and Support
for the Windows ADK.
When you manage OS deployments, the Windows ADK allows the SMS Provider to complete various tasks, such
as:
View WIM file details
Add driver files to existing boot images
Create boot ISO files
The Windows ADK installation can require up to 650 MB of free disk space on each computer that installs the
SMS Provider. This high disk space requirement is necessary for Configuration Manager to install the Windows
PE boot images.
Administration service
The SMS Provider provides API interoperability access over an HTTPS OData connection, called the
administration ser vice . This REST API can be used in place of a custom web service to access information
from the site.
For more information, see What is the administration service?
Next steps
Manage the SMS Provider
Configure authentication for the SMS Provider
Plan for the site database
Plan for the site database for Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
IMPORTANT
Starting in November 2021, this feature of Configuration Manager is deprecated. For more information, see Introduction
to asset intelligence in Configuration Manager.
A site system role that connects to Microsoft to download information for the Asset Intelligence catalog. This
role also uploads uncategorized titles, so that Microsoft can consider them for future inclusion in the catalog. A
hierarchy supports only a single instance of this role at the top-tier site of your hierarchy. If you expand a
standalone primary site into a larger hierarchy, uninstall this role from the primary site. Then install it at the
central administration site.
For more information, see Asset Intelligence in Configuration Manager.
Certificate registration point
A site system role that communicates with a server that runs the Network Device Enrollment Service (NDES).
This role manages device certificate requests that use the Simple Certificate Enrollment Protocol (SCEP). This
role is supported only at primary sites and the central administration site.
Although a single certificate registration point can provide functionality to an entire hierarchy, you may want to
install multiple instances of this role at a site, and at multiple sites in the same hierarchy. This design helps with
load balancing. When multiple instances exist in a hierarchy, clients are randomly assigned to one of the
certificate registration points.
Each certificate registration point requires access to a separate NDES instance. You can't configure two or more
certificate registration points to use the same NDES instance. Additionally, don't install the certificate registration
point on the same server that runs NDES.
Cloud management gateway connection point
A site system role for communicating with the cloud management gateway.
Data warehouse service point
Use the data warehouse service point to store and report on long-term historical data in your Configuration
Manager environment. For more information, see Data warehouse.
Distribution point
A site system role that contains source files for clients to download, for example:
Application content
Software packages
Software updates
OS images
Boot images
By default, this role installs on the site server when you install a new primary or secondary site. This role isn't
supported at a central administration site. Install multiple instances of this role at a supported site, and at
multiple sites in the same hierarchy. For more information, see Fundamental concepts for content management,
and Manage content and content infrastructure.
Endpoint Protection point
A site system role that Configuration Manager uses to accept the Endpoint Protection license terms, and to
configure the default membership for Cloud Protection Service. A hierarchy only supports a single instance of
this role, and that must be at the top-tier site. If you expand a standalone primary site into a larger hierarchy,
uninstall this role from the primary site, and then install it at the central administration site. For more
information, see Endpoint Protection in Configuration Manager.
Enrollment point
IMPORTANT
With the deprecation of on-premises MDM and the Configuration Manager client for macOS, this site system role is also
deprecated. For more information, see Removed and deprecated features for Configuration Manager.
A site system role that uses PKI certificates for Configuration Manager to enroll mobile devices and macOS
computers. Although this role is supported only at primary sites, you can install multiple instances of this role at
a site, or at multiple sites in the same hierarchy.
If a user enrolls mobile devices by using Configuration Manager, and the user's Active Directory account is in a
forest that's untrusted by the site server's forest, install an enrollment point in the user's forest. Then
Configuration Manager can authenticate the user.
Enrollment proxy point
IMPORTANT
With the deprecation of on-premises MDM and the Configuration Manager client for macOS, this site system role is also
deprecated. For more information, see Removed and deprecated features for Configuration Manager.
A site system role that manages Configuration Manager enrollment requests from mobile devices and macOS
computers. Although this role is supported only at primary sites, you can install multiple instances of this role at
a site, or at multiple sites in the same hierarchy.
When you support mobile devices on the internet, install an enrollment proxy point in a perimeter network, and
install one on the intranet.
Exchange Server connector
For information about this role, see Manage mobile devices with Configuration Manager and Exchange.
Fallback status point
A site system role that helps you monitor client installation. It identifies clients that are unmanaged because they
can't communicate with their management point. Although this role is supported only at primary sites, you can
install multiple instances of this role at a site, and at multiple sites in the same hierarchy.
Management point
A site system role that provides policy and service location information to clients. It also receives configuration
data from clients.
By default, this role installs on the site server when you install a new primary or secondary site. Primary sites
support multiple instances of this role. Secondary sites support a single management point. Also referred to as
a proxy management point, this role at a secondary site provides a local point of contact for clients to obtain
computer and user policies.
Set up management points to support either HTTP or HTTPs. They can also support mobile devices that you
manage with Configuration Manager on-premises mobile device management (MDM). To help reduce the
processing load placed on the site database server by management points as they service requests from clients,
use Database replicas for management points.
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
Next steps
Some Configuration Manager site system roles require connections to the internet. If your environment requires
internet traffic to use a proxy server, configure these site system roles to use the proxy. For more information,
see Proxy server support.
Fundamental concepts for content management in
Configuration Manager
2/16/2022 • 15 minutes to read • Edit Online
TIP
For more information about the content distribution process and to find help in diagnosing and resolving general content
distribution problems, see Understanding and Troubleshooting Content Distribution in Microsoft Configuration Manager.
The following sections are key concepts for content management. When a concept requires additional or
complex information, links are provided to direct you to those details.
Reporting Client data sources Client data sources Client data sources
dashboard dashboard dashboard
Supported content All ConfigMgr content Windows updates, drivers, All ConfigMgr content
store apps
Policy control Client agent settings Client agent settings Client agent settings
(partial)
Recommendations
Modern management: If you're already using modern tools such as Intune, implement Delivery
Optimization
Configuration Manager and co-management: Use a combination of peer cache and Delivery
Optimization. Use peer cache with on-premises distribution points, and use Delivery Optimization for
cloud scenarios.
Existing BranchCache implemented: Use all three technologies in parallel. Use peer cache and Delivery
Optimization for scenarios that aren't supported by BranchCache.
BranchCache
BranchCache is a Windows technology. Clients that support BranchCache, and have downloaded a deployment
that you configure for BranchCache, then serve as a content source to other BranchCache-enabled clients.
For example, you have a distribution point that runs Windows Server 2012 or later, and is configured as a
BranchCache server. When the first BranchCache-enabled client requests content from this server, the client
downloads that content and caches it.
That client then makes the content available for additional BranchCache-enabled clients on the same subnet
that also cache the content.
Other clients on the same subnet don't have to download content from the distribution point.
The content is distributed across multiple clients for future transfers.
For more information, see Support for Windows BranchCache.
Delivery Optimization
You use Configuration Manager boundary groups to define and regulate content distribution across your
corporate network and to remote offices. Windows Delivery Optimization is a cloud-based, peer-to-peer
technology to share content between Windows 10 or later devices. Configure Delivery Optimization to use your
boundary groups when sharing content among peers. Client settings apply the boundary group identifier as the
Delivery Optimization group identifier on the client. When the client communicates with the Delivery
Optimization cloud service, it uses this identifier to locate peers with the content. For more information, see
delivery optimization client settings.
Delivery Optimization is the recommended technology to optimize Windows update delivery of express
installation files for Windows quality updates. Internet access to the Delivery Optimization cloud service is a
requirement to utilize its peer-to-peer functionality. For information about the needed internet endpoints, see
Frequently asked questions for Delivery Optimization. Optimization can be used for all Windows updates. For
more information, see optimize Windows update delivery.
NOTE
This feature was previously known as Delivery Optimization In-Network Cache.
This cache server acts as an on-demand transparent cache for content downloaded by Delivery Optimization.
Use client settings to make sure this server is offered only to the members of the local Configuration Manager
boundary group.
This cache is separate from Configuration Manager's distribution point content. If you choose the same drive as
the distribution point role, it stores content separately.
For more information, see Microsoft Connected Cache in Configuration Manager.
Peer cache
Client peer cache helps you manage deployment of content to clients in remote locations. Peer cache is a built-in
Configuration Manager solution that enables clients to share content with other clients directly from their local
cache.
First deploy client settings that enable peer cache to a collection. Then members of that collection can act as a
peer content source for other clients in the same boundary group.
Client peer cache sources can divide content into parts. These parts minimize the network transfer to reduce
WAN utilization. The management point provides more detailed tracking of the content parts. It tries to
eliminate more than one download of the same content per boundary group.
For more information, see Peer cache for Configuration Manager clients.
Windows LEDBAT
Windows Low Extra Delay Background Transport (LEDBAT) is a network congestion control feature of Windows
Server to help manage background network transfers. For distribution points running on supported versions of
Windows Server, enable an option to help adjust network traffic. Then clients only use network bandwidth when
it's available.
For more information on Windows LEDBAT in general, see the New transport advancements blog post.
For more information on how to use Windows LEDBAT with Configuration Manager distribution points, see the
setting to Adjust the download speed to use the unused network bandwidth (Windows LEDBAT)
when you Configure the general settings of a distribution point.
Client locations
The following are locations that clients access content from:
Intranet (on-premises):
Distribution points can use HTTP or HTTPs.
Only use a content-enabled cloud management gateway for fallback when on-premises
distribution points aren't available.
Internet :
Requires internet-facing distribution points to accept HTTPS.
Can use a content-enabled cloud management gateway.
Workgroup :
Requires distribution points to accept HTTPS.
Can use a content-enabled cloud management gateway.
Content library
The content library is the single-instance store of content in Configuration Manager. This library reduces the
overall size of content that you distribute.
Learn more about the content library.
Use the content library cleanup tool to remove content that is no longer associated with an application.
Distribution points
Configuration Manager uses distribution points to store files that are required for software to run on client
computers. Clients must have access to at least one distribution point from which they can download the files
for content that you deploy.
The basic (non-specialized) distribution point is commonly referred to as a standard distribution point. There are
two variations on the standard distribution point that receive special attention:
Pull-distribution point : A variation of a distribution point where the distribution point obtains content
from another distribution point (a source distribution point). This process is similar to how clients
download content from distribution points. Pull-distribution points can help you avoid network
bandwidth bottlenecks that occur when the site server must directly distribute content to each
distribution point. For more information, see Use a pull-distribution point.
Content-enabled cloud management gateway : A variation of a distribution point that's installed on
Microsoft Azure. For more information, see Cloud management gateway overview.
Standard distribution points support a range of configurations and features:
Use controls such as schedules or bandwidth throttling to help control this transfer.
Use other options, including prestaged content , and pull-distribution points to minimize and
control network consumption.
BranchCache , peer cache , and Deliver y Optimization are peer-to-peer technologies to reduce the
network bandwidth that's used when you deploy content.
There are different configurations for OS deployments, such as PXE and Multicast
Options for mobile devices
Cloud and pull distribution points support many of these same configurations, but have limitations that are
specific to each distribution point variation.
NOTE
Pull-distribution points also use a concept of priority to order the sequence of their source distribution points.
The distribution point priority for content transfers to the server is distinct from the priority that pull-distribution
points use. Pull-distribution points use their priority when they search for content from a source distribution point.
For more information, see Use a pull-distribution point.
Fallback
Several things have changed with Configuration Manager current branch in the way that clients find a
distribution point that has content, including fallback.
Clients that can't find content from a distribution point that's associated with their current boundary group fall
back to use content source locations associated with neighbor boundary groups. To be used for fallback, a
neighbor boundary group must have a defined relationship with the client's current boundary group. This
relationship includes a configured time that must pass before a client that can't find content locally includes
content sources from the neighbor boundary group as part of its search.
The concepts of preferred distribution points are no longer used, and settings for Allow fallback source
locations for content are no longer available or enforced.
For more information, see Boundary groups.
Network bandwidth
To help manage the amount of network bandwidth that's used when you distribute content, you can use the
following options:
Prestaged content : Transferring content to a distribution point without distributing the content across
the network.
Scheduling and throttling : Configurations that help you control when and how content is distributed
to distribution points.
For more information, see Manage network bandwidth.
Prestage content
Prestaging content is a process of transferring content to a distribution point without distributing the content
across the network.
For more information, see Manage network bandwidth.
Use a pull-distribution point with Configuration
Manager
2/16/2022 • 8 minutes to read • Edit Online
Distribution process
When you distribute content to a pull-distribution point, the following sequence of events occurs:
Once you distribute content to a pull-distribution point in the console, the Package Transfer Manager
component on the site server checks the site database to confirm if the content is available on a source
distribution point. If it can't confirm that the content is on a source distribution point for the pull-
distribution point, it repeats the check every 20 minutes until the content is available.
When the Package Transfer Manager confirms that the content is available, it notifies the pull-distribution
point to download the content. If this notification fails, it retries based on the Software Distribution
component Retr y settings for pull-distribution points. When the pull-distribution point receives this
notification, it tries to download the content from its source distribution points.
While the pull-distribution point downloads the content, the Package Transfer Manager polls the status
based on the Software Distribution component Status polling settings for pull-distribution points.
When the pull-distribution point completes the download of content, it submits this status to a
management point.
NOTE
When the Package Transfer Manager cancels a job because it exceeds the number of polling retries, the pull-
distribution point continues to download the content. When it finishes, the pull-distribution point sends the
appropriate status message, and the console reflects the new status.
Limitations
You can't configure a content-enabled cloud management gateway as a pull-distribution point.
You can't configure the distribution point role on a site server as a pull-distribution point.
The prestage content configuration overrides the pull-distribution point configuration. If you turn on the
option to Enable this distribution point for prestaged content on a pull-distribution point, it waits
for the content. It doesn't pull content from the source distribution point. Like a standard distribution
point enabled for prestaged content, it doesn't receive content from the site server. For more information,
see Prestaged content.
A pull-distribution point doesn't use schedule or rate limit configurations. When you configure a
previously installed distribution point to be a pull-distribution point, configurations for schedule and rate
limits are saved, but not used. If you later remove the pull-distribution point configuration, the schedule
and rate limit configurations are implemented as previously configured.
NOTE
The Schedule and Rate Limits tabs aren't visible in the properties of the distribution point.
Pull-distribution points don't use the settings on the General tab of the Software Distribution
Component Proper ties for each site. These settings include Concurrent distribution and Multicast
retr y .
To transfer content from a source distribution point in a remote forest, install the Configuration Manager
client on the pull-distribution point. Also configure a network access account that can access the source
distribution point. If you enable the site option to Use Configuration Manager-generated
cer tificates for HTTP site systems , then you don't need a network access account.
If the pull-distribution point is also a Configuration Manager client, the client version must be the same as
the Configuration Manager site that installs the pull-distribution point. The pull-distribution point uses
the CCMFramework that is common to both the pull-distribution point and the Configuration Manager
client.
NOTE
This feature does incur charges to your Azure subscription for data storage and network egress. For more
information, see the Cost of CMG.
TIP
When a pull-distribution point downloads content from a source distribution point, that pull-distribution point is counted
as a client in the Client Accessed (Unique) column of the Distribution point usage summar y report.
Source priorities
Assign a separate priority to each source distribution point, or assign multiple source distribution points
to the same priority.
The priority determines the order in which the pull-distribution point requests content from its source
distribution points.
Pull-distribution points initially contact a source distribution point with the lowest value for priority. If
there are multiple source distribution points with the same priority, the pull-distribution point randomly
selects one of the sources with that priority.
If the content isn't available on a selected source, the pull-distribution point then tries to download the
content from another distribution point with that same priority.
If none of the distribution points with a given priority has the content, the pull-distribution point tries to
download the content from a source distribution point with the next priority level. It continues this search
until the content is located.
If none of the assigned source distribution points have the content, the pull-distribution point waits for 30
minutes, and then starts the process again.
NOTE
If you install a pull-distribution point on a workstation OS, the client enables BITS with the default settings. This
behavior happens even if the client settings are set to disable BITS. These default settings may not be optimum for
a pull-distribution point. Review the client settings and group policies for BITS that you apply to devices that you
enable as a pull-distribution point.
For operational details, see the following log files on the pull-distribution point:
DataTransferSer vice.log
PullDP.log
TIP
If you see HTTP 403 errors in the log files after you add up a pull-distribution point, make the following change:
1. On the source distribution point, set the following registry value:
HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL, ClientAuthTrustMode = 2 (REG_DWORD)
2. Restart the source distribution point server.
Then the pull distribution point should start downloading content from the source. For more information on this registry
key, see Overview of TLS - SSL (Schannel SSP).
See also
Fundamental concepts for content management
The content library in Configuration Manager
2/16/2022 • 7 minutes to read • Edit Online
NOTE
To move the content library to a different location on a distribution point after the installation, use the Content Librar y
Transfer tool in the Configuration Manager tools. For more information, see the Content Library Transfer tool.
NOTE
When you create content at a primary site, and then distribute it to a different primary site or a secondary site below a
different primary site, the CAS temporarily stores that content in its scheduler inbox. It doesn't add that content to its
content library.
Use the following options to manage the content library on the CAS:
To prevent the content library from being installed on a specific drive, create an empty file named
NO_SMS_ON_DRIVE.SMS . Copy it to the root of the drive before the content library is created.
After the content library has been created, use the Content Librar y Transfer tool from the
Configuration Manager tools to manage the location of the content library. For more information, see the
Content Library Transfer tool.
NOTE
Content-enabled cloud management gateways don't use single-instance storage. The site encrypts packages before
sending to Azure, and each package has a unique encrypted key. Even if two files were identical, the encrypted versions
wouldn't be the same.
By default, the content library is stored on the root of a drive in a folder called SCCMContentLib . This folder is
shared by default as SCCMContentLib$ . The folder and share have restricted permissions to prevent
accidental damage. All changes should be made from the Configuration Manager console. Within this folder are
the following objects:
The package library (PkgLib folder): Information about what packages are present on the distribution
point.
The data library (DataLib folder): Information about the original structure of the packages.
The file library (FileLib folder): The original files in the package. This folder is typically what uses the bulk
of the storage.
TIP
Use the Content Librar y Explorer tool from the Configuration Manager tools to browse the contents of the content
library. You can't use this tool to modify the contents. It provides insight into what's present, as well as allowing validation
and redistribution. For more information, see the Content Library Explorer.
Package library
The package library folder, PkgLib , includes one file for each package distributed to the distribution point. The
file name is the package ID, for example, ABC00001.INI . In this file under the [Packages] section is a list of
content IDs that are part of the package, as well as other information such as the version. For example,
ABC00001 is a legacy package at version 1 . The content ID in this file is ABC00001.1 .
Data library
The data library folder, DataLib , includes one file and one folder for each of the contents in each package. For
example, this file and folder are named ABC00001.1.INI and ABC00001.1 , respectively. The file includes
information for validation. The folder recreates the folder structure from the original package.
The files in the data library are replaced by INI files with the name of the original file in the package. For
example, MyFile.exe.INI . These files include information about the original file, such as the size, time modified,
and the hash. Use the first four characters of the hash to locate the original file in the file library. For example,
the hash in MyFile.exe.INI is DEF98765 , and the first four characters are DEF9 .
File library
If the content library spans across multiple drives, the package files could be in the file library folder, FileLib , on
any of these drives.
Locate a specific file using the first four characters from the hash found in the data library. Inside the file library
folder are many folders, each with a four-character name. Find the folder that matches the first four characters
from the hash. Once you find this folder, it includes one or more sets of three files. These files share the same
name, but one has the extension INI, one has the extension SIG, and one has no file extension. The original file is
the one with no extension whose name is equal to the hash from the data library.
For example, folder DEF9 includes DEF98765.INI , DEF98765.SIG , and DEF98765 . DEF98765 is the original
MyFile.exe . The INI file includes a list of "users" or content IDs that share the same file. The site doesn't remove
a file unless all of these contents are also removed.
Drive spanning
The content library can be spanned across multiple drives. You choose these drives when creating the
distribution point. By default, Configuration Manager automatically chooses the drives when spanning the
content library.
When you choose the drives, select a primary and secondary drive. The site stores all metadata on the primary
drive. It only spans the file library across to the secondary drive. The folder's share name for secondary drives
includes the drive letter. For example, if D: and E: are secondary drives for the content library, the share names
are SCCMContentLibD$ and SCCMContentLibE$ .
If you chose the Automatic option, Configuration Manager selects the drive with the most available free space
as its primary drive. It stores all of the metadata on this drive. The site only spans the file library across to
secondary drives.
You specify a reserve space amount during configuration. Configuration Manager attempts to use a secondary
disk once the best available disk has only this reserve space amount left free. Each time a new drive is selected
for use, the drive with the most available free space is selected.
You can't specify that a distribution point should use all drives except for a specific set. Prevent this behavior by
creating an empty file on the root of the drive, called NO_SMS_ON_DRIVE.SMS . Place this file before Configuration
Manager selects the drive for use. If Configuration Manager detects this file on the root of the drive, it doesn't
use the drive for the content library.
Troubleshoot
The following tips may help you troubleshoot issues with the content library:
Review the logs on the site server (distmgr.log and PkgXferMgr.log ) and the distribution point
(smsdpprov.log ) for any pointers to the failures.
Use the Content Library Explorer tool.
Check for file locks by other processes, such as antivirus software. Exclude the content library on all
drives from automatic antivirus scans, as well as the temporary staging directory, SMS_DP$ , on each
drive.
To see if there are any hash mismatches, validate the package from the Configuration Manager console.
As a last option, redistribute the content. This action should resolve most issues.
For more in-depth information, see Understand and troubleshoot content distribution.
Next steps
Configure a remote content library for the site server
Flowchart - Manage content library
Configure a remote content library for the site
server
2/16/2022 • 5 minutes to read • Edit Online
TIP
Also plan for managing package source content, which is external to the content library. Every software object in
Configuration Manager has a package source on a network share. Consider centralizing all sources to a single share, but
make sure this location is redundant and highly available.
If you move the content library to the same storage volume as your package sources, you can't mark this volume for data
deduplication. While the content library supports data deduplication, the package sources volume doesn't support it. For
more information, see Data deduplication.
Prerequisites
The site server computer account needs Full control permissions to the network path to which you're
moving the content library. This permission applies to both the share and the file system. No components
are installed on the remote system.
The site server can't have the distribution point role. The distribution point also uses the content library,
and this role doesn't support a remote content library. After moving the content library, you can't add the
distribution point role to the site server.
NOTE
The Manage Content Librar y option isn't available if the distribution point role exists on the site server. To
enable the option, remove the distribution point role from the site server.
The remote system for the content library needs to be in a trusted domain.
IMPORTANT
Don't reuse a shared network location between multiple sites. For example, don't use the same path for both a central
administration site and a child primary site. This configuration has the potential to corrupt the content library, and require
you to rebuild it.
Manage the content library
1. Create a folder in a network share as the target for the content library. For example,
\\server\share\folder .
WARNING
Don't reuse an existing folder with content. For example, don't use the same folder as your package sources.
Before copying the content library, Configuration Manager removes any existing content from the location you
specify.
2. In the Configuration Manager console, switch to the Administration workspace. Expand Site
Configuration , select the Sites node, and select the site. On the Summar y tab at the bottom of the
details pane, notice a new column for the Content Librar y .
3. Select Manage Content Librar y on the ribbon.
4. In the Manage Content Library window, the Current Location field shows the local drive and path. Enter
a valid network path for the New Location . This path is the location to which the site moves the content
library. It must include a folder name that already exists on the share, for example, \\server\share\folder
. Select OK .
5. Note the Status value in the Content Library column on the Summary tab of the details pane. It updates
to show the site's progress in moving the content library.
While In progress , the Move Progress (%) value displays the percentage complete.
NOTE
If you have a large content library, you may see 0% progress in the console for a while. For example, with
a 1 TB library, it has to copy 10 GB before it shows 1% . Review distmgr.log , which shows the number of
files and bytes copied. The log file also shows an estimated time remaining.
If there's an error state, the status displays the error. Common errors include access denied or
disk full .
When complete it displays Complete .
See the distmgr.log for details. For more information, see Site server and site system server logs.
NOTE
Starting in version 2010, you can enable verbose logging to troubleshoot the content library move process. Set
the following registry key on the site server:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\DP, LibraryMoveVerboseLog = 1 (REG_DWORD) .
For more information on this process, see Flowchart - Manage content library.
The site actually copies the content library files to the remote location. This process doesn't delete the content
library files at the original location on the site server. To free up space, an administrator must manually delete
these original files.
If the original content library spans two drives, it's merged into a single folder at the new destination.
During the copy process, the Despooler and Distribution manager components don't process new packages.
This action makes sure that content isn't added to the library while it's moving. Regardless, schedule this change
during a system maintenance.
If you need to move the content library back to the site server, repeat this process, but enter a local drive and
path for the New Location . It must include a folder name that already exists on the drive, for example,
D:\SCCMContentLib . When the original content still exists, the process quickly moves the configuration to the
location local to the site server.
TIP
To move the content to another drive on the site server, use the Content Librar y Transfer tool. For more information,
see the Content Library Transfer tool.
Next steps
Flowchart - Manage content library
Flowchart - Manage content library
2/16/2022 • 2 minutes to read • Edit Online
Requirements
Only run the tool against a single distribution point at a time.
Run it directly on the server that hosts the distribution point to clean up, or remotely from another
computer.
The tool doesn't support removing content from the site server, which has a single content library. When
the site server also has the distribution point role, if a package isn't targeted to the server, the package is
still in the single content library.
The tool doesn't support a content-enabled cloud management gateway.
The user account that runs the tool must have permissions the same as the Full Administrator security
role in Configuration Manager.
Modes of operation
Run the tool in the following two modes: What-if and Delete.
TIP
Start with the what-if mode. When you're satisfied with the results, then run the tool in delete mode.
What-if mode
If you don't specify the /delete parameter, the tool runs in what-if mode. This mode identifies the content that
would be deleted from the distribution point.
When run in this mode, the tool doesn't delete any data.
The tool writes to the log file information about the content that it would delete. You're not prompted to
confirm each potential deletion.
Delete mode
When you run the tool with the /delete parameter, the tool runs in delete mode.
When run in this mode, orphaned content that it finds on the specified distribution point can be deleted
from the distribution point's content library.
Starting in version 2010, it can also remove orphaned content records from the WMI provider on the
distribution point.
Before deleting each file, confirm that the tool should delete it. Select Y for yes, N for no, or Yes to all to
skip further prompts and delete all orphaned content.
Log file
When the tool runs in either mode, it automatically creates a log file. It names the file with the following
information:
The mode the tool runs in
The name of the distribution point
The date and time of operation
When the tool finishes, it automatically opens the log file in Windows.
By default, the tool writes the log file to the temp folder of the user account that runs the tool. This location is on
the computer where you run the tool, which isn't always the target of the tool. Use the /log parameter to
redirect the log file to another location, including a network share.
Command-line parameters
Use these command-line parameters in any order.
Required parameters
PA RA M ET ER DETA IL S
/dp <distribution point FQDN> Specify the fully qualified domain name (FQDN) of the
distribution point to clean.
/ps <primary site FQDN> Required only when cleaning content from a distribution
point at a secondary site. The tool connects to the parent
primary site to run queries against the SMS Provider. These
queries let the tool determine what content should be on
the distribution point. It can then identify the orphaned
content to remove. This connection to the parent primary
site must be made for distribution points at a secondary site
because the required details aren't available directly from the
secondary site.
PA RA M ET ER DETA IL S
/sc <primary site code> Required only when cleaning content from a distribution
point at a secondary site. Specify the site code of the parent
primary site.
Optional parameters
PA RA M ET ER DETA IL S
When you don't use this parameter, the tool logs results
about what content it would delete. Without this parameter,
it doesn't actually delete any content from the distribution
point.
/ps <primary site FQDN> Optional only when cleaning content from a distribution
point at a primary site. Specify the FQDN of the primary site
that the distribution point belongs to.
/sc <primary site code> Optional only when cleaning content from a distribution
point at a primary site. Specify the site code of the primary
site that the distribution point belongs to.
/log <log file directory> Specify the location where the tool writes the log file. This
location can be a local drive or a network share.
When you don't use this parameter, the tool places the log
file in the user's temp directory on the computer where the
tool runs.
Known issue
In version 2103 and earlier, when any package or deployment has failed, or is in progress, the tool might return
the following error:
System.InvalidOperationException: This content library cannot be cleaned up right now because package
<packageID> is not fully installed.
To work around this issue, update the site to version 2107. The tool can't reliably identify orphaned files, but will
display a warning and continue.
Peer cache for Configuration Manager clients
2/16/2022 • 11 minutes to read • Edit Online
Overview
Definitions:
Peer cache client : Any Configuration Manager client that downloads content from a peer.
Peer cache source : A Configuration Manager client that you enable for peer cache, and that has content
to share with other clients.
Use client settings to enable clients to be peer cache sources. You don't need to enable peer cache clients. When
you enable clients as peer cache sources, the management point includes them in the list of content location
sources. For more information on this process, see Operations.
A peer cache source must be a member of the current boundary group of the peer cache client. The
management point doesn't include peer cache sources from a neighbor boundary group in the list of content
sources it provides the client. It only includes distribution points from a neighbor boundary group. For more
information about current and neighbor boundary groups, see Boundary groups.
The Configuration Manager client uses peer cache to serve to other clients every type of content in the cache.
This content includes:
Microsoft 365 Apps for enterprise files
Express installation files
Peer cache doesn't replace the use of other solutions like Windows BranchCache or Delivery Optimization. Peer
cache works along with other solutions. These technologies give you more options for extending traditional
content deployment solutions such as distribution points. Peer cache is a custom solution with no reliance on
BranchCache. If you don't enable or use BranchCache, peer cache still works.
NOTE
Windows BranchCache is always enabled on deployments. If the distribution point supports it, and it's enabled in client
settings, clients use BranchCache. For more information, see Configure BranchCache.
Operations
To enable peer cache, deploy the client settings to a collection. Then members of that collection act as a peer
cache source for other clients in the same boundary group.
A client that operates as a peer content source submits a list of available cached content to its
management point using state messages. A peer content source client also sends a state message to the
management point when it removes content from its local cache.
NOTE
For the list of applicable peer content source state messages, see State messages in Configuration Manager.
Specifically those with state message IDs of 7200, 7201, 7202, and 7203.
Another client in the same boundary group makes a content location request to the management point.
The server returns the list of potential content sources. This list includes each peer cache source that has
the content and is online. It also includes the distribution points and other content source locations in that
boundary group. For more information, see Content source priority.
As usual, the client that's seeking the content selects one source from the provided list. The client then
attempts to get the content.
Boundary groups include settings to give you more control over content distribution in your environment. For
more information, see Boundary group options for peer downloads.
NOTE
If the client falls back to a neighbor boundary group for content, the management point doesn't add the peer cache
sources from the neighbor boundary group to the list of potential content source locations.
Choose only clients best suited as peer cache sources. Evaluate client suitability based on attributes such as
chassis type, disk space, and network connectivity. For more information that can help you select the best clients
to use for peer cache, see this blog by a Microsoft consultant.
NOTE
By default, if the first 25 peer cache sources are offline or unreachable, a peer cache client may fail to download the
content. You can configure this setting with the site definition properties SuperPeerLocationCount and
SuperPeerLocationCountMax . Their default values are 25 and 50 . For more information, see How to read and write to
the site control file by using WMI.
You can also reduce these values, for example, 5 and 10 . This configuration causes the client to more quickly fall back
to other content locations. For more information, see Content source priority.
TIP
Configure these settings using the client configuration server WMI class for the peer source feature (
SMS_WinPEPeerCacheConfig ) in the Configuration Manager SDK.
When the peer cache source rejects a request for the content, the peer cache client continues to seek content
from its list of content source locations.
Requirements
Peer cache supports all Windows versions listed as supported in Supported operating systems for clients
and devices. Non-Windows operating systems aren't supported as peer cache sources or peer cache
clients.
A peer cache source must be a domain-joined Configuration Manager client. However, a client that's not
domain-joined can get content from a domain-joined peer cache source.
Clients can only download content from peer cache sources in their current boundary group.
NOTE
Configuration Manager determines if a peer cache source has roamed to another location. This behavior makes
sure the management point offers it as a content source to clients in the new location and not the old location.
NOTE
To take advantage of new Configuration Manager features, first update clients to the latest version. While new
functionality appears in the Configuration Manager console when you update the site and console, the complete scenario
isn't functional until the client version is also the latest.
Client settings
For more information about the peer cache client settings, see Client cache settings.
For more information on configuring these settings, see How to configure client settings.
On peer cache-enabled clients that use the Windows Firewall, Configuration Manager configures the firewall
ports that you specify in client settings.
NOTE
This functionality only works when the client downloads content in the background, such as with a required
deployment. On-demand downloads, such as when the user installs an available deployment in Software Center,
behaves as usual.
To see them handling the download of content in parts, examine the ContentTransferManager.log on the
client peer cache source and the MP_Location.log on the management point.
NOTE
Known issue : When drilling down on results like MaxCPULoad or MaxDiskIO, you might receive an error that
suggests the report or details can't be found. To work around this issue, use the other two reports that directly
show the results.
Peer cache source content rejection by condition : Shows rejection details for a specified boundary
group or rejection type.
NOTE
Known issue : You can't select from available parameters and instead must enter them manually. Enter the values
for Boundary Group Name and Rejection Type as seen in the Peer cache source content rejection report. For
example, for Rejection Type you might enter MaxCPULoad or MaxDiskIO.
Peer cache source content rejection details : Show the content that the client was requesting when
rejected.
NOTE
Known issue : You can't select from available parameters and instead must enter them manually. Enter the value
for Rejection Type as displayed in the Peer cache source content rejection report. Then enter the Resource ID
for the content source about which you want more information.
To find the Resource ID of the content source:
1. Find the computer name that displays as the Peer cache source in the results of the Peer cache source
content rejection by condition report.
2. Go to the Assets and Compliance workspace, select the Devices node, and search for that computer's
name. Use the value from the Resource ID column.
Next steps
Microsoft Connected Cache in Configuration Manager
Support for Windows BranchCache
Peer caching technologies
Package Transfer Manager in Configuration
Manager
2/16/2022 • 5 minutes to read • Edit Online
NOTE
In previous versions of Configuration Manager, the Distribution Manager manages the transfer of content to a remote
distribution point. Distribution Manager also manages the transfer of content between sites. With the Configuration
Manager, Distribution Manager continues to manage the transfer of content between two sites. However, the Package
Transfer Manager now manages the transfer of content to large numbers of distribution points. This helps to increase the
overall performance of content deployment both between sites and to distribution points within a site.
To transfer content to a standard distribution point, Package Transfer Manager operates the same as the
Distribution Manager operates in previous versions of Configuration Manager. That is, it actively manages the
transfer of files to each remote distribution point. However, to distribute content to a pull-distribution point, the
Package Transfer Manager notifies the pull-distribution point that content is available. The pull-distribution point
then takes over the transfer process.
The following information describes how Package Transfer Manager manages the transfer of content to
standard distribution points, and to distribution points configured as pull-distribution points:
1. Admin deploys content to one or more distribution points at a site.
Standard distribution point: Distribution Manager creates a content transfer job for that
content.
Pull-distribution point: Distribution Manager creates a content transfer job for that content.
2. Distribution Manager runs preliminar y checks.
Standard distribution point: Distribution Manager runs a basic check to confirm that each
distribution point is ready to receive the content. After this check, Distribution Manager notifies
Package Transfer Manager to start the transfer of content to the distribution point.
Pull-distribution point: Distribution Manager starts Package Transfer Manager, which then
notifies the pull-distribution point that there is a new content transfer job. Distribution Manager
does not check on the status of remote distribution points that are pull-distribution points,
because each pull-distribution point manages its own content transfers.
3. Package Transfer Manager prepares to transfer content.
Standard distribution point: Package Transfer Manager examines the single instance content
store of each specified remote distribution point. The purpose of this is to identify any files that are
already on that distribution point. Then, Package Transfer Manager queues up for transfer only
those files that are not already present.
NOTE
To copy each file in the distribution to the distribution point, even if the files are already present in the
single instance store of the distribution point, use the Redistribute action for content.
Pull-distribution point: For each pull-distribution point in the distribution, Package Transfer
Manager checks the pull-distribution points source distribution points, to confirm if the content is
available.
When the content is available on at least one source distribution point, Package Transfer
Manager sends a notification to that pull-distribution point. The notification directs that
distribution point to begin the process of transferring content. The notification includes file
names and sizes, attributes, and hash values.
When the content is not yet available, Package Transfer Manager does not send a
notification to the distribution point. Instead, it repeats the check every 20 minutes until the
content is available. Then, when the content is available, Package Transfer Manager sends
the notification to that pull-distribution point.
NOTE
For the pull-distribution point to copy each file in the distribution to the distribution point, even if the files
are already present in the single instance store of the pull-distribution point, use the Redistribute action
for content.
NOTE
The process to download content by the pull-distribution point is the same as that used by Configuration
Manager clients. For the transfer of content by the pull-distribution point, concurrent transfer settings
aren't used. Scheduling and throttling options that you configure for standard distribution points aren't
used either.
To help you manage network bandwidth that is used for the content management process of Configuration
Manager, you can use built-in controls for scheduling and throttling. You can also use prestaged content. The
following sections describe these options in more detail.
IMPORTANT
The Rate Limits and Schedule tabs are displayed only in the properties for distribution points that are not installed on
a site server.
For more information, see Install and configure distribution points for Configuration Manager.
Prestaged content
You can prestage content to add the content files to the content library on a site server or distribution point,
before you distribute the content. Because the content files are already in the content library, they do not
transfer over the network when you distribute the content. You can prestage content files for applications and
packages.
In the Configuration Manager console, select the content that you want to prestage, and then use the Create
Prestaged Content File Wizard . This creates a compressed, prestaged content file that contains the files and
associated metadata for the content. Then, you can manually import the content at a site server or distribution
point. Note the following points:
When you import the prestaged content file on a site server, the content files are added to the content
library on the site server, and then registered in the site server database.
When you import the prestaged content file on a distribution point, the content files are added to the
content library on the distribution point. A status message is sent to the site server that informs the site
that the content is available on the distribution point.
You can optionally configure the distribution point as prestaged to help manage content distribution. Then,
when you distribute content, you can choose whether you want to:
Always prestage the content on the distribution point.
Prestage the initial content for the package, and then use the standard content distribution process when
there are updates to the content.
Always use the standard content distribution process for the content in the package.
Determine whether to prestage content
Consider prestaging content for applications and packages in the following scenarios:
To address the issue of limited network bandwidth from the site ser ver to a distribution
point. If scheduling and throttling aren't enough to satisfy your concerns about bandwidth, consider
prestaging the content on the distribution point. Each distribution point has the Enable this
distribution point for prestaged content setting that you can choose in the distribution point
properties. When you enable this option, the distribution point is identified as a prestaged distribution
point, and you can choose how to manage the content on a per-package basis.
The following settings are available in the properties for an application, package, driver package, boot
image, operating system installer, and image. These settings let you choose how content distribution is
managed on remote distribution points that are identified as prestaged:
Automatically download content when packages are assigned to distribution points :
Use this option when you have smaller packages, and the scheduling and throttling settings
provide enough control for content distribution.
Download only content changes to the distribution point : Use this option when you expect
future updates to the content in the package to be generally smaller than the initial package. For
example, you might prestage an application like Microsoft 365 Apps, because the initial package
size is over 700 MB and is too large to send over the network. However, content updates to this
package might be less than 10 MB, and are acceptable to distribute over the network. Another
example might be driver packages, where the initial package size is large, but incremental driver
additions to the package might be small.
Manually copy the content in this package to the distribution point : Use this option when
you have large packages, with content such as an operating system, and you never want to use the
network to distribute the content to the distribution point. When you select this option, you must
prestage the content on the distribution point.
IMPORTANT
The preceding options are applicable on a per-package basis, and are only used when a distribution point is
identified as prestaged. Distribution points that have not been identified as prestaged ignore these settings. In
this case, content always is distributed over the network from the site server to the distribution points.
To restore the content librar y on a site ser ver. When a site server fails, information about packages
and applications that is contained in the content library is restored to the site database as part of the
restore process, but the content library files are not restored as part of the process. If you do not have a
file system backup to restore the content library, you can create a prestaged content file from another site
that contains the packages and applications that you have to have. You can then extract the prestaged
content file on the recovered site server. For more information about site server backup and recovery, see
Backup and recovery for Configuration Manager.
Security and privacy for content management in
Configuration Manager
2/16/2022 • 6 minutes to read • Edit Online
Security guidance
Advantages and disadvantages of HTTPS or HTTP for intranet distribution points
For distribution points on the intranet, consider the advantages and disadvantages of using HTTPS or HTTP. In
most scenarios, using HTTP and package access accounts for authorization provides more security than using
HTTPS with encryption but without authorization. However, if you have sensitive data in your content that you
want to encrypt during transfer, use HTTPS.
When you use HTTPS for a distribution point: Configuration Manager doesn't use package access
accounts to authorize access to the content. The content is encrypted when it's transferred over the
network.
When you use HTTP for a distribution point: You can use package access accounts for authorization. The
content isn't encrypted when it's transferred over the network.
Consider enabling Enhanced HTTP for the site. This feature allows clients to use Azure Active Directory (Azure
AD) authentication to securely communicate with an HTTP distribution point. For more information, see
Enhanced HTTP.
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
SMS_DP_SMSSIG$
NOCERT_SMS_DP_SMSPKG$
NOCERT_SMS_DP_SMSSIG$
For more information about using a custom website, see Websites for site system servers.
For content-enabled cloud management gateways, protect your Azure subscription details and certificates
When you use content-enabled cloud management gateways (CMGs), protect the following high-value items:
The user name and password for your Azure subscription
The secret keys for Azure app registrations
The server authentication certificate
Store the certificates securely. If you browse to them over the network when you configure the CMG, use IPsec
or SMB signing between the site system server and the source location.
For service continuity, monitor the expiry date of the CMG certificates
Configuration Manager doesn't warn you when the imported certificates for the CMG are about to expire.
Monitor the expiry dates independently from Configuration Manager. Make sure that you renew and then
import the new certificates before the expiry date. This action is important if you acquire a server authentication
certificate from an external, public provider, because you might need more time to acquire a renewed certificate.
If a certificate expires, the Configuration Manager cloud services manager generates a status message with ID
9425 . The CloudMgr.log file contains an entry to indicate that the certificate is in expired state, with the expiry
date also logged in UTC.
Security considerations
Clients don't validate content until after it's downloaded. Configuration Manager clients validate the hash
on content only after it's downloaded to their client cache. If an attacker tampers with the list of files to
download or with the content itself, the download process can take up considerable network bandwidth.
Then the client discards the content when it finds the invalid hash.
When you use content-enabled cloud management gateways:
It automatically restricts access to the content to your organization. You can't restrict it further to
selected users or groups.
The management point first authenticates the client. Then the client uses a Configuration Manager
token to access cloud storage. The token is valid for eight hours. This behavior means that if you
block a client because it's no longer trusted, it can continue to download content from cloud
storage until this token expires. The management point won't issue another token for the client
because it's blocked.
To avoid a blocked client from downloading content within this eight-hour window, stop the cloud
service. In the Configuration Manager console, go to the Administration workspace, expand
Cloud Ser vices , and select the Cloud Management Gateway node.
Privacy information
Configuration Manager doesn't include any user data in content files, although an administrative user might
choose to do this action.
Next steps
Fundamental concepts for content management
Security and privacy for application management
Security and privacy for software updates
Security and privacy for OS deployment
Data transfers between sites
2/16/2022 • 2 minutes to read • Edit Online
Types of replication
File -based replication
Configuration Manager uses file-based replication to transfer file-based data between sites in your hierarchy.
This data includes applications and packages that you want to deploy to distribution points in child sites. It also
handles unprocessed discovery data records that the site transfers to its parent site and then processes.
For more information, see File-based replication.
Database replication
Configuration Manager database replication uses SQL Server to transfer data. It uses this method to merge
changes in its site database with the information from the database at other sites in the hierarchy.
For more information, see Database replication.
For help with troubleshooting SQL Server replication, see Troubleshoot SQL Server replication.
See also
Monitor replication
File-based replication
2/16/2022 • 4 minutes to read • Edit Online
Routes
The following information can help you set up and use file replication routes.
File replication route
Each file replication route identifies a destination site to which a site transfers file-based data. Each site supports
one file replication route to a specific destination site.
To manage a file replication route, go to the Administration workspace. Expand the Hierarchy Configuration
node, and then select File Replication .
You can change the following settings for file replication routes:
File replication account
This account connects to the destination site, and writes data to that site's SMS_Site share. The receiving site
processes the data written to this share. By default, when you add a site to the hierarchy, Configuration Manager
assigns the new site server's computer account as its file replication account. It then adds this account to the
destination site's SMS_SiteToSiteConnection_<sitecode> group. This group is local to the computer that grants
access to the SMS_Site share. You can change this account to be a Windows user account. If you change the
account, make sure you add the new account to the destination site's SMS_SiteToSiteConnection_<sitecode>
group.
NOTE
Secondary sites always use the computer account of the secondary site server as the File Replication Account .
Schedule
Set the schedule for each file replication route. This action restricts the type of data and time when data can
transfer to the destination site.
Rate limits
Specify rate limits for each file replication route. This action controls the network bandwidth the site uses when
it transfers data to the destination site:
Pulse mode : Specify the size of the data blocks that the site sends to the destination site. You can also
specify a time delay between sending each data block. Use this option when you must send data across a
low-bandwidth network connection to the destination site.
For example, you have constraints to send 1 KB of data every five seconds, but not 1 KB every three
seconds. This constraint is regardless of the speed of the link or its usage at a given time.
Limited to maximum transfer rates by hour : The site sends data to a destination site by using only
the percentage of time that you specify. Configuration Manager doesn't identify the network's available
bandwidth. It divides the time it can send data into slices of time. It then sends the data in a short block of
time, which is followed by blocks of time when it doesn't send data.
For example, you set the maximum rate to 50% . Configuration Manager transmits data for an amount of
time followed by an equal period of time when it doesn't send any data. It doesn't manage the actual size
of the data block that it sends. The site only manages the amount of time during which it sends data.
Cau t i on
By default, a site can use up to three concurrent sendings to transfer data to a destination site. When
you enable rate limits for a file replication route, it limits the concurrent sendings to that site to one.
This behavior applies even when the Limit available bandwidth (%) is set to 100% . For example, if
you use the default settings for the sender, this reduces the transfer rate to the destination site to be one-
third of the default capacity.
Routes between secondary sites
Configure a file replication route between two secondary sites to route file-based content between those sites.
Sender
Each site has one sender. The sender manages the network connection from one site to a destination site. It can
establish connections to multiple sites at the same time. To connect to a site, the sender uses the file replication
route to the site and identifies the account it uses to establish the network connection. The sender also uses this
account to write data to the destination site's SMS_Site share.
By default, the sender writes data to a destination site by using multiple concurrent sendings , or a thread.
Each thread can transfer a different file-based object to the destination site. When the sender begins to send an
object, it continues to write blocks of data for that object until it sends the entire object. After it sends all the data
for the object, a new object can begin to send on that thread.
To manage the sender for a site, go to the Administration workspace, and expand the Site Configuration
node. Select the Sites node, and then select Proper ties for the site you want to manage. Switch to the Sender
tab to change the sender settings.
You can change the following settings for a sender:
Maximum concurrent sendings
By default, each site uses five concurrent sendings (threads). Three threads are available for use when it sends
data to any one destination site. When you increase this number, you can increase the throughput of data
between sites. More threads mean that Configuration Manager can transfer more files at the same time.
Increasing this number also increases the demand for network bandwidth between sites.
Retry settings
By default, each site retries a problem connection two times, with a one-minute delay between connection
attempts. You can modify the number of connection attempts the site makes, and how long to wait between
attempts.
Next steps
Database replication
Database replication
2/16/2022 • 12 minutes to read • Edit Online
Replication groups
Configuration Manager groups data that replicates by database replication into different replication groups.
Each replication group has a separate, fixed replication schedule. The site uses this schedule to determine how
frequently it replicates changes to other sites.
For example, a change to a role-based administration configuration replicates quickly to other sites. This
behavior makes sure that the other site can quickly enforce these changes. A lower-priority configuration
change, such as a request to install a new secondary site, replicates with less urgency. It can take several minutes
for a new site request to reach the destination primary site.
Settings
You can modify the following settings for database replication:
Database replication links : Control when specific traffic traverses the network.
Distributed views : When a central administration site (CAS) requests selected site data, it can access the
data directly from the database at a child primary site.
Schedules : Specify when a replication link is used, and when different types of site data replicate.
Summarization : Change settings for data summarization about network traffic that traverses replication
links. By default, summarization occurs every 15 minutes. It's used in reports for database replication.
Database replication thresholds : Define when the site reports links as degraded or failed. You can
also configure when Configuration Manager raises alerts about replication links that have a degraded or
failed status.
Types of data
Configuration Manager primarily classifies the data that it replicates as either global data or site data. When
database replication occurs, the site transfers changes to global data and site data across the database
replication link. Global data replicates to a parent or child site. Site data replicates only to a parent site. A third
data type, local data, doesn't replicate to other sites. Local data is information that other sites don't require.
Global data
Global data is administrator-created objects that replicate to all sites throughout the hierarchy. Secondary sites
only receive a subset of global data, as global proxy data. You create global data at the CAS and primary sites.
This type includes the following data:
Software deployments
Software updates
Collection definitions
Role-based administration security scopes
Site data
Site data is operational information created by Configuration Manager primary sites and their assigned clients.
Site data replicates to the CAS, but not to other primary sites. Site data is only viewable at the CAS and at the
primary site where the data originates. You can only modify site data at the primary site where you created it.
This type includes the following data:
Hardware inventory
Status messages
Alerts
The results of query-based collections
All site data replicates to the CAS. The CAS does administration and reporting for the entire site hierarchy.
TIP
You can edit database replication links from the Database Replication node in either workspace. However, when you
use the Database Replication node in the Monitoring workspace, you can also view the status of database replication.
It also provides access to the Replication Link Analyzer tool. Use this tool to help investigate problems with database
replication.
For more information about how to configure replication links, see Site database replication controls. For more
information about how to monitor replication, see Monitor database replication.
Distributed views
Through distributed views, when you make a request at the CAS for selected site data, it directly accesses the
database at the child primary site. This direct access replaces the need to replicate site data from the primary
site to the CAS. Because each replication link is independent from other replication links, you can use distributed
views on the replication links that you choose. You can't use distributed views between a primary site and a
secondary site.
Distributed views provide the following benefits:
Reduce the CPU load to process database changes at the CAS and primary sites
Reduce the amount of data that transfers across the network to the CAS
Improve the performance of the SQL Server that hosts the CAS database
Reduce the disk space used by the CAS database
Consider using distributed views when a primary site is closely located to the CAS on the network, the two sites
are always on, and always connected. Distributed views replace the replication of the selected data between the
sites with direct connections between the site database servers at each site. The CAS makes a direct connection
each time you request this data.
The site requests distributed view data in the following example scenarios:
When you run reports or queries
When you view information in Resource Explorer
Collection evaluation for collections that include site data-based rules
By default, distributed views are turned off for each replication link. When you turn on distributed views, you
select site data that won't replicate to the CAS across that link. The CAS accesses this data directly from the
database of the child primary site that shares the link. You can configure the following types of site data for
distributed views:
Hardware inventor y data from clients
Software inventor y and software metering data from clients
Status messages from clients, the primary site, and all secondary sites
When you view data in the Configuration Manager console or in reports, distributed views are operationally
invisible to you. When you request data that's enabled for distributed views, the CAS site database server
directly accesses the child primary site's database to retrieve the information.
For example, you use a Configuration Manager console connected to the CAS. You request information about
hardware inventory from two primary sites: ABC and XYZ. You only enabled hardware inventory for distributed
views at site ABC. The CAS retrieves inventory information for XYZ clients from its own database. The CAS
retrieves inventory information for ABC clients directly from the database at site ABC. This information appears
in the Configuration Manager console or in a report without identifying the source.
If a replication link has a type of data enabled for distributed views, the child primary site doesn't replicate that
data to the CAS. When you turn off distributed views for a type of data, the child primary site resumes normal
data replication to the CAS. Before this data is available at the CAS, the replication groups for this data must
reinitialize between the primary site and the CAS. After you uninstall a primary site that has distributed views
turned on, the CAS must complete reinitialization of its data before you can access data that you enabled for
distributed views on the CAS.
IMPORTANT
When you use distributed views on any replication link in the site hierarchy, before you uninstall any primary site, turn off
distributed views for all replication links. For more information, see Uninstall a primary site that uses distributed views.
IMPORTANT
Distributed views and schedules for when data can replicate are mutually exclusive settings for a database replication link.
IMPORTANT
Distributed views and schedules for when data can replicate are mutually exclusive configurations for a database
replication link.
Summarization of traffic
Each site periodically summarizes data about the network traffic that traverses database replication links for the
site. The site uses summarized data in reports for database replication. Both sites on a replication link
summarize the network traffic that traverses the replication link. The site database server summarizes the data.
After it summarizes data, the information replicates to other sites as global data.
By default, summarization occurs every 15 minutes. To modify the frequency of summarization for network
traffic, in the properties of the database replication link, edit the Summarization inter val . The frequency of
summarization affects the information that you view in reports about database replication. You can choose an
interval from 5 to 60 minutes. When you increase the frequency of summarization, you increase the processing
load on the SQL Server at each site on the replication link.
TIP
You can configure database replication controls from the Database Replication node in either workspace. However,
when you use the Database Replication node in the Monitoring workspace, you can also view the status of database
replication for a replication link, and access the Replication Link Analyzer tool to help you investigate problems with
replication.
See also
Monitor replication
Troubleshoot SQL Server replication
How clients find site resources and services
2/16/2022 • 12 minutes to read • Edit Online
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
TIP
You can use client installation properties to set the assigned management point for a client. For more information, see
Client installation properties.
A client selects a management point to communicate with based on the client's current network location and
boundary group configurations. Even though it has an assigned management point, this server may not be the
management point that the client uses.
NOTE
A client always uses the assigned management point for registration messages and certain policy messages. This behavior
happens even when other communications are sent to a proxy or local management point.
You can use preferred management points. Preferred management points are management points from a
client's assigned site that are associated with a boundary group that the client uses to find site system servers. A
preferred management point's association with a boundary group is similar to how distribution points or state
migration points are associated with a boundary group. If you enable preferred management points for the
hierarchy, when a client uses a management point from its assigned site, it tries to use a preferred management
point before using other management points from its assigned site.
TIP
You can configure management point affinity with a registry key configuration on the client. Management point affinity
overrides the default behavior for assigned management points and lets the client use one or more specific management
points. For more information, see this blog post from a Microsoft Premier engineer.
Each time a client needs to contact a management point, it first checks the MP list. The client creates an initial MP
list when it installs. The client then periodically updates the list with details about each management point in the
hierarchy.
When the client can't find a valid management point in its MP list, it searches the service location sources. It uses
the following sources in order, until it finds a management point that it can use:
1. Management point
2. Active Directory Domain Services (AD DS)
3. DNS
After a client successfully locates and contacts a management point, it downloads the current list of available
management points. It then updates its own local MP list.
This process is the same for all clients. For example, when a Configuration Manager client that's on the internet
connects to an internet-based management point, the management point sends that client a list of available
internet-based management points. A client that's not on the internet only gets a list of internal management
points.
The MP list
The MP list is the preferred service location source for a client. It's a prioritized list of management points that
the client previously identified. The client sorts its MP list based on its current network location. It stores the list
locally in WMI.
Build the initial MP list
During installation of the client, the client uses the following rules to build its initial MP list:
Include management points specified during client installation. For example, when you use the SMSMP
property or /mp parameter.
Query AD DS for published management points. The client identifies management points from AD DS
that are in its assigned site and the same product version.
If it doesn't get any management points from the first two rules, the client checks DNS for published
management points.
MP list categories
Clients organize their list of management points by using the following categories:
Proxy : A management point at a secondary site.
Local : Any management point that's associated with the client's current network location, as defined by
site boundaries.
When a client belongs to more than one boundary group, it determines the list of local
management points from the union of all boundaries that include the current network location of
the client.
Local management points are typically a subset of a client's assigned management points. Unless
the client is in a network location that's associated with another site with management points
servicing its boundary groups.
Assigned : Any management point that's in the client's assigned site.
You can use preferred management points. Management points at a site that aren't associated with a boundary
group, or that aren't in a boundary group associated with a client's current network location, aren't considered
preferred. The client uses these management points when it can't find an available preferred management point.
Select a management point to use
For typical communications, a client tries to use a management point in the following order, based on the client's
network location:
1. Proxy
2. Local
3. Assigned
The client always uses the assigned management point for registration messages and certain policy messages.
This behavior happens even when it sends other communication to a proxy or local management point.
Within each category, the client attempts to use a management point based on preferences, in the following
order:
1. When the client is configured for HTTPS communication:
a. HTTPS-capable in a trusted or local forest
b. HTTPS-capable not in a trusted or local forest
2. HTTP-capable in a trusted or local forest
3. HTTP-capable not in a trusted or local forest
From the set of management points sorted by preference, the client attempts to use the first management point
on the list. This sorted list of management points is otherwise randomized and can't be ordered any further. The
order of the list can change each time the client updates its MP list.
When a client can't contact the first management point, it tries each successive management point on its list. It
tries each preferred management point in the category before trying the non-preferred management points. If a
client can't successfully communicate with any management point in the category, it attempts to contact a
preferred management point from the next category, until it finds a management point to use.
After a client establishes communication with a management point, it continues to use that same management
point until:
25 hours have passed.
The client is unable to communicate with the management point for five attempts over a period of 10
minutes.
The client then randomly selects a new management point to use.
Active Directory
Domain-joined clients can use AD DS for service location. This behavior requires sites to publish data to Active
Directory.
A client can use AD DS for service location when all the following conditions are true:
You extended the Active Directory schema.
You configured the Active Directory forest for publishing, and you configured the Configuration Manager
site to publish.
The client computer is a member of an Active Directory domain and can access a global catalog server.
If a client can't find a management point to use for service location from AD DS, it attempts to use DNS.
DNS
Clients on the intranet can use DNS for service location. This behavior requires at least one site in a hierarchy to
publish information about management points to DNS.
Consider using DNS for service location when any of the following conditions are true:
You haven't extended the AD DS schema to support Configuration Manager.
Clients on the intranet are in a forest that you haven't enabled for Configuration Manager publishing.
You have clients on workgroup computers, and you haven't configured those clients for internet-only
client management. A workgroup client configured for the internet communicates only with internet-
facing management points and won't use DNS for service location.
You can configure clients to find management points from DNS.
When a site publishes service location records for management points to DNS:
Publishing is applicable only to management points that accept client connections from the intranet.
Publishing adds a service location resource record (SRV RR) in the DNS zone of the management point
server. That server needs a corresponding host entry in DNS.
By default, domain-joined clients search DNS for management point records from the client's local domain. You
can configure a client installation property to specify another domain suffix.
For more information, see How to configure client computers to find management points by using DNS
publishing.
Publish management points to DNS
To publish management points to DNS, the following two conditions must be true:
Your DNS servers support service location resource records, by using a version of BIND that's at least
8.1.2.
The specified intranet FQDNs for the management points in Configuration Manager have host entries (A
records) in DNS.
IMPORTANT
Configuration Manager DNS publishing doesn't support a disjointed namespace. If you have a disjointed namespace, you
can manually publish management points to DNS. You can also use one of the other service location methods.
You can configure Configuration Manager to automatically publish management points on the intranet to DNS,
or you can manually publish these records to DNS. When Configuration Manager publishes management points
to DNS, it adds their intranet FQDN and port number in the service location (SRV) record. You configure DNS
publishing in the site's Management Point Component Proper ties . For more information, see Site
components - Management point.
T h e D N S z o n e i s se t t o " Se c u r e o n l y " fo r d y n a m i c u p d a t e s
With default permissions, only the first management point can successfully publish to DNS.
If only one management point can successfully publish and change its DNS record, clients can get the full MP list
from that management point. As long as that one published management point is healthy, clients can then find
their preferred management point.
T h e D N S se r v e r d o e sn' t su p p o r t a u t o m a t i c u p d a t e s b u t su p p o r t s se r v i c e l o c a t i o n r e c o r d s
In this scenario, manually publish management points to DNS. Manually configure the service location resource
record (SRV RR). Configuration Manager supports RFC 2782 for service location records. These records have
the following format: _Service._Protocol.Name TTL Class SRV Priority Weight Port Target
To publish a management point to Configuration Manager, specify the following values:
_Ser vice : _mssms_mp_<sitecode> . For example, _mssms_mp_xyz
._Protocol : ._tcp
.Name : Specify the DNS suffix of the management point, for example contoso.com
TTL : Use 14400 for four hours.
Class : Specify IN for RFC 1035.
Priority : Configuration Manager doesn't use this field.
Weight : Configuration Manager doesn't use this field.
Por t : Specify the port number that the management point uses. For example, 443 by default for HTTPS.
Target : Specify the intranet FQDN of the site system server with the management point role.
Configure Windows Server DNS
If you use Windows Server DNS, use the following procedures to enter this DNS record for intranet
management points.
C o n fi g u r e a u t o m a t i c p u b l i sh i n g fo r a si t e
1. In the DNS management console, select the DNS zone for the management point computer.
2. Verify that there's a host record (A or AAAA ) for the intranet FQDN of the site system. If this record
doesn't exist, create it.
3. Select New Other Records , choose Ser vice Location (SRV) , and then choose Create Record .
4. Specify the following information, and then select Done :
Domain : If necessary, enter the DNS suffix of the management point, for example contoso.com .
Ser vice : _mssms_mp_<sitecode> . For example, _mssms_mp_xyz
Protocol : ._tcp
Priority : Configuration Manager doesn't use this field.
Weight : Configuration Manager doesn't use this field.
Por t : Specify the port number that the management point uses. For example, 443 by default for
HTTPS.
Host offering this ser vice : Specify the intranet FQDN of the site system server with the
management point role.
Repeat these steps for each management point on the intranet that you want to publish to DNS.
Security and privacy for site administration in
Configuration Manager
2/16/2022 • 21 minutes to read • Edit Online
NOTE
A trusted domain for Configuration Manager requires Kerberos authentication. If clients are in another forest that doesn't
have a two-way forest trust with the site server's forest, these clients are considered to be in an untrusted domain. An
external trust isn't sufficient for this purpose.
IMPORTANT
The fallback status point role is an exception. Because this site system role accepts unauthenticated data from clients,
don't assign the fallback status point role to any other Configuration Manager site system role.
WARNING
Mobile devices that are enrolled by Configuration Manager can't use SSL bridging. They must use SSL tunneling only.
Configurations to use if you configure the site to wake up computers to install software
If you use traditional wake-up packets, use unicast rather than subnet-directed broadcasts.
If you must use subnet-directed broadcasts, configure routers to allow IP-directed broadcasts only from
the site server and only on a non-default port number.
For more information about the different Wake On LAN technologies, see Planning how to wake up clients.
If you use email notification, configure authenticated access to the SMTP mail server
Whenever possible, use a mail server that supports authenticated access. Use the computer account of the site
server for authentication. If you must specify a user account for authentication, use an account that has the least
privileges.
Enforce LDAP channel binding and LDAP signing
The security of Active Directory domain controllers can be improved by configuring the server to reject Simple
Authentication and Security Layer (SASL) LDAP binds that do not request signing or to reject LDAP simple binds
that are performed on a clear text connection. Starting in version 1910, Configuration Manager supports
enforcing LDAP channel binding and LDAP signing. For more information, see 2020 LDAP channel binding and
LDAP signing requirements for Windows.
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
Configure a certificate trust list (CTL ) in IIS for site system roles
Site system roles:
A distribution point that you configure for HTTPS
A management point that you configure for HTTPS and enable to support mobile devices
A CTL is a defined list of trusted root certification authorities (CAs). When you use a CTL with group policy and a
public key infrastructure (PKI) deployment, a CTL enables you to supplement the existing trusted root CAs that
are configured on your network. For example, CAs that are automatically installed with Microsoft Windows or
added through Windows enterprise root CAs. When a CTL is configured in IIS, it defines a subset of those
trusted root CAs.
This subset provides you with more control over security. The CTL restricts the client certificates that are
accepted to only those certificates that are issued from the list of CAs in the CTL. For example, Windows comes
with a number of well-known, third-party CA certificates.
By default, the computer that runs IIS trusts certificates that chain to these well-known CAs. When you don't
configure IIS with a CTL for the listed site system roles, the site accepts as a valid client any device that has a
certificate issued from these CAs. If you configure IIS with a CTL that didn't include these CAs, the site refuses
client connections, if the certificate chains to these CAs. For Configuration Manager clients to be accepted for the
listed site system roles, you must configure IIS with a CTL that specifies the CAs that are used by Configuration
Manager clients.
NOTE
Only the listed site system roles require you to configure a CTL in IIS. The certificate issuers list that Configuration
Manager uses for management points provides the same functionality for client computers when they connect to HTTPS
management points.
For more information about how to configure a list of trusted CAs in IIS, see the IIS documentation.
Don't put the site server on a computer with IIS
Role separation helps to reduce the attack profile and improve recoverability. The computer account of the site
server typically has administrative privileges on all site system roles. It may also have these privileges on
Configuration Manager clients, if you use client push installation.
Use dedicated IIS servers for Configuration Manager
Although you can host multiple web-based applications on the IIS servers that are also used by Configuration
Manager, this practice can significantly increase your attack surface. A poorly configured application could allow
an attacker to gain control of a Configuration Manager site system. This breach could allow an attacker to gain
control of the hierarchy.
If you must run other web-based applications on Configuration Manager site systems, create a custom web site
for Configuration Manager site systems.
Use a custom website
For site systems that run IIS, configure Configuration Manager to use a custom website instead of the default
website. If you have to run other web applications on the site system, you must use a custom website. This
setting is a site-wide setting rather than a setting for a specific site system.
When you use custom websites, remove the default virtual directories
When you change from using the default website to using a custom website, Configuration Manager doesn't
remove the old virtual directories. Remove the virtual directories that Configuration Manager originally created
under the default website.
For example, remove the following virtual directories for a distribution point:
SMS_DP_SMSPKG$
SMS_DP_SMSSIG$
NOCERT_SMS_DP_SMSPKG$
NOCERT_SMS_DP_SMSSIG$
Follow IIS Server security guidance
Identify and follow the general guidance for your version of IIS Server. Take into consideration any requirements
that Configuration Manager has for specific site system roles. For more information, see Site and site system
prerequisites.
Configure IIS custom headers
Configure the following custom headers to disable MIME sniffing:
x-content-type-options: nosniff
Proxy servers
You can specify separate proxy servers for different site system servers and clients. You make these
configurations when you install a site system role or client, or change them later as needed.
For more information, see Proxy server support.
Ports used in Configuration Manager
2/16/2022 • 20 minutes to read • Edit Online
NOTE
If you support internet-based clients by using SSL bridging, in addition to port requirements, you might also have to
allow some HTTP verbs and headers to traverse your firewall.
NOTE
You configure the ports for the reporting services point in SQL Server Reporting Services. Configuration Manager
then uses these ports during communications to the reporting services point. Be sure to review these ports that
define the IP filter information for IPsec policies or for configuring firewalls.
By default, the HTTP port that's used for client-to-site system communication is port 80, and 443 for HTTPS. You
can change these ports during setup or in the site properties.
Non-configurable ports
Configuration Manager doesn't allow you to configure ports for the following types of communication:
Site to site
Site server to site system
Configuration Manager console to SMS Provider
Configuration Manager console to the internet
Connections to cloud services, such as Microsoft Azure
HTTPS -- 443
HTTP 80
HTTPS -- 443
HTTPS -- 443
HTTPS -- 443
NOTE
Use client settings to configure the alternate port for express updates. For more information, see Port that clients use to
receive requests for delta content.
Client --> Distribution point configured for multicast, both standard and pull
Client --> Distribution point configured for PXE, both standard and pull
DHCP 67 and 68 --
TFTP 69 No te 4 --
IMPORTANT
If you enable a host-based firewall, make sure that the rules allow the server to send and receive on these ports. When
you enable a distribution point for PXE, Configuration Manager can enable the inbound (receive) rules on the Windows
Firewall. It doesn't configure the outbound (send) rules.
Client --> Fallback status point
HTTP -- 80 or 8530 No te 3
HTTPS -- 443
HTTP -- 80
The specific port required depends upon the management point configuration. For more information, see CMG
data flow.
CMG connection point --> Software update point
The specific port depends upon the software update point configuration.
HTTPS -- 443/8531
HTTP -- 80/8530
HTTP -- 80
HTTPS -- 443
The Configuration Manager console uses internet access for the following actions:
Downloading software updates from Microsoft Update for deployment packages.
The Feedback item in the ribbon.
Links to documentation within the console.
Downloading items from Community hub
Configuration Manager console --> Reporting services point
RPC -- DYNAMIC No te 6
HTTP -- 80
HTTPS -- 443
Management point --> Domain controller
RPC -- DYNAMIC No te 6
RPC -- DYNAMIC No te 6
HTTPS -- 443
RPC -- DYNAMIC No te 6
HTTPS -- 443
RPC -- DYNAMIC No te 6
RPC -- DYNAMIC No te 6
RPC -- DYNAMIC No te 6
RPC -- DYNAMIC No te 6
RPC -- DYNAMIC No te 6
RPC -- DYNAMIC No te 6
RPC -- DYNAMIC No te 6
RPC -- DYNAMIC No te 6
HTTP -- 80 No te 1
HTTPS -- 443
RPC -- DYNAMIC No te 6
RPC -- DYNAMIC No te 6
During the installation of a site that uses a remote SQL Server to host the site database, open the following
ports between the site server and the SQL Server:
RPC -- DYNAMIC No te 6
RPC -- DYNAMIC No te 6
HTTP -- 80 or 8530 No te 3
HTTP -- 80 No te 1
HTTP -- 80 or 8530 No te 3
TIP
Configuration Manager doesn't require the SQL Server Browser, which uses port UDP 1434.
NOTE
When you configure the software update point to use HTTPS, the HTTP port must also be open. Unencrypted
data, such as the EULA for specific updates, uses the HTTP port.
The site server makes a connection to the SQL Server hosting the SUSDB when you enable the following
options for WSUS cleanup:
Add non-clustered indexes to the WSUS database to improve WSUS cleanup performance
Remove obsolete updates from the WSUS database
If you change the default SQL Server port to an alternate port with SQL Server Configuration Manager, make
sure the site server can connect using the defined port. Configuration Manager doesn't support dynamic ports.
By default, SQL Server named instances use dynamic ports for connections to the database engine. When you
use a named instance, manually configure the static port.
Note 4: Trivial FTP (TFTP) Daemon
The Trivial FTP (TFTP) Daemon system service doesn't require a user name or password and is an integral part of
Windows Deployment Services (WDS). The Trivial FTP Daemon service implements support for the TFTP
protocol that's defined by the following RFCs:
RFC 1350: TFTP
RFC 2347: Option extension
RFC 2348: Block size option
RFC 2349: Time-out interval and transfer size options
TFTP is designed to support diskless boot environments. TFTP Daemons listen on UDP port 69 but respond
from a dynamically allocated high port. If you enable this port, the TFTP service can receive incoming TFTP
requests, but the selected server can't respond to those requests. You can't enable the selected server to respond
to inbound TFTP requests unless you configure the TFTP server to respond from port 69.
The PXE-enabled distribution point and the client in Windows PE select dynamically allocated high ports for
TFTP transfers. These ports are defined by Microsoft between 49152 and 65535. For more information, see
Service overview and network port requirements for Windows.
However, during the actual PXE boot, the network card on the device selects the dynamically allocated high port
it uses during the TFTP transfer. The network card on the device isn't bound to the dynamically allocated high
ports defined by Microsoft. It's only bound to the ports defined in RFC 1350. This port can be any from 0 to
65535. For more information about what dynamically allocated high ports the network card uses, contact the
device hardware manufacturer.
Note 5: Communication between the site server and site systems
By default, communication between the site server and site systems is bi-directional. The site server starts
communication to configure the site system, and then most site systems connect back to the site server to send
status information. Reporting service points and distribution points don't send status information. If you select
Require the site ser ver to initiate connections to this site system on the site system properties after the
site system has been installed, the site system won't start communication with the site server. Instead, the site
server starts the communication. It uses the site system installation account for authentication to the site system
server.
Note 6: Dynamic ports
Dynamic ports use a range of port numbers that's defined by the OS version. These ports are also known as
ephemeral ports. For more information about the default port ranges, see Service overview and network port
requirements for Windows.
Other ports
The following sections provide more information about ports that Configuration Manager uses.
Client to server shares
Clients use Server Message Block (SMB) whenever they connect to UNC shares. For example:
Manual client installation that specifies the CCMSetup.exe /source: command-line property
Endpoint Protection clients that download definition files from a UNC path
WARNING
Configuration Manager doesn't support dynamic ports. By default, SQL Server named instances use dynamic ports for
connections to the database engine. When you use a named instance, manually configure the static port for intrasite
communication.
The following site system roles communicate directly with the SQL Server database:
Certificate registration point role
Enrollment point role
Management point
Site server
Reporting Services point
SMS Provider
SQL Server --> SQL Server
When a SQL Server hosts a database from more than one site, each database must use a separate instance of
SQL Server. Configure each instance with a unique set of ports.
If you enable a host-based firewall on the SQL Server, configure it to allow the correct ports. Also configure
network firewalls in between computers that communicate with the SQL Server.
For an example of how to configure SQL Server to use a specific port, see Configure a server to listen on a
specific TCP port.
Discovery and publishing
Configuration Manager uses the following ports for the discovery and publishing of site information:
Lightweight Directory Access Protocol (LDAP): 389
Secure LDAP (LDAPS, for signing and binding): 636
Global catalog LDAP: 3268
RPC Endpoint Mapper: 135
RPC: Dynamically allocated high TCP ports
TCP: 1024: 5000
TCP: 49152: 65535
External connections made by Configuration Manager
On-premises Configuration Manager clients or site systems can make the following external connections:
Asset Intelligence synchronization point --> Microsoft
Endpoint Protection point --> internet
Client --> Global catalog domain controller
Configuration Manager console --> internet
Management point --> Domain controller
Site server --> Domain controller
Site server <--> Issuing Certification Authority (CA)
Software update point --> internet
Software update point --> Upstream WSUS Server
Service connection point --> Azure
Service connection point --> Azure Logic App
CMG connection point --> CMG cloud service
Installation requirements for site systems that support internet-based clients
NOTE
This section only applies to internet-based client management (IBCM). It doesn't apply to the cloud management gateway.
For more information, see Manage clients on the internet.
Internet-based management points, distribution points that support internet-based clients, the software update
point, and the fallback status point use the following ports for installation and repair:
Site server --> Site system: RPC endpoint mapper using UDP and TCP port 135
Site server --> Site system: RPC dynamic TCP ports
Site server <--> Site system: Server message blocks (SMB) using TCP port 445
Application and package installations on distribution points require the following RPC ports:
Site server --> Distribution point: RPC endpoint mapper using UDP and TCP port 135
Site server --> Distribution point: RPC dynamic TCP ports
Use IPsec to help secure the traffic between the site server and site systems. If you must restrict the dynamic
ports that are used with RPC, you can use the Microsoft RPC configuration tool (rpccfg.exe). Use the tool to
configure a limited range of ports for these RPC packets. For more information, see How to configure RPC to
use certain ports and how to help secure those ports by using IPsec.
IMPORTANT
Before you install these site systems, make sure that the remote registry service is running on the site system server and
that you have specified a site system installation account if the site system is in a different Active Directory forest without
a trust relationship. For example, the remote registry service is used on servers running site systems such as distribution
points (both pull and standard) and remote SQL Servers.
DNS 53 53
DHCP 67 and 68 --
Kerberos authentication -- 88
Diagram
The following diagram shows the connections between the main components that are in a typical Configuration
Manager site. It currently doesn't include all connections.
Next steps
Proxy server support
Internet access requirements
Proxy server support in Configuration Manager
2/16/2022 • 4 minutes to read • Edit Online
IMPORTANT
Starting in November 2021, this feature of Configuration Manager is deprecated. For more information, see Introduction
to asset intelligence in Configuration Manager.
This site system role connects to Microsoft and uses a proxy server configuration on the computer that hosts the
Asset Intelligence synchronization point.
Cloud distribution point
NOTE
The cloud-based distribution point (CDP) is deprecated. Starting in version 2107, you can't create new CDP instances. To
provide content to internet-based devices, enable a cloud management gateway (CMG) to distribute content. For more
information, see Deprecated features.
The cloud distribution point role runs in Microsoft Azure. You don't configure this site system role to use a proxy.
Set the proxy configuration on the primary site server that manages the cloud distribution point.
For this configuration, the primary site server:
Must be able to connect to Microsoft Azure to set up, monitor, and distribute content to the cloud
distribution point.
By default, uses the computer's System account to make the connection. It can also use the site system
proxy server account, if necessary.
Uses Windows web browser APIs.
Cloud management gateway connection point
The cloud management gateway (CMG) connection point is an on-premises role that communicates with the
CMG service in Azure. For more information, see Overview of CMG.
Distribution point
If you enable a Configuration Manager distribution point for Microsoft Connected Cache, it can communicate
through an unauthenticated proxy server for internet access. For more information, see Microsoft Connected
Cache.
Exchange Server connector
This site system role connects to an Exchange Server. It uses a proxy server configuration on the computer that
hosts the Exchange Server connector.
Service connection point
This site system role connects to the Configuration Manager cloud service to download version updates for
Configuration Manager. It uses a proxy server that's configured on the computer that hosts the service
connection point.
Software update point
This site system role uses the proxy when it connects to Microsoft Update to download patches and synchronize
information about updates. Like every other site system role, first configure the site system proxy settings. Then
configure the following options specific to the software update point:
Use a proxy ser ver when synchronizing software updates
Use a proxy ser ver when downloading content by using automatic deployment rules
NOTE
While available for use, this setting isn't used by software update points at secondary sites.
These settings are on the Proxy and Account Settings tab of the software update point properties.
NOTE
By default, when the automatic deployment rules run, the System account on the site server of the site on which an
automatic deployment rule was created is used to connect to the internet and download software updates. Alternatively,
configure and use the site system proxy server account.
When this account cannot access the internet, software updates fail to download. The following entry is logged to
ruleengine.log : Failed to download the update from internet. Error = 12007.
Other features that use the proxy for a site system server
The following features use the proxy of the site system that hosts the service connection point role:
Azure Active Directory (Azure AD) user discovery
Azure AD user group discovery
Synchronizing collection membership results to Azure Active Directory groups
Next steps
If your organization restricts network communication with the internet using a firewall or proxy device, you
need to allow access to internet endpoints. For more information, see internet access requirements.
Internet access requirements
2/16/2022 • 12 minutes to read • Edit Online
Some Configuration Manager features rely on internet connectivity for full functionality. If your organization
restricts network communication with the internet using a firewall or proxy device, make sure to allow these
endpoints.
Configuration Manager uses the following Microsoft URL forwarding services throughout the product:
https://aka.ms
https://go.microsoft.com
Even if they're not explicitly listed in the sections below, you should always allow these endpoints.
TIP
Enable these endpoints for the management insight rule, Connect the site to the Microsoft cloud for
Configuration Manager updates .
*.akamaiedge.net
*.akamaitechnologies.com
*.manage.microsoft.com
go.microsoft.com
download.microsoft.com
download.windowsupdate.com
download.visualstudio.microsoft.com
sccmconnected-a01.cloudapp.net
configmgrbits.azureedge.net
IMPORTANT
This Azure endpoint only supports TLS 1.2 with specific cipher suites. Make sure your environment supports these
Azure configurations. For more information, see Azure Front Door: TLS configuration FAQ.
ceuswatcab01.blob.core.windows.net
ceuswatcab02.blob.core.windows.net
eaus2watcab01.blob.core.windows.net
eaus2watcab02.blob.core.windows.net
weus2watcab01.blob.core.windows.net
weus2watcab02.blob.core.windows.net
umwatsonc.events.data.microsoft.com
*-umwatsonc.events.data.microsoft.com
Windows servicing
For more information, see Manage Windows as a service.
download.microsoft.com
https://go.microsoft.com/fwlink/?LinkID=619849
dl.delivery.mp.microsoft.com
Azure services
For more information, see Configure Azure services for use with Configuration Manager.
management.azure.com (Azure public cloud)
management.usgovcloudapi.net (Azure US Government cloud)
Co-management
If you enroll Windows devices to Microsoft Intune for co-management, make sure those devices can access the
endpoints required by Intune. For more information, see Network endpoints for Microsoft Intune.
Delivery optimization
If you use delivery optimization, clients need to communicate with its cloud service: *.do.dsp.mp.microsoft.com
Distribution points that support Microsoft Connected Cache also require these endpoints.
For more information, see the following articles:
Delivery optimization FAQ
Fundamental concepts for content management in Configuration Manager
Microsoft Connected Cache in Configuration Manager
Cloud services
For more information on the cloud management gateway (CMG), see Plan for CMG.
This section covers the following features:
Cloud management gateway (CMG)
Azure Active Directory (Azure AD) integration
Azure AD-based discovery
Cloud distribution point (CDP)
NOTE
The cloud-based distribution point (CDP) is deprecated. Starting in version 2107, you can't create new CDP
instances. To provide content to internet-based devices, enable the CMG to distribute content.
The following sections list the endpoints by role. Some endpoints refer to a service by <prefix> , which is the
prefix name of the CMG. For example, if your CMG is GraniteFalls.WestUS.CloudApp.Azure.Com , then the actual
storage endpoint is GraniteFalls.blob.core.windows.net .
TIP
To clarify some terminology:
CMG service name: The common name (CN) of the CMG server authentication certificate. Clients and the CMG
connection point site system role communicate with this service name. For example, GraniteFalls.contoso.com
or GraniteFalls.WestUS.CloudApp.Azure.Com .
CMG deployment name: The first part of the service name plus the Azure location for the cloud service
deployment. The cloud service manager component of the service connection point uses this name when it
deploys the CMG in Azure. The deployment name is always in an Azure domain. The Azure location depends upon
the deployment method, for example:
Virtual machine scale set: GraniteFalls.WestUS.CloudApp.Azure.Com
Classic deployment: GraniteFalls.CloudApp.Net
This article uses examples with a virtual machine scale set as the recommended deployment method in version 2107 and
later. If you use a classic deployment, note the difference as you read this article and configure internet access.
The CMG connection point site system supports using a web proxy. For more information on configuring this
role for a proxy, see Proxy server support.
The CMG connection point only needs to connect to the CMG service endpoints. It doesn't need access to other
Azure endpoints.
Configuration Manager client for cloud services
Any Configuration Manager client that needs to communicate with a CMG needs access to the following
endpoints:
Software updates
Allow the active software update point to access the following endpoints so that WSUS and Automatic Updates
can communicate with the Microsoft Update cloud service:
http://windowsupdate.microsoft.com
http://*.windowsupdate.microsoft.com
https://*.windowsupdate.microsoft.com
http://*.update.microsoft.com
https://*.update.microsoft.com
http://*.windowsupdate.com
http://download.windowsupdate.com
http://download.microsoft.com
http://*.download.windowsupdate.com
http://ntservicepack.microsoft.com
For more information on software updates, see Plan for software updates.
Intranet firewall
You might need to add endpoints to a firewall that's between two site systems in the following cases:
If child sites have a software update point
If there's a remote active internet-based software update point at a site
Software update point on the child site
http://<FQDN for software update point on child site>
If you use Configuration Manager to deploy and update Microsoft 365 Apps for enterprise, allow the following
endpoints:
officecdn.microsoft.com to synchronize the software update point for Microsoft 365 Apps for enterprise
client updates
config.office.com to create custom configurations for Microsoft 365 Apps for enterprise deployments
contentstorage.osi.office.net to support the evaluation of Office add-in readiness
Your top-level site server needs access to the following endpoint to download the Microsoft Apps 365 readiness
file:
Starting March 2, 2021: https://omex.cdn.office.net/mirrored/sccmreadiness/SOT_SCCM_AddinReadiness.CAB
Location prior to March 2, 2021:
https://contentstorage.osi.office.net/sccmreadinessppe/sot_sccm_addinreadiness.cab
NOTE
The location of this file is changing March 2, 2021 . For more information, see Download location change for Microsoft
365 Apps readiness file.
NOTE
For push notifications from Microsoft to show in the console, the service connection point needs access to
configmgrbits.azureedge.net . It also needs access to this endpoint for updates and servicing, so you may have
already allowed it.
In-console feedback
On the computer where you run the console, allow it to access the following internet endpoints to send
diagnostic data to Microsoft:
petrol.office.microsoft.com
ceuswatcab01.blob.core.windows.net
ceuswatcab02.blob.core.windows.net
eaus2watcab01.blob.core.windows.net
eaus2watcab02.blob.core.windows.net
weus2watcab01.blob.core.windows.net
weus2watcab02.blob.core.windows.net
umwatsonc.events.data.microsoft.com
*-umwatsonc.events.data.microsoft.com
https://raw.githubusercontent.com
Community hub
For more information on this feature, see Community hub.
https://github.com
https://communityhub.microsoft.com
Desktop Analytics
For more information, see Enable data sharing.
Server connectivity endpoints
The service connection point needs to communicate with the following endpoints:
EN DP O IN T F UN C T IO N
IN DEX EN DP O IN T F UN C T IO N
Tenant attach
For more information, see Enable tenant attach.
https://aka.ms/configmgrgateway
The service connection point makes a long standing outgoing connection to the notification service hosted on
https://*.manage.microsoft.com . Verify the proxy used for the service connection point doesn't time out
outgoing connections too quickly. We recommend 3 minutes for outgoing connections to this internet endpoint.
If your environment has proxy rules to allow only specific certificate revocation lists (CRLs) or online certificate
status protocol (OCSP) verification locations, also allow the following CRL and OCSP URLs:
http://crl3.digicert.com
http://crl4.digicert.com
http://ocsp.digicert.com
http://www.d-trust.net
http://root-c3-ca2-2009.ocsp.d-trust.net
http://crl.microsoft.com
http://oneocsp.microsoft.com
http://ocsp.msocsp.com
http://www.microsoft.com/pkiops
Endpoint analytics
For more information, see Endpoint analytics proxy configuration.
Endpoints required for Configuration Manager-managed devices
Configuration Manager-managed devices send data to Intune via the connector on the Configuration Manager
role and they don't need directly access to the Microsoft public cloud.
EN DP O IN T F UN C T IO N
EN DP O IN T F UN C T IO N
Asset intelligence
If you use asset intelligence, allow the following endpoints for the service to synchronize:
https://sc.microsoft.com
https://ssu2.manage.microsoft.com
External notifications
For more information, see External notifications.
The service connection point needs to communicate with the notification service, for example Azure Logic Apps.
The access endpoint for the logic app typically has the following format:
https://*.<RegionName>.logic.azure.com:443 . For example: https://prod1.westus2.logic.azure.com:443
To get the access endpoint for the logic app, as well as the associated IP addresses, use the following process:
1. In the Azure portal, under Logic Apps , select the logic app for your notification. For more information, see
Manage logic apps in the Azure portal.
2. In the app's menu, in the Settings section, select Proper ties .
3. View or copy the values for the Access endpoint and the Access endpoint IP addresses .
Next steps
Ports used in Configuration Manager
Proxy server support in Configuration Manager
About schema extensions for Configuration
Manager
2/16/2022 • 4 minutes to read • Edit Online
Considerations
There are no new Active Directory schema extensions for Configuration Manager current branch. They
haven't changed since Configuration Manager 2007. If you previously extended the schema an earlier
version, you don't have to extend the schema again.
Extending the schema is a forest-wide, one-time, irreversible action.
Only a member of the Schema Admins group can extend the schema. It can also be a user with
delegated permissions to change the schema.
You can extend the schema before or after you install a Configuration Manager site. However, it's best to
extend the schema before you start to configure your sites and hierarchy settings. This action can simplify
many of the later configuration steps.
After you extend the schema, the Active Directory global catalog replicates throughout the forest. Plan to
extend the schema when the replication traffic won't adversely affect other network-dependent processes.
Active Directory only replicates the newly added attributes.
Devices and clients that don't use the Active Directory schema
Mobile devices that are managed by the Exchange Server connector
The client for macOS computers
Mobile devices that are enrolled by Configuration Manager on-premises MDM
Windows clients that you configure for internet-only client management
Windows clients that Configuration Manager detects to be on the internet
cn=mS-SMS-Assignment-Site-Code cn=MS-SMS-Management-Point
cn=mS-SMS-Capabilities cn=MS-SMS-Roaming-Boundary-Range
cn=MS-SMS-Default-MP cn=MS-SMS-Server-Locator-Point
cn=mS-SMS-Device-Management-Point cn=MS-SMS-Site
cn=mS-SMS-Health-State
cn=MS-SMS-MP-Address
cn=MS-SMS-MP-Name
cn=MS-SMS-Ranged-IP-High
cn=MS-SMS-Ranged-IP-Low
cn=MS-SMS-Roaming-Boundaries
cn=MS-SMS-Site-Boundaries
cn=MS-SMS-Site-Code
cn=mS-SMS-Source-Forest
cn=mS-SMS-Version
NOTE
The schema extensions might include attributes and classes from previous versions of the product but not used by the
latest version. For example:
Attribute: cn=MS-SMS-Site-Boundaries
Class: cn=MS-SMS-Server-Locator-Point
You can view these settings in the ConfigMgr_ad_schema.LDF file from the \SMSSETUP\BIN\x64 folder of
the Configuration Manager installation media.
Next steps
Prepare Active Directory for site publishing
Prepare Active Directory for site publishing
2/16/2022 • 3 minutes to read • Edit Online
TIP
Run this tool from a command line to view feedback while it runs.
2. To verify that the schema extension was successful, review extadsch.log in the root of the system drive.
Option B: Use the LDIF file
This file is in the SMSSETUP\BIN\X64 folder on the Configuration Manager installation media.
1. Make a copy of the ConfigMgr_ad_schema.ldf file. Edit it in Notepad, and define the Active Directory
root domain that you want to extend. Replace all instances of the text DC=x in the file with the full name
of the domain to extend. For example, if the full name of the domain to extend is named
widgets.contoso.com , change all instances of DC=x in the file to DC=widgets, DC=contoso, DC=com .
2. Use the LDIFDE command-line utility to import the contents of the ConfigMgr_ad_schema.ldf file to
Active Directory Domain Services. For example, the following command-line imports the schema
extensions, turns on verbose logging, and creates a log file in the temp directory:
ldifde -i -f ConfigMgr_ad_schema.ldf -v -j "%temp%"
NOTE
If you prefer, you can use other tools like the Active Directory Users and Computers administrative tool (dsa.msc)
to add permissions to the container.
Next steps
After you create the container and grant permissions, configure the Configuration Manager site to publish data
to Active Directory.
Publish site data for Configuration Manager
Prepare Windows Servers to support Configuration
Manager
2/16/2022 • 3 minutes to read • Edit Online
IMPORTANT
Edits to the request filter can increase the attack surface of the computer.
Edits that you make at the server level apply to all websites on the server.
Edits that you make to individual websites apply to only that website.
For best security, run Configuration Manager on a dedicated web server. If you need to run other applications on the web
server, use a custom website for Configuration Manager. For information, see Websites for site system servers.
HTTP verbs
For more information, see Configure request filtering in IIS.
Management points
To make sure that clients can successfully communicate with a management point, on the management point
server make sure IIS allows the following HTTP verbs:
GET
POST
CCM_POST
HEAD
PROPFIND
Distribution points
Distribution points require that IIS allows the following HTTP verbs:
GET
HEAD
PROPFIND
Websites for site system servers in Configuration
Manager
2/16/2022 • 4 minutes to read • Edit Online
TIP
For improved security, dedicate a server for the Configuration Manager site systems that require IIS. When you run other
applications on a Configuration Manager site system, you increase the attack surface of that computer.
Next steps
To configure the site to use a custom web site, enable the setting Use custom web site on the Por ts tab of the
site properties. For more information, see Configure client communication ports.
Diagnostics and usage data for Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
Configuration Manager collects data only from the site's SQL Server database, and it doesn't collect data directly from
clients or site servers.
TIP
The ConfigurationManager PowerShell module also collects usage data. For more information, see Configuration
Manager cmdlet library privacy statement.
Some of the tools that are included with Configuration Manager collect usage data. For more information, see Diagnostic
usage data for tools.
How Microsoft uses Configuration Manager
diagnostics and usage data
2/16/2022 • 2 minutes to read • Edit Online
TIP
The ConfigurationManager PowerShell module also collects usage data. For more information, see Configuration
Manager cmdlet library privacy statement.
Some of the tools that are included with Configuration Manager collect usage data. For more information, see Diagnostic
usage data for tools.
How to view diagnostics and usage data for
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
One-way hashes
Some data consists of strings of random alphanumeric characters. Configuration Manager uses the SHA-256
algorithm to create one-way hashes. This process makes sure that Microsoft doesn't collect potentially sensitive
data. The hashed data can still be used for correlation and comparison purposes.
For example, instead of collecting the names of tables in the site database, it captures the one-way hash for each
table name. This behavior makes sure that any custom table names aren't visible. Microsoft then does the same
one-way hash process of the default SQL Server table names. Comparing the results of the two queries
determines the deviation of your database schema from the product default. This information is then used to
improve updates that require changes to the SQL Server schema.
When you view the raw data, a common hashed value appears in each row of data. This hash is the suppor t ID ,
also known as the hierarchy ID. It's used to correlate data with the same hierarchy without identifying the
customer or source.
How the one -way hash works
1. Get your support ID from the Configuration Manager console. Select the arrow in the upper left corner of
the ribbon, and then choose About Configuration Manager . You can select and copy the support ID
from the window that opens.
2. Use the following Windows PowerShell script to do the one-way hash of your support ID.
Param( [Parameter(Mandatory=$True)] [string]$value )
$guid = [System.Guid]::NewGuid()
if( [System.Guid]::TryParse($value,[ref] $guid) -eq $true ) {
#many of the values we hash are Guids
$bytesToHash = $guid.ToByteArray()
} else {
#otherwise hash as string (unicode)
$ue = New-Object System.Text.UnicodeEncoding
$bytesToHash = $ue.GetBytes($value)
}
# Load Hash Provider (https://en.wikipedia.org/wiki/SHA-2)
$hashAlgorithm = [System.Security.Cryptography.SHA256Cng]::Create()
# Hash the input
$hashedBytes = $hashAlgorithm.ComputeHash($bytesToHash)
# Base64 encode the result for transport
$result = [Convert]::ToBase64String($hashedBytes)
return $result
3. Compare the script output against the GUID in the raw data. This process shows how the data is
obscured.
Next steps
Next, learn about the levels of diagnostics and usage data that Configuration Manager collects:
Levels of diagnostic usage data
Levels of diagnostic usage data
2/16/2022 • 2 minutes to read • Edit Online
IMPORTANT
Configuration Manager doesn't collect site codes, sites names, IP addresses, user names, computer names, physical
addresses, or email addresses on the Basic or Enhanced levels. Any collection of this information on the Full level isn't
purposeful. It's potentially included in advanced diagnostic information like log files or memory snapshots. Microsoft
doesn't use this information to identify you, contact you, or develop advertising.
Levels
Basic
The Basic level includes data about your hierarchy. It's required to help improve your installation or upgrade
experience. This data also helps determine the Configuration Manager updates that are applicable for your
hierarchy.
Enhanced
The Enhanced level is the default after setup finishes. This level includes data that's collected in the Basic level
and feature-specific data. It shows frequency and duration of use of different features. It also includes
Configuration Manager client settings data: component name, state, and certain settings like polling intervals.
Information about software updates is basic on feature usage, it doesn't include data about update compliance
at this level.
Microsoft recommends this level because it provides the minimum data to make product and service
improvements.
Some examples of data that this level doesn't collect include:
Names of sites, users, computer, or other objects
Details of security-related objects
Vulnerabilities like counts of systems that require software updates
Full
The Full level includes all data in the Basic and Enhanced levels. It also includes additional information about
Endpoint Protection, update compliance percentages, and software update information. This level can also
include advanced diagnostic information like system files and memory snapshots. This advanced data might
include personal information exists in memory or log files at the time of capture.
Version-specific details
The following articles detail the specific data that Configuration Manager collects at each level with each
supported version:
Diagnostic and usage data for 2111
Diagnostic and usage data for 2107
Diagnostic and usage data for 2103
Diagnostic and usage data for 2010
Diagnostic and usage data for 2006
Next steps
Next, learn about the diagnostics and usage data that Configuration Manager collects for its tools:
Diagnostic usage data for tools
Diagnostic and usage data for version 2111
2/16/2022 • 15 minutes to read • Edit Online
IMPORTANT
Configuration Manager doesn't collect site codes, sites names, IP addresses, user names, computer names, physical
addresses, or email addresses on the Basic or Enhanced levels. Any collection of this information on the Full level is not
purposeful. It is potentially included in advanced diagnostic information like log files or memory snapshots. Microsoft
doesn't use this information to identify you, contact you, or develop advertising.
Level 1 - Basic
For Configuration Manager version 2111, this level includes the following data:
Application management (Level 1)
Basic application and deployment type counts: total apps, total apps with multiple deployment types, total
apps with dependencies, total superseded apps, and count of deployment technologies in use
Count of Microsoft Edge installations
Count of clients by default and preferred browser
Client (Level 1)
Count of client languages and locales
Count of Configuration Manager client versions, OS versions, and Office versions
Count of Windows 10 and later devices by branch, build, and unique Active Directory forest
Count of clients joined to Azure Active Directory (Azure AD)
Count of extended interoperability clients
Count of clients by Windows OS age, to the nearest three-month interval
Top 10 processor names used on clients and servers
Use of the bulk registration token
Count of clients by identity source and registration method. For example, Active Directory, Azure AD, or
PKI client authentication certificate.
[New] Count of clients by OS type and version that are joined to Azure AD or hybrid-joined
Cloud services (Level 1)
Count of clients by co-management enrollment method
Error statistics for co-management enrollment
Aggregated usage statistics of co-management: number of clients ever enrolled, number of enrolled
clients, number of clients pending enrollment, clients receiving policy, workload states, pilot/exclusion
collection sizes, and enrollment errors
Count of Azure AD applications and services connected to Configuration Manager
Cloud attach and detach actions
Status of last sync with Intune cloud service
Configuration and usage statistics of cloud management gateway: counts of regions and environments,
and authentication/authorization statistics
Summarized count of Endpoint Analytics event
Aggregated statistics on Desktop Analytics enrollment errors and usage
[New] Count of clients by OS type and version that are co-managed, cloud-attached, or both
Configuration Manager console (Level 1)
Statistics about Configuration Manager console connections: OS version, language, SKU and architecture,
system memory, logical processor count, connect site ID, installed .NET versions, console language packs,
and capable authentication level
Hashed list of extensions to Configuration Manager console property pages and wizards
Configuration Manager console crash locations
Configuration Manager console usage statistics
Configuration Manager console notification configuration and status
Protection (Level 1)
Basic Endpoint Protection information about antimalware client versions
Existence of Microsoft BitLocker Administration and Monitoring (MBAM) server-side extensions
BitLocker management client counts summarized by enrollment and TPM state
Setup (Level 1)
Build, install type, language packs, features that you enabled
Pre-release use, setup media type, branch type
Software Assurance expiration date
Update pack deployment status and errors, download progress, and prerequisite errors
Use of early update ring
Version of post-upgrade script
Central administration site removal status
Site database (Level 1)
Basic database configuration: processors, memory size, memory settings, Configuration Manager
database configuration, Configuration Manager database size, cluster configuration, configuration of
distributed views, and change tracking version
Database performance metrics: replication processing information, top SQL Server stored procedures by
processor, and disk usage
SQL Server version, service pack level, edition, collation ID, and character set
Hashed list of top SQL queries by memory usage and lock count
SQL Server Always On availability group replica information, usage, and health status
Site infrastructure (Level 1)
Basic Configuration Manager site hierarchy data: site list, type, version, status, client count, time zone, and
health status
Basic discovery statistics: discovery count, minimum/maximum/average group sizes, and when the site is
running entirely with Azure Active Directory Services
Basic site system server information: site system roles used, internet and SSL status, OS, processors,
physical or virtual machine, and usage of site server high availability
Configured level for diagnostics and usage data, online or offline mode, and fast update configuration
Distribution point and management point types and basic configuration information: protected,
prestaged, PXE, multicast, SSL state, pull/peer distribution points, MDM-enabled, and SSL-enabled
Diagnostics and usage data statistics: when run, runtime, errors
Hashed list of hardware inventory properties longer than 255 characters
Count and processing rates of key Configuration Manager objects: data discovery records (DDR), state
messages, status messages, hardware inventory, software inventory, and overall count of files in inboxes
Site server disk and processor performance information
Uptime and memory usage information for Configuration Manager site server processes
Count of crashes for Configuration Manager site server processes, and Watson signature ID, if available
Hash of key site attributes (site ID, SQL Server broker ID, and site exchange key)
Status and health of the administration service
Counts of errors from administration service
Site health information
Site health check configuration and status
Version of Visual Studio redistributable and .NET Framework installed on clients and site system servers
Summarized hierarchy health and activity status
Miscellaneous (Level 1)
Basic OS deployment counts of images
Count of Windows clients that use Windows Update for Business
Count of operating systems for managed devices and policies set by the Exchange Connector
Count of phased deployments created by type
Count of categorized and uncategorized applications for asset intelligence
Aggregated count of upgrade readiness assessments
Number of software updates referenced by task sequence
Level 2 - Enhanced
For Configuration Manager version 2111, this level includes the following data:
Application management (Level 2)
App requirements: count of built-in conditions referenced by deployment technology
App supersedence, maximum depth of chain
Application approval statistics and usage frequency
Application content size statistics
Application deployment information: use of install versus uninstall, requires approval, user interaction
enabled/disabled, dependency, supersedence, and usage count of install behavior feature
Application policy size and complexity statistics
Available application request statistics
Basic configuration information for packages and programs: deployment options and program flags
Basic usage/targeting information for deployment types: user versus device targeted, required versus
available, and universal apps
Count of application applicability by OS
Count of applications referenced in a task sequence
Count of distinct branding for application catalog
Count of Microsoft 365 Apps applications created using dashboard
Count of packages by type
Count of package/program deployments
Count of Windows 10 and later licensed application licenses
Count of Windows Installer deployment types by uninstall content settings
Count of Microsoft Store for Business apps and sync statistics: summarized types of apps, licensed app
status, and number of online and offline licensed apps
Maintenance window type and duration
Minimum/maximum/average number of application deployments per user/device per time period
Most common application installation error codes by deployment technology
MSI configuration options and counts
Statistics on end-user interaction with notification for required software deployments
Universal Data Access usage, how created
Aggregated user device affinity statistics
Max and average primary users per device
Application global condition usage by type
[Updated] Software Center customization configuration, including use of settings to configure Software
Center and notification branding
Package Conversion Manager readiness and counts
Count of application detection methods by type
Count of application enforcement errors
MSI installer properties
Statistics of user install requests
Aggregated statistics on the use of the email approval feature
File count, content size, services count, and custom action count of MSIs in application catalog
Count of devices by Office ProPlus readiness state
Aggregated statistics on the use of application groups
Aggregated statistics on Office add-ins, usage of the Office Readiness Toolkit, and counts of clients with
Microsoft 365 Apps
Aggregated statistics on Office add-in health
Count and size of Office Pro Plus pilot collections
Number of Office Pro Plus devices sending Office health data
[New] Count of the type of actions used on apps over time
Client (Level 2)
Active Management Technology (AMT) client version
BIOS age in years
Count of devices with Secure Boot enabled
Count of devices by TPM state
Client auto-upgrade: deployment configuration including client piloting and exclusion usage (extended
interoperability client)
Client deployment download errors
Client health statistics and top issue summary by client version, component, OS, and workload
Client notification operation action status: how many times each is run, max number of targeted clients,
and average success rate
Count of client installations from each source location type
Count of client installation failures
Count of devices virtualized by Hyper-V or Azure
Count of Software Center actions
Count of UEFI-enabled devices
Deployment methods used for client and count of clients per deployment method
List/count of enabled client agents
OS age in months
Number of hardware inventory classes, software inventory rules, file collection rules, and overall health
status
Statistics for device health attestation: most common error codes, number of on-premises servers, and
counts of devices in various states
Count of devices by default browser
Count of Configuration Manager-generated server authentication certificates
Count of Microsoft Surface devices by model
Count of client health check failures by issue type
Count of status (total/approved/blocked) for client certificate types
Client counts for different user/device relationship types
Count of clients in VPN boundaries
Cloud services (Level 2)
Azure AD discovery statistics
Count of collections synced to Azure Log Analytics
Count of Upgrade Analytics Connectors
Whether the Azure Log Analytics cloud connector is enabled
Count of pull-distribution points with a cloud distribution point as a source location
Usage of the cloud services onboarding wizard
Cloud services configuration onboarding properties
Cloud services endpoint connectivity and component health
[New] Usage of the cloud-attach wizard
CMPivot (Level 2)
CMPivot usage statistics
Count of saved CMPivot queries
Count of queries by entity type
Co -management (Level 2)
Enrollment schedule and historical statistics
Count of clients eligible for co-management
Associated Microsoft Intune tenant
Collections (Level 2)
Collection ID usage (not running out of IDs)
Collection evaluation statistics: query time, assigned versus unassigned counts, counts by type, ID
rollover, and rule usage
Collections without a deployment
Count of collections synchronized to Azure AD
Compliance settings (Level 2)
Basic configuration baseline information: count, number of deployments, number of references, and
frequency of changes
Compliance policy error statistics
Count of configuration items by type
Count of deployments that reference built-in settings, including remediate setting
Count of rules and deployments created for custom settings, including remediate setting
Count of deployed Simple Certificate Enrollment Protocol (SCEP), VPN, Wi-Fi, certificate (.pfx), and
compliance policy templates
Count of SCEP certificate, VPN, Wi-Fi, certificate (.pfx), and compliance policy deployments by platform
Windows Hello for Business policy (created, deployed)
Count of deployed Microsoft Edge Legacy browser policies
Count of OneDrive policies (created, deployed)
Count of compliance settings deployed by category, OS, and source (cloud vs on-premises)
Configuration Manager console (Level 2)
Counts of active and viewed console notification messages by type
Count of folders
Console performance information
25 most common actions, wizards, property sheets, and tree nodes accessed in the console
[Updated] List of installed console extensions, and whether they're enabled, required, or approved
Summary of size and count of admin persisted settings
Selected console usage information
Unsigned extension policy
Content (Level 2)
Boundary group statistics: how many fast, how many slow, count per group, and fallback relationships
Boundary group information: count of boundaries and site systems that are assigned to each boundary
group
Boundary group relationships and fallback configuration
Client content download statistics
Count of boundaries by type
Count of peer cache clients, usage statistic, and partial download statistics
Distribution Manager configuration information: threads, retry delay, number of retries, and pull
distribution point settings
Distribution point configuration information: use of branch cache and distribution point monitoring
Distribution point group information: count of packages and distribution points that are assigned to each
distribution point group
Content library type, whether local or remote
Count of boundary groups by configuration
Count of subnets excluded from peer cache
Protection (Level 2)
Microsoft Defender for Endpoint policies (formerly known as Windows Defender for Endpoint): count of
policies, and whether policies are deployed.
Count of alerts that are configured for Endpoint Protection feature
Count of collections that are selected to appear in Endpoint Protection dashboard
Count of Windows Defender Exploit Guard policies, deployments, and targeted clients
Endpoint Protection deployment errors, count of Endpoint Protection policy deployment error codes
Endpoint Protection antimalware and Windows Firewall policy usage (number of unique policies
assigned to group). This data doesn't include any information about the settings included in the policy.
Aggregated statistics for Microsoft Defender for Endpoint policies
Migration (Level 2)
Count of migrated objects (use of migration wizard)
Mobile device management (MDM ) (Level 2)
Count of issued mobile device actions: lock, pin rest, wipe, retire, and sync now commands
Count of mobile device policies
Count of mobile devices Configuration Manager manages, and how you enrolled them (bulk, user-based)
Count of users who have multiple enrolled mobile devices
Mobile device polling schedule and statistics for mobile device check-in duration
On-premises mobile device management (MDM ) (Level 2)
Count of Windows bulk enrollment packages and profiles
Deployment success/failure statistics for on-premises MDM application deployments
OS deployment (Level 2)
Count of boot images, drivers, driver packages, multicast-enabled distribution points, PXE-enabled
distribution points, and task sequences
Count of boot images by Configuration Manager client version
Count of boot images by Windows PE version
Count of edition upgrade policies
Count of hardware identifiers excluded from PXE
Count of OS deployment by OS version
Count of OS upgrades over time
Count of task sequence deployments using option to pre-download content
Counts of task sequence step usage
Version of Windows ADK installed
Count of image servicing tasks
Count of imported machines
Count of duplicate hardware identifiers (MAC address and SMBIOS GUID) excluded from PXE and client
registration
Count of task sequences by type (OS deployment or generic task sequence)
Count of packages with pre-cache content settings
Grouped sizes of task sequence policies
Count of error codes from feature upgrades for Windows clients
Count of supported and unsupported OS versions
Site updates (Level 2)
Versions of installed Configuration Manager hotfixes
Software updates (Level 2)
Available and deadline deltas that are used in automatic deployment rules
Average and maximum number of assignments per update
Client update evaluation and scan schedules
Classifications synced by the software update point
Cluster patching statistics
Configuration of Windows express updates
Configurations that are used for active Windows servicing plans
Count of deployed Microsoft 365 Apps updates
Count of Microsoft Surface drivers synced
Count of update groups and assignments
Count of update packages and the maximum/minimum/average number of distribution points that are
targeted with packages
Count of updates that are created and deployed with System Center Update Publisher
Count of Windows Update for Business policies created and deployed
Aggregated statistics of Windows Update for Business configurations
Number of automatic deployment rules that are tied to synchronization
Number of automatic deployment rules that create new or add updates to an existing group
Number of automatic deployment rules that have multiple deployments
Number of update groups and minimum/maximum/average number of updates per group
Number of updates and percentage of updates that are deployed, expired, superseded, downloaded, and
contain EULAs
Software update point load-balancing statistics
Software update point synchronization schedule
Total/average number of collections that have software update deployments and the maximum/average
number of deployed updates
Update scan error codes and machine count
Windows servicing dashboard content versions
Count of third-party software update catalog subscriptions and usage
Count of software updates deployed with and without content
Aggregated statistics on the number of UUP updates that are required, deployed, expired, superseded,
and downloaded
Use of UUP product categories
Count of clients that have deployed at least one UUP quality update or UUP feature update
Top UUP error codes and count of affected devices
List of subscriptions to third-party software update catalogs
Use of WSUS maintenance settings
Orchestration group usage
Windows Update fallback configuration settings
[New] Type, size, and timeout settings of orchestration group scripts
SQL/performance data (Level 2)
Configuration and duration of site summarization
Count of largest database tables
Discovery operational statistics (count of objects found)
Discovery types, enabled, and schedule (full, incremental)
SQL Server change tracking performance issues, retention period, and autocleanup state
SQL Server change tracking retention period
State and status message performance statistics including most common and most expensive message
types
Management point traffic statistics (total bytes sent and received by endpoint)
Management point performance counter measurements
Aggregated performance statistics of calls made to Software Center endpoints on the management point
SQL Server maintenance task configuration and status
Status of recent re-initialization requests
Miscellaneous (Level 2)
Configuration of data warehouse service point including synchronization schedule, average time, and use
of customized tables feature
Count of scripts and run/edit statistics
Count of sites with Wake On LAN (WOL)
Reporting usage and performance statistics
Phased deployment usage statistics
Management insights item counts and progress
Count of crashes for unique non-Configuration Manager processes on the site server, and Watson
signature ID, if available
Aggregated system boot time statistics by OS, form-factor, and drive type
Usage of the Azure migration tool
Count of clients with browser usage
[Updated] Summary of how many site systems have the proxy enabled and how many are
authenticated proxy, including configuration, usage patterns, and traffic patterns
Usage information for the last seven days of in-console product feedback
Count of site-to-site accounts by type
Usage statistics for user and device custom properties
Level 3 - Full
For Configuration Manager version 2111, this level includes the following data:
Automatic deployment rule evaluation schedule information
ATP health summary
Collection evaluation and refresh statistics
Compliance policy statistics on compliance and errors
Compliance settings: SCEP, VPN, Wi-Fi, and compliance policy template configuration details
DCM config pack for Configuration Manager usage
Detailed client deployment installation errors
Endpoint Protection health summary: including count of protected, at risk, unknown, and unsupported
clients
Endpoint Protection policy configuration
List of processes configured with installation behavior for applications
Minimum/maximum/average number of hours since last software update scan
Minimum/maximum/average number of inactive clients in software update deployment collections
Minimum/maximum/average number of software updates per package
MSI product code deployment statistics
Overall compliance of software update deployments
Count of groups that have expired software updates
Software update deployment error codes and counts
Software update deployment information: percentage of deployments that are targeted with client versus
UTC time, required versus optional versus silent, and reboot suppression
Software update products synced by software update point
Software update scan success percentages
Top 50 CPUs in the environment
Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that
Microsoft Intune manages
Microsoft Store for Business application details: non-aggregate list of synced applications including
AppID, online state or offline state, and total purchased license counts
Count of clients pushed with option to not allow fallback to NTLM
List of Configuration Manager console extensions
Diagnostic and usage data for version 2107
2/16/2022 • 15 minutes to read • Edit Online
IMPORTANT
Configuration Manager doesn't collect site codes, sites names, IP addresses, user names, computer names, physical
addresses, or email addresses on the Basic or Enhanced levels. Any collection of this information on the Full level is not
purposeful. It is potentially included in advanced diagnostic information like log files or memory snapshots. Microsoft
doesn't use this information to identify you, contact you, or develop advertising.
Level 1 - Basic
For Configuration Manager version 2107, this level includes the following data:
Application management (Level 1)
Basic application and deployment type counts: total apps, total apps with multiple deployment types, total
apps with dependencies, total superseded apps, and count of deployment technologies in use
Count of Microsoft Edge installations
Count of clients by default and preferred browser
Client (Level 1)
Count of client languages and locales
Count of Configuration Manager client versions, OS versions, and Office versions
Count of Windows 10 and later devices by branch, build, and unique Active Directory forest
Count of clients joined to Azure Active Directory
Count of extended interoperability clients
Count of clients by Windows OS age, to the nearest three-month interval
Top 10 processor names used on clients and servers
Use of the bulk registration token
Count of clients by identity source and registration method. For example, Active Directory, Azure Active
Directory, or PKI client authentication certificate.
Cloud services (Level 1)
Count of clients by co-management enrollment method
Error statistics for co-management enrollment
Aggregated usage statistics of co-management: number of clients ever enrolled, number of enrolled
clients, number of clients pending enrollment, clients receiving policy, workload states, pilot/exclusion
collection sizes, and enrollment errors
Count of Azure Active Directory applications and services connected to Configuration Manager
Cloud attach and detach actions
Status of last sync with Intune cloud service
Configuration and usage statistics of cloud management gateway: counts of regions and environments,
and authentication/authorization statistics
Summarized count of Endpoint Analytics event
Aggregated statistics on Desktop Analytics enrollment errors and usage
Configuration Manager console (Level 1)
Statistics about Configuration Manager console connections: OS version, language, SKU and architecture,
system memory, logical processor count, connect site ID, installed .NET versions, console language packs,
and capable authentication level
Hashed list of extensions to Configuration Manager console property pages and wizards
Configuration Manager console crash locations
Configuration Manager console usage statistics
Configuration Manager console notification configuration and status
Protection (Level 1)
Basic Endpoint Protection information about antimalware client versions
Existence of Microsoft BitLocker Administration and Monitoring (MBAM) server-side extensions
BitLocker management client counts summarized by enrollment and TPM state
Setup (Level 1)
Build, install type, language packs, features that you enabled
Pre-release use, setup media type, branch type
Software Assurance expiration date
Update pack deployment status and errors, download progress, and prerequisite errors
Use of early update ring
Version of post-upgrade script
Central administration site removal status
Site database (Level 1)
Basic database configuration: processors, memory size, memory settings, Configuration Manager
database configuration, Configuration Manager database size, cluster configuration, configuration of
distributed views, and change tracking version
Database performance metrics: replication processing information, top SQL Server stored procedures by
processor, and disk usage
SQL Server version, service pack level, edition, collation ID, and character set
Hashed list of top SQL queries by memory usage and lock count
SQL Server Always On availability group replica information, usage, and health status
Site infrastructure (Level 1)
Basic Configuration Manager site hierarchy data: site list, type, version, status, client count, time zone, and
health status
Basic discovery statistics: discovery count, minimum/maximum/average group sizes, and when the site is
running entirely with Azure Active Directory Services
Basic site system server information: site system roles used, internet and SSL status, OS, processors,
physical or virtual machine, and usage of site server high availability
Configured level for diagnostics and usage data, online or offline mode, and fast update configuration
Distribution point and management point types and basic configuration information: protected,
prestaged, PXE, multicast, SSL state, pull/peer distribution points, MDM-enabled, and SSL-enabled
Diagnostics and usage data statistics: when run, runtime, errors
Hashed list of hardware inventory properties longer than 255 characters
Count and processing rates of key Configuration Manager objects: data discovery records (DDR), state
messages, status messages, hardware inventory, software inventory, and overall count of files in inboxes
Site server disk and processor performance information
Uptime and memory usage information for Configuration Manager site server processes
Count of crashes for Configuration Manager site server processes, and Watson signature ID, if available
Hash of key site attributes (site ID, SQL Server broker ID, and site exchange key)
Status and health of the administration service
Counts of errors from administration service
Site health information
Site health check configuration and status
Version of Visual Studio redistributable and .NET Framework installed on clients and site system servers
Summarized hierarchy health and activity status
Miscellaneous (Level 1)
Basic OS deployment counts of images
Count of Windows clients that use Windows Update for Business
Count of operating systems for managed devices and policies set by the Exchange Connector
Count of phased deployments created by type
Count of categorized and uncategorized applications for asset intelligence
Aggregated count of upgrade readiness assessments
Number of software updates referenced by task sequence
Level 2 - Enhanced
For Configuration Manager version 2107, this level includes the following data:
Application management (Level 2)
App requirements: count of built-in conditions referenced by deployment technology
App supersedence, maximum depth of chain
Application approval statistics and usage frequency
Application content size statistics
Application deployment information: use of install versus uninstall, requires approval, user interaction
enabled/disabled, dependency, supersedence, and usage count of install behavior feature
Application policy size and complexity statistics
Available application request statistics
Basic configuration information for packages and programs: deployment options and program flags
Basic usage/targeting information for deployment types: user versus device targeted, required versus
available, and universal apps
Count of application applicability by OS
Count of applications referenced in a task sequence
Count of distinct branding for application catalog
Count of Microsoft 365 Apps applications created using dashboard
Count of packages by type
Count of package/program deployments
Count of Windows 10 and later licensed application licenses
Count of Windows Installer deployment types by uninstall content settings
Count of Microsoft Store for Business apps and sync statistics: summarized types of apps, licensed app
status, and number of online and offline licensed apps
Maintenance window type and duration
Minimum/maximum/average number of application deployments per user/device per time period
Most common application installation error codes by deployment technology
MSI configuration options and counts
Statistics on end-user interaction with notification for required software deployments
Universal Data Access usage, how created
Aggregated user device affinity statistics
Max and average primary users per device
Application global condition usage by type
Software Center customization configuration
Package Conversion Manager readiness and counts
Count of application detection methods by type
Count of application enforcement errors
MSI installer properties
Statistics of user install requests
Aggregated statistics on the use of the email approval feature
File count, content size, services count, and custom action count of MSIs in application catalog
Count of devices by Office ProPlus readiness state
Aggregated statistics on the use of application groups
Aggregated statistics on Office add-ins, usage of the Office Readiness Toolkit, and counts of clients with
Microsoft 365 Apps
Aggregated statistics on Office add-in health
Count and size of Office Pro Plus pilot collections
Number of Office Pro Plus devices sending Office health data
Client (Level 2)
Active Management Technology (AMT) client version
BIOS age in years
Count of devices with Secure Boot enabled
Count of devices by TPM state
Client auto-upgrade: deployment configuration including client piloting and exclusion usage (extended
interoperability client)
Client deployment download errors
Client health statistics and top issue summary by client version, component, OS, and workload
Client notification operation action status: how many times each is run, max number of targeted clients,
and average success rate
Count of client installations from each source location type
Count of client installation failures
Count of devices virtualized by Hyper-V or Azure
Count of Software Center actions
Count of UEFI-enabled devices
Deployment methods used for client and count of clients per deployment method
List/count of enabled client agents
OS age in months
Number of hardware inventory classes, software inventory rules, file collection rules, and overall health
status
Statistics for device health attestation: most common error codes, number of on-premises servers, and
counts of devices in various states
Count of devices by default browser
Count of Configuration Manager-generated server authentication certificates
Count of Microsoft Surface devices by model
Count of client health check failures by issue type
Count of status (total/approved/blocked) for client certificate types
Client counts for different user/device relationship types
Count of clients in VPN boundaries
Cloud services (Level 2)
Azure Active Directory discovery statistics
Count of collections synced to Azure Log Analytics
Count of Upgrade Analytics Connectors
Whether the Azure Log Analytics cloud connector is enabled
Count of pull-distribution points with a cloud distribution point as a source location
Usage of the cloud services onboarding wizard
Cloud services configuration onboarding properties
Cloud services endpoint connectivity and component health
CMPivot (Level 2)
CMPivot usage statistics
Count of saved CMPivot queries
Count of queries by entity type
Co -management (Level 2)
Enrollment schedule and historical statistics
Count of clients eligible for co-management
Associated Microsoft Intune tenant
Collections (Level 2)
Collection ID usage (not running out of IDs)
Collection evaluation statistics: query time, assigned versus unassigned counts, counts by type, ID
rollover, and rule usage
Collections without a deployment
Count of collections synchronized to Azure Active Directory
Compliance settings (Level 2)
[Updated] Basic configuration baseline information: count, number of deployments, number of
references, and frequency of changes
Compliance policy error statistics
Count of configuration items by type
Count of deployments that reference built-in settings, including remediate setting
Count of rules and deployments created for custom settings, including remediate setting
Count of deployed Simple Certificate Enrollment Protocol (SCEP), VPN, Wi-Fi, certificate (.pfx), and
compliance policy templates
Count of SCEP certificate, VPN, Wi-Fi, certificate (.pfx), and compliance policy deployments by platform
Windows Hello for Business policy (created, deployed)
Count of deployed Microsoft Edge Legacy browser policies
Count of OneDrive policies (created, deployed)
Count of compliance settings deployed by category, OS, and source (cloud vs on-premises)
Configuration Manager console (Level 2)
Counts of active and viewed console notification messages by type
Count of folders
Console performance information
25 most common actions, wizards, property sheets, and tree nodes accessed in the console
List of installed console extensions
Summary of size and count of admin persisted settings
Selected console usage information
[NEW] Unsigned extension policy
Content (Level 2)
Boundary group statistics: how many fast, how many slow, count per group, and fallback relationships
Boundary group information: count of boundaries and site systems that are assigned to each boundary
group
Boundary group relationships and fallback configuration
Client content download statistics
Count of boundaries by type
Count of peer cache clients, usage statistic, and partial download statistics
Distribution Manager configuration information: threads, retry delay, number of retries, and pull
distribution point settings
Distribution point configuration information: use of branch cache and distribution point monitoring
Distribution point group information: count of packages and distribution points that are assigned to each
distribution point group
Content library type, whether local or remote
Count of boundary groups by configuration
Count of subnets excluded from peer cache
Protection (Level 2)
Microsoft Defender for Endpoint policies (formerly known as Windows Defender for Endpoint): count of
policies, and whether policies are deployed.
Count of alerts that are configured for Endpoint Protection feature
Count of collections that are selected to appear in Endpoint Protection dashboard
Count of Windows Defender Exploit Guard policies, deployments, and targeted clients
Endpoint Protection deployment errors, count of Endpoint Protection policy deployment error codes
Endpoint Protection antimalware and Windows Firewall policy usage (number of unique policies
assigned to group). This data doesn't include any information about the settings included in the policy.
Aggregated statistics for Microsoft Defender for Endpoint policies
Migration (Level 2)
Count of migrated objects (use of migration wizard)
Mobile device management (MDM ) (Level 2)
Count of issued mobile device actions: lock, pin rest, wipe, retire, and sync now commands
Count of mobile device policies
Count of mobile devices Configuration Manager manages, and how you enrolled them (bulk, user-based)
Count of users who have multiple enrolled mobile devices
Mobile device polling schedule and statistics for mobile device check-in duration
On-premises mobile device management (MDM ) (Level 2)
Count of Windows bulk enrollment packages and profiles
Deployment success/failure statistics for on-premises MDM application deployments
OS deployment (Level 2)
Count of boot images, drivers, driver packages, multicast-enabled distribution points, PXE-enabled
distribution points, and task sequences
Count of boot images by Configuration Manager client version
Count of boot images by Windows PE version
Count of edition upgrade policies
Count of hardware identifiers excluded from PXE
Count of OS deployment by OS version
Count of OS upgrades over time
Count of task sequence deployments using option to pre-download content
Counts of task sequence step usage
Version of Windows ADK installed
Count of image servicing tasks
Count of imported machines
Count of duplicate hardware identifiers (MAC address and SMBIOS GUID) excluded from PXE and client
registration
Count of task sequences by type (OS deployment or generic task sequence)
Count of packages with pre-cache content settings
Grouped sizes of task sequence policies
Count of error codes from feature upgrades for Windows clients
[NEW] Count of supported and unsupported OS versions
Site updates (Level 2)
Versions of installed Configuration Manager hotfixes
Software updates (Level 2)
Available and deadline deltas that are used in automatic deployment rules
Average and maximum number of assignments per update
Client update evaluation and scan schedules
Classifications synced by the software update point
Cluster patching statistics
Configuration of Windows express updates
Configurations that are used for active Windows servicing plans
Count of deployed Microsoft 365 Apps updates
Count of Microsoft Surface drivers synced
Count of update groups and assignments
Count of update packages and the maximum/minimum/average number of distribution points that are
targeted with packages
Count of updates that are created and deployed with System Center Update Publisher
Count of Windows Update for Business policies created and deployed
Aggregated statistics of Windows Update for Business configurations
Number of automatic deployment rules that are tied to synchronization
Number of automatic deployment rules that create new or add updates to an existing group
Number of automatic deployment rules that have multiple deployments
Number of update groups and minimum/maximum/average number of updates per group
Number of updates and percentage of updates that are deployed, expired, superseded, downloaded, and
contain EULAs
Software update point load-balancing statistics
Software update point synchronization schedule
Total/average number of collections that have software update deployments and the maximum/average
number of deployed updates
Update scan error codes and machine count
Windows servicing dashboard content versions
Count of third-party software update catalog subscriptions and usage
Count of software updates deployed with and without content
Aggregated statistics on the number of UUP updates that are required, deployed, expired, superseded,
and downloaded
Use of UUP product categories
Count of clients that have deployed at least one UUP quality update or UUP feature update
Top UUP error codes and count of affected devices
List of subscriptions to third-party software update catalogs
Use of WSUS maintenance settings
Orchestration group usage
Windows Update fallback configuration settings
SQL/performance data (Level 2)
Configuration and duration of site summarization
Count of largest database tables
Discovery operational statistics (count of objects found)
Discovery types, enabled, and schedule (full, incremental)
SQL Server change tracking performance issues, retention period, and autocleanup state
SQL Server change tracking retention period
State and status message performance statistics including most common and most expensive message
types
Management point traffic statistics (total bytes sent and received by endpoint)
Management point performance counter measurements
Aggregated performance statistics of calls made to Software Center endpoints on the management point
SQL Server maintenance task configuration and status
Status of recent re-initialization requests
Miscellaneous (Level 2)
Configuration of data warehouse service point including synchronization schedule, average time, and use
of customized tables feature
Count of scripts and run/edit statistics
Count of sites with Wake On LAN (WOL)
Reporting usage and performance statistics
Phased deployment usage statistics
Management insights item counts and progress
Count of crashes for unique non-Configuration Manager processes on the site server, and Watson
signature ID, if available
Aggregated system boot time statistics by OS, form-factor, and drive type
Usage of the Azure migration tool
Count of clients with browser usage
Summary of how many site systems have the proxy enabled and how many are authenticated proxy
Usage information for the last seven days of in-console product feedback
[NEW] Count of site-to-site accounts by type
[NEW] Usage statistics for user and device custom properties
Level 3 - Full
For Configuration Manager version 2107, this level includes the following data:
Automatic deployment rule evaluation schedule information
ATP health summary
Collection evaluation and refresh statistics
Compliance policy statistics on compliance and errors
Compliance settings: SCEP, VPN, Wi-Fi, and compliance policy template configuration details
DCM config pack for Configuration Manager usage
Detailed client deployment installation errors
Endpoint Protection health summary: including count of protected, at risk, unknown, and unsupported
clients
Endpoint Protection policy configuration
List of processes configured with installation behavior for applications
Minimum/maximum/average number of hours since last software update scan
Minimum/maximum/average number of inactive clients in software update deployment collections
Minimum/maximum/average number of software updates per package
MSI product code deployment statistics
Overall compliance of software update deployments
Count of groups that have expired software updates
Software update deployment error codes and counts
Software update deployment information: percentage of deployments that are targeted with client versus
UTC time, required versus optional versus silent, and reboot suppression
Software update products synced by software update point
Software update scan success percentages
Top 50 CPUs in the environment
Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that
Microsoft Intune manages
Microsoft Store for Business application details: non-aggregate list of synced applications including
AppID, online state or offline state, and total purchased license counts
Count of clients pushed with option to not allow fallback to NTLM
List of Configuration Manager console extensions
Diagnostic and usage data for version 2103
2/16/2022 • 15 minutes to read • Edit Online
IMPORTANT
Configuration Manager doesn't collect site codes, sites names, IP addresses, user names, computer names, physical
addresses, or email addresses on the Basic or Enhanced levels. Any collection of this information on the Full level is not
purposeful. It is potentially included in advanced diagnostic information like log files or memory snapshots. Microsoft
doesn't use this information to identify you, contact you, or develop advertising.
Level 1 - Basic
For Configuration Manager version 2103, this level includes the following data:
Application management (Level 1)
Basic application and deployment type counts: total apps, total apps with multiple deployment types, total
apps with dependencies, total superseded apps, and count of deployment technologies in use
Count of Microsoft Edge installations
Count of clients by default and preferred browser
Client (Level 1)
Count of client languages and locales
Count of Configuration Manager client versions, OS versions, and Office versions
Count of Windows 10 devices by branch, build, and unique Active Directory forest
Count of clients joined to Azure Active Directory
Count of extended interoperability clients
Count of clients by Windows OS age, to the nearest three-month interval
Top 10 processor names used on clients and servers
Use of the bulk registration token
Count of clients by identity source and registration method. For example, Active Directory, Azure Active
Directory, or PKI client authentication certificate.
Cloud services (Level 1)
Count of clients by co-management enrollment method
Error statistics for co-management enrollment
Aggregated usage statistics of co-management: number of clients ever enrolled, number of enrolled
clients, number of clients pending enrollment, clients receiving policy, workload states, pilot/exclusion
collection sizes, and enrollment errors
Count of Azure Active Directory applications and services connected to Configuration Manager
Cloud attach and detach actions
Status of last sync with Intune cloud service
Configuration and usage statistics of cloud management gateway: counts of regions and environments,
and authentication/authorization statistics
Summarized count of Endpoint Analytics event
Aggregated statistics on Desktop Analytics enrollment errors and usage
Configuration Manager console (Level 1)
Statistics about Configuration Manager console connections: OS version, language, SKU and architecture,
system memory, logical processor count, connect site ID, installed .NET versions, console language packs,
and capable authentication level
Hashed list of extensions to Configuration Manager console property pages and wizards
Configuration Manager console crash locations
Configuration Manager console usage statistics
Configuration Manager console notification configuration and status
Protection (Level 1)
Basic Endpoint Protection information about antimalware client versions
Existence of Microsoft BitLocker Administration and Monitoring (MBAM) server-side extensions
[Updated] BitLocker management client counts summarized by enrollment and TPM state
Setup (Level 1)
Build, install type, language packs, features that you enabled
Pre-release use, setup media type, branch type
Software Assurance expiration date
Update pack deployment status and errors, download progress, and prerequisite errors
Use of early update ring
Version of post-upgrade script
[New] Central administration site removal status
Site database (Level 1)
Basic database configuration: processors, memory size, memory settings, Configuration Manager
database configuration, Configuration Manager database size, cluster configuration, configuration of
distributed views, and change tracking version
Database performance metrics: replication processing information, top SQL Server stored procedures by
processor, and disk usage
SQL Server version, service pack level, edition, collation ID, and character set
Hashed list of top SQL queries by memory usage and lock count
SQL Server Always On availability group replica information, usage, and health status
Site infrastructure (Level 1)
Basic Configuration Manager site hierarchy data: site list, type, version, status, client count, time zone, and
health status
Basic discovery statistics: discovery count, minimum/maximum/average group sizes, and when the site is
running entirely with Azure Active Directory Services
Basic site system server information: site system roles used, internet and SSL status, OS, processors,
physical or virtual machine, and usage of site server high availability
Configured level for diagnostics and usage data, online or offline mode, and fast update configuration
Distribution point and management point types and basic configuration information: protected,
prestaged, PXE, multicast, SSL state, pull/peer distribution points, MDM-enabled, and SSL-enabled
Diagnostics and usage data statistics: when run, runtime, errors
Hashed list of hardware inventory properties longer than 255 characters
Count and processing rates of key Configuration Manager objects: data discovery records (DDR), state
messages, status messages, hardware inventory, software inventory, and overall count of files in inboxes
Site server disk and processor performance information
Uptime and memory usage information for Configuration Manager site server processes
Count of crashes for Configuration Manager site server processes, and Watson signature ID, if available
Hash of key site attributes (site ID, SQL Server broker ID, and site exchange key)
Status and health of the administration service
Counts of errors from administration service
Site health information
Site health check configuration and status
Version of Visual Studio redistributable and .NET Framework installed on clients and site system servers
Summarized hierarchy health and activity status
Miscellaneous (Level 1)
Basic OS deployment counts of images
Count of Windows 10 clients that use Windows Update for Business
Count of operating systems for managed devices and policies set by the Exchange Connector
Count of phased deployments created by type
Count of categorized and uncategorized applications for asset intelligence
[New] Aggregated count of upgrade readiness assessments
[New] Number of software updates referenced by task sequence
Level 2 - Enhanced
For Configuration Manager version 2103, this level includes the following data:
Application management (Level 2)
App requirements: count of built-in conditions referenced by deployment technology
App supersedence, maximum depth of chain
Application approval statistics and usage frequency
Application content size statistics
Application deployment information: use of install versus uninstall, requires approval, user interaction
enabled/disabled, dependency, supersedence, and usage count of install behavior feature
Application policy size and complexity statistics
Available application request statistics
Basic configuration information for packages and programs: deployment options and program flags
Basic usage/targeting information for deployment types: user versus device targeted, required versus
available, and universal apps
Count of application applicability by OS
Count of applications referenced in a task sequence
Count of distinct branding for application catalog
Count of Microsoft 365 Apps applications created using dashboard
Count of packages by type
Count of package/program deployments
Count of Windows 10 licensed application licenses
Count of Windows Installer deployment types by uninstall content settings
Count of Microsoft Store for Business apps and sync statistics: summarized types of apps, licensed app
status, and number of online and offline licensed apps
Maintenance window type and duration
Minimum/maximum/average number of application deployments per user/device per time period
Most common application installation error codes by deployment technology
MSI configuration options and counts
Statistics on end-user interaction with notification for required software deployments
Universal Data Access usage, how created
Aggregated user device affinity statistics
Max and average primary users per device
Application global condition usage by type
Software Center customization configuration
Package Conversion Manager readiness and counts
Count of application detection methods by type
Count of application enforcement errors
MSI installer properties
Statistics of user install requests
Aggregated statistics on the use of the email approval feature
File count, content size, services count, and custom action count of MSIs in application catalog
Count of devices by Office ProPlus readiness state
Aggregated statistics on the use of application groups
Aggregated statistics on Office add-ins, usage of the Office Readiness Toolkit, and counts of clients with
Microsoft 365 Apps
Aggregated statistics on Office add-in health
Count and size of Office Pro Plus pilot collections
Number of Office Pro Plus devices sending Office health data
Client (Level 2)
Active Management Technology (AMT) client version
BIOS age in years
Count of devices with Secure Boot enabled
Count of devices by TPM state
Client auto-upgrade: deployment configuration including client piloting and exclusion usage (extended
interoperability client)
Client deployment download errors
Client health statistics and top issue summary by client version, component, OS, and workload
Client notification operation action status: how many times each is run, max number of targeted clients,
and average success rate
Count of client installations from each source location type
Count of client installation failures
Count of devices virtualized by Hyper-V or Azure
Count of Software Center actions
Count of UEFI-enabled devices
Deployment methods used for client and count of clients per deployment method
List/count of enabled client agents
OS age in months
Number of hardware inventory classes, software inventory rules, file collection rules, and overall health
status
Statistics for device health attestation: most common error codes, number of on-premises servers, and
counts of devices in various states
Count of devices by default browser
Count of Configuration Manager-generated server authentication certificates
Count of Microsoft Surface devices by model
Count of client health check failures by issue type
Count of status (total/approved/blocked) for client certificate types
Client counts for different user/device relationship types
Count of clients in VPN boundaries
Cloud services (Level 2)
Azure Active Directory discovery statistics
Count of collections synced to Azure Log Analytics
Count of Upgrade Analytics Connectors
Whether the Azure Log Analytics cloud connector is enabled
Count of pull-distribution points with a cloud distribution point as a source location
Usage of the cloud services onboarding wizard
[New] Cloud services configuration onboarding properties
[New] Cloud services endpoint connectivity and component health
CMPivot (Level 2)
CMPivot usage statistics
Count of saved CMPivot queries
Count of queries by entity type
Co -management (Level 2)
Enrollment schedule and historical statistics
Count of clients eligible for co-management
Associated Microsoft Intune tenant
Collections (Level 2)
Collection ID usage (not running out of IDs)
Collection evaluation statistics: query time, assigned versus unassigned counts, counts by type, ID
rollover, and rule usage
Collections without a deployment
Count of collections synchronized to Azure Active Directory
Compliance settings (Level 2)
Basic configuration baseline information: count, number of deployments, and number of references
Compliance policy error statistics
Count of configuration items by type
Count of deployments that reference built-in settings, including remediate setting
Count of rules and deployments created for custom settings, including remediate setting
Count of deployed Simple Certificate Enrollment Protocol (SCEP), VPN, Wi-Fi, certificate (.pfx), and
compliance policy templates
Count of SCEP certificate, VPN, Wi-Fi, certificate (.pfx), and compliance policy deployments by platform
Windows Hello for Business policy (created, deployed)
Count of deployed Microsoft Edge Legacy browser policies
Count of OneDrive policies (created, deployed)
Count of compliance settings deployed by category, OS, and source (cloud vs on-premises)
Configuration Manager console (Level 2)
Counts of active and viewed console notification messages by type
Count of folders
Console performance information
25 most common actions, wizards, property sheets, and tree nodes accessed in the console
List of installed console extensions
Summary of size and count of admin persisted settings
Selected console usage information
Content (Level 2)
Boundary group statistics: how many fast, how many slow, count per group, and fallback relationships
Boundary group information: count of boundaries and site systems that are assigned to each boundary
group
Boundary group relationships and fallback configuration
Client content download statistics
Count of boundaries by type
Count of peer cache clients, usage statistic, and partial download statistics
Distribution Manager configuration information: threads, retry delay, number of retries, and pull
distribution point settings
Distribution point configuration information: use of branch cache and distribution point monitoring
Distribution point group information: count of packages and distribution points that are assigned to each
distribution point group
Content library type, whether local or remote
Count of boundary groups by configuration
Count of subnets excluded from peer cache
Protection (Level 2)
Microsoft Defender for Endpoint policies (formerly known as Windows Defender for Endpoint): count of
policies, and whether policies are deployed.
Count of alerts that are configured for Endpoint Protection feature
Count of collections that are selected to appear in Endpoint Protection dashboard
Count of Windows Defender Exploit Guard policies, deployments, and targeted clients
Endpoint Protection deployment errors, count of Endpoint Protection policy deployment error codes
Endpoint Protection antimalware and Windows Firewall policy usage (number of unique policies
assigned to group). This data doesn't include any information about the settings included in the policy.
Aggregated statistics for Microsoft Defender for Endpoint policies
Migration (Level 2)
Count of migrated objects (use of migration wizard)
Mobile device management (MDM ) (Level 2)
Count of issued mobile device actions: lock, pin rest, wipe, retire, and sync now commands
Count of mobile device policies
Count of mobile devices Configuration Manager manages, and how you enrolled them (bulk, user-based)
Count of users who have multiple enrolled mobile devices
Mobile device polling schedule and statistics for mobile device check-in duration
On-premises mobile device management (MDM ) (Level 2)
Count of Windows 10 bulk enrollment packages and profiles
Deployment success/failure statistics for on-premises MDM application deployments
OS deployment (Level 2)
Count of boot images, drivers, driver packages, multicast-enabled distribution points, PXE-enabled
distribution points, and task sequences
Count of boot images by Configuration Manager client version
Count of boot images by Windows PE version
Count of edition upgrade policies
Count of hardware identifiers excluded from PXE
Count of OS deployment by OS version
Count of OS upgrades over time
Count of task sequence deployments using option to pre-download content
Counts of task sequence step usage
Version of Windows ADK installed
Count of image servicing tasks
Count of imported machines
Count of duplicate hardware identifiers (MAC address and SMBIOS GUID) excluded from PXE and client
registration
Count of task sequences by type (OS deployment or generic task sequence)
Count of packages with pre-cache content settings
Grouped sizes of task sequence policies
[New] Count of error codes from feature upgrades for Windows 10 clients
Site updates (Level 2)
Versions of installed Configuration Manager hotfixes
Software updates (Level 2)
Available and deadline deltas that are used in automatic deployment rules
Average and maximum number of assignments per update
Client update evaluation and scan schedules
Classifications synced by the software update point
Cluster patching statistics
Configuration of Windows 10 express updates
Configurations that are used for active Windows 10 servicing plans
Count of deployed Microsoft 365 Apps updates
Count of Microsoft Surface drivers synced
Count of update groups and assignments
Count of update packages and the maximum/minimum/average number of distribution points that are
targeted with packages
Count of updates that are created and deployed with System Center Update Publisher
Count of Windows Update for Business policies created and deployed
Aggregated statistics of Windows Update for Business configurations
Number of automatic deployment rules that are tied to synchronization
Number of automatic deployment rules that create new or add updates to an existing group
Number of automatic deployment rules that have multiple deployments
Number of update groups and minimum/maximum/average number of updates per group
Number of updates and percentage of updates that are deployed, expired, superseded, downloaded, and
contain EULAs
Software update point load-balancing statistics
Software update point synchronization schedule
Total/average number of collections that have software update deployments and the maximum/average
number of deployed updates
Update scan error codes and machine count
Windows 10 dashboard content versions
Count of third-party software update catalog subscriptions and usage
Count of software updates deployed with and without content
Aggregated statistics on the number of UUP updates that are required, deployed, expired, superseded,
and downloaded
Use of UUP product categories
Count of clients that have deployed at least one UUP quality update or UUP feature update
Top UUP error codes and count of affected devices
List of subscriptions to third-party software update catalogs
Use of WSUS maintenance settings
Orchestration group usage
Windows Update fallback configuration settings
SQL/performance data (Level 2)
Configuration and duration of site summarization
Count of largest database tables
Discovery operational statistics (count of objects found)
Discovery types, enabled, and schedule (full, incremental)
SQL Server change tracking performance issues, retention period, and autocleanup state
SQL Server change tracking retention period
State and status message performance statistics including most common and most expensive message
types
Management point traffic statistics (total bytes sent and received by endpoint)
Management point performance counter measurements
Aggregated performance statistics of calls made to Software Center endpoints on the management point
SQL Server maintenance task configuration and status
Status of recent re-initialization requests
Miscellaneous (Level 2)
Configuration of data warehouse service point including synchronization schedule, average time, and use
of customized tables feature
Count of scripts and run/edit statistics
Count of sites with Wake On LAN (WOL)
Reporting usage and performance statistics
Phased deployment usage statistics
Management insights item counts and progress
Count of crashes for unique non-Configuration Manager processes on the site server, and Watson
signature ID, if available
Aggregated system boot time statistics by OS, form-factor, and drive type
Usage of the Azure migration tool
Count of clients with browser usage
Summary of how many site systems have the proxy enabled and how many are authenticated proxy
[New] Usage information for the last seven days of in-console product feedback
Level 3 - Full
For Configuration Manager version 2103, this level includes the following data:
Automatic deployment rule evaluation schedule information
ATP health summary
Collection evaluation and refresh statistics
Compliance policy statistics on compliance and errors
Compliance settings: SCEP, VPN, Wi-Fi, and compliance policy template configuration details
DCM config pack for Configuration Manager usage
Detailed client deployment installation errors
Endpoint Protection health summary: including count of protected, at risk, unknown, and unsupported
clients
Endpoint Protection policy configuration
List of processes configured with installation behavior for applications
Minimum/maximum/average number of hours since last software update scan
Minimum/maximum/average number of inactive clients in software update deployment collections
Minimum/maximum/average number of software updates per package
MSI product code deployment statistics
Overall compliance of software update deployments
Count of groups that have expired software updates
Software update deployment error codes and counts
Software update deployment information: percentage of deployments that are targeted with client versus
UTC time, required versus optional versus silent, and reboot suppression
Software update products synced by software update point
Software update scan success percentages
Top 50 CPUs in the environment
Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that
Microsoft Intune manages
Microsoft Store for Business application details: non-aggregate list of synced applications including
AppID, online state or offline state, and total purchased license counts
Count of clients pushed with option to not allow fallback to NTLM
List of Configuration Manager console extensions
Diagnostic and usage data for version 2010
2/16/2022 • 15 minutes to read • Edit Online
IMPORTANT
Configuration Manager doesn't collect site codes, sites names, IP addresses, user names, computer names, physical
addresses, or email addresses on the Basic or Enhanced levels. Any collection of this information on the Full level is not
purposeful. It is potentially included in advanced diagnostic information like log files or memory snapshots. Microsoft
doesn't use this information to identify you, contact you, or develop advertising.
Level 1 - Basic
For Configuration Manager version 2010, this level includes the following data:
Application management (Level 1)
Basic application and deployment type counts: total apps, total apps with multiple deployment types, total
apps with dependencies, total superseded apps, and count of deployment technologies in use
Count of Microsoft Edge installations
Count of clients by default and preferred browser
Client (Level 1)
Count of client languages and locales
Count of Configuration Manager client versions, OS versions, and Office versions
Count of Windows 10 devices by branch, build, and unique Active Directory forest
Count of clients joined to Azure Active Directory
Count of extended interoperability clients
Count of clients by Windows OS age, to the nearest three-month interval
Top 10 processor names used on clients and servers
Use of the bulk registration token
[New] Count of clients by identity source and registration method. For example, Active Directory, Azure
Active Directory, or PKI client authentication certificate.
Cloud services (Level 1)
Count of clients by co-management enrollment method
Error statistics for co-management enrollment
Aggregated usage statistics of co-management: number of clients ever enrolled, number of enrolled
clients, number of clients pending enrollment, clients receiving policy, workload states, pilot/exclusion
collection sizes, and enrollment errors
Count of Azure Active Directory applications and services connected to Configuration Manager
Cloud attach and detach actions
Status of last sync with Intune cloud service
Configuration and usage statistics of cloud management gateway: counts of regions and environments,
and authentication/authorization statistics
Summarized count of Endpoint Analytics event
Aggregated statistics on Desktop Analytics enrollment errors and usage
Configuration Manager console (Level 1)
Statistics about Configuration Manager console connections: OS version, language, SKU and architecture,
system memory, logical processor count, connect site ID, installed .NET versions, console language packs,
and capable authentication level
Hashed list of extensions to Configuration Manager console property pages and wizards
Configuration Manager console crash locations
Configuration Manager console usage statistics
Configuration Manager console notification configuration and status
Protection (Level 1)
Basic Endpoint Protection information about antimalware client versions
Existence of Microsoft BitLocker Administration and Monitoring (MBAM) server-side extensions
[New] BitLocker management client counts summarized by state
Setup (Level 1)
Build, install type, language packs, features that you enabled
Pre-release use, setup media type, branch type
Software Assurance expiration date
Update pack deployment status and errors, download progress, and prerequisite errors
Use of early update ring
Version of post-upgrade script
Site database (Level 1)
Basic database configuration: processors, memory size, memory settings, Configuration Manager
database configuration, Configuration Manager database size, cluster configuration, configuration of
distributed views, and change tracking version
[Removed] Configuration Manager database schema (hash of all object definitions)
Database performance metrics: replication processing information, top SQL Server stored procedures by
processor, and disk usage
SQL Server version, service pack level, edition, collation ID, and character set
Hashed list of top SQL queries by memory usage and lock count
SQL Server Always On availability group replica information, usage, and health status
Site infrastructure (Level 1)
Basic Configuration Manager site hierarchy data: site list, type, version, status, client count, time zone, and
health status
Basic discovery statistics: discovery count, minimum/maximum/average group sizes, and when the site is
running entirely with Azure Active Directory Services
Basic site system server information: site system roles used, internet and SSL status, OS, processors,
physical or virtual machine, and usage of site server high availability
Configured level for diagnostics and usage data, online or offline mode, and fast update configuration
Distribution point and management point types and basic configuration information: protected,
prestaged, PXE, multicast, SSL state, pull/peer distribution points, MDM-enabled, and SSL-enabled
Diagnostics and usage data statistics: when run, runtime, errors
***[Removed]***Whether network discovery is enabled or disabled
Hashed list of hardware inventory properties longer than 255 characters
Count and processing rates of key Configuration Manager objects: data discovery records (DDR), state
messages, status messages, hardware inventory, software inventory, and overall count of files in inboxes
Site server disk and processor performance information
Uptime and memory usage information for Configuration Manager site server processes
Count of crashes for Configuration Manager site server processes, and Watson signature ID, if available
Hash of key site attributes (site ID, SQL Server broker ID, and site exchange key)
Status and health of the administration service
Counts of errors from administration service
Site health information
Site health check configuration and status
[New] Version of Visual Studio redistributable and .NET Framework installed on clients and site system
servers
[New] Summarized hierarchy health and activity status
Miscellaneous (Level 1)
Basic OS deployment counts of images
Count of Windows 10 clients that use Windows Update for Business
Count of operating systems for managed devices and policies set by the Exchange Connector
Count of phased deployments created by type
Count of categorized and uncategorized applications for asset intelligence
Level 2 - Enhanced
For Configuration Manager version 2010, this level includes the following data:
Application management (Level 2)
App requirements: count of built-in conditions referenced by deployment technology
App supersedence, maximum depth of chain
Application approval statistics and usage frequency
Application content size statistics
Application deployment information: use of install versus uninstall, requires approval, user interaction
enabled/disabled, dependency, supersedence, and usage count of install behavior feature
Application policy size and complexity statistics
Available application request statistics
Basic configuration information for packages and programs: deployment options and program flags
Basic usage/targeting information for deployment types: user versus device targeted, required versus
available, and universal apps
[Removed] Count of App-V environments and deployment properties
Count of application applicability by OS
Count of applications referenced in a task sequence
Count of distinct branding for application catalog
Count of Microsoft 365 Apps applications created using dashboard
Count of packages by type
Count of package/program deployments
Count of Windows 10 licensed application licenses
Count of Windows Installer deployment types by uninstall content settings
Count of Microsoft Store for Business apps and sync statistics: summarized types of apps, licensed app
status, and number of online and offline licensed apps
Maintenance window type and duration
Minimum/maximum/average number of application deployments per user/device per time period
Most common application installation error codes by deployment technology
MSI configuration options and counts
Statistics on end-user interaction with notification for required software deployments
Universal Data Access usage, how created
Aggregated user device affinity statistics
Max and average primary users per device
Application global condition usage by type
Software Center customization configuration
Package Conversion Manager readiness and counts
Count of application detection methods by type
Count of application enforcement errors
MSI installer properties
Statistics of user install requests
Aggregated statistics on the use of the email approval feature
File count, content size, services count, and custom action count of MSIs in application catalog
Count of devices by Office ProPlus readiness state
Aggregated statistics on the use of application groups
Aggregated statistics on Office add-ins, usage of the Office Readiness Toolkit, and counts of clients with
Microsoft 365 Apps
Aggregated statistics on Office add-in health
Count and size of Office Pro Plus pilot collections
Number of Office Pro Plus devices sending Office health data
Client (Level 2)
Active Management Technology (AMT) client version
BIOS age in years
Count of devices with Secure Boot enabled
Count of devices by TPM state
Client auto-upgrade: deployment configuration including client piloting and exclusion usage (extended
interoperability client)
[Removed] Client cache size configuration
Client deployment download errors
Client health statistics and top issue summary by client version, component, OS, and workload
Client notification operation action status: how many times each is run, max number of targeted clients,
and average success rate
Count of client installations from each source location type
Count of client installation failures
Count of devices virtualized by Hyper-V or Azure
Count of Software Center actions
Count of UEFI-enabled devices
Deployment methods used for client and count of clients per deployment method
List/count of enabled client agents
OS age in months
Number of hardware inventory classes, software inventory rules, file collection rules, and overall health
status
Statistics for device health attestation: most common error codes, number of on-premises servers, and
counts of devices in various states
Count of devices by default browser
Count of Configuration Manager-generated server authentication certificates
Count of Microsoft Surface devices by model
Count of client health check failures by issue type
[New] Count of status (total/approved/blocked) for client certificate types
[New] Client counts for different user/device relationship types
[New] Count of clients in VPN boundaries
Cloud services (Level 2)
Azure Active Directory discovery statistics
Count of collections synced to Azure Log Analytics
Count of Upgrade Analytics Connectors
Whether the Azure Log Analytics cloud connector is enabled
Count of pull-distribution points with a cloud distribution point as a source location
Usage of the cloud services onboarding wizard
CMPivot (Level 2)
CMPivot usage statistics
Count of saved CMPivot queries
Count of queries by entity type
Co -management (Level 2)
Enrollment schedule and historical statistics
Count of clients eligible for co-management
Associated Microsoft Intune tenant
Collections (Level 2)
Collection ID usage (not running out of IDs)
Collection evaluation statistics: query time, assigned versus unassigned counts, counts by type, ID
rollover, and rule usage
Collections without a deployment
Count of collections synchronized to Azure Active Directory
Compliance settings (Level 2)
Basic configuration baseline information: count, number of deployments, and number of references
Compliance policy error statistics
Count of configuration items by type
Count of deployments that reference built-in settings, including remediate setting
Count of rules and deployments created for custom settings, including remediate setting
Count of deployed Simple Certificate Enrollment Protocol (SCEP), VPN, Wi-Fi, certificate (.pfx), and
compliance policy templates
Count of SCEP certificate, VPN, Wi-Fi, certificate (.pfx), and compliance policy deployments by platform
Windows Hello for Business policy (created, deployed)
Count of deployed Microsoft Edge Legacy browser policies
Count of OneDrive policies (created, deployed)
Count of compliance settings deployed by category, OS, and source (cloud vs on-premises)
Configuration Manager console (Level 2)
[Updated] Counts of active and viewed console notification messages by type
Count of folders
Console performance information
25 most common actions, wizards, property sheets, and tree nodes accessed in the console
[New] List of installed console extensions
[New] Summary of size and count of admin persisted settings
[New] Selected console usage information
Content (Level 2)
Boundary group statistics: how many fast, how many slow, count per group, and fallback relationships
Boundary group information: count of boundaries and site systems that are assigned to each boundary
group
Boundary group relationships and fallback configuration
Client content download statistics
Count of boundaries by type
Count of peer cache clients, usage statistic, and partial download statistics
Distribution Manager configuration information: threads, retry delay, number of retries, and pull
distribution point settings
Distribution point configuration information: use of branch cache and distribution point monitoring
Distribution point group information: count of packages and distribution points that are assigned to each
distribution point group
Content library type, whether local or remote
Count of boundary groups by configuration
Count of subnets excluded from peer cache
Protection (Level 2)
Microsoft Defender for Endpoint policies (formerly known as Windows Defender for Endpoint): count of
policies, and whether policies are deployed.
Count of alerts that are configured for Endpoint Protection feature
Count of collections that are selected to appear in Endpoint Protection dashboard
Count of Windows Defender Exploit Guard policies, deployments, and targeted clients
Endpoint Protection deployment errors, count of Endpoint Protection policy deployment error codes
Endpoint Protection antimalware and Windows Firewall policy usage (number of unique policies
assigned to group). This data doesn't include any information about the settings included in the policy.
Aggregated statistics for Microsoft Defender for Endpoint policies
Migration (Level 2)
Count of migrated objects (use of migration wizard)
Mobile device management (MDM ) (Level 2)
Count of issued mobile device actions: lock, pin rest, wipe, retire, and sync now commands
Count of mobile device policies
Count of mobile devices Configuration Manager manages, and how you enrolled them (bulk, user-based)
Count of users who have multiple enrolled mobile devices
Mobile device polling schedule and statistics for mobile device check-in duration
Microsoft Intune troubleshooting (Level 2)
[Removed] Count and size of device actions (wipe, retire, lock), usage data, and data messages that are
replicated to Microsoft Intune
[Removed] Count and size of state, status, inventory, RDR, DDR, UDX, Tenant state, POL, LOG, Cert, CRP,
Resync, CFD, RDO, BEX, ISM, and compliance messages that are downloaded from Microsoft Intune
[Removed] Full and delta user synchronization statistics for Microsoft Intune
On-premises mobile device management (MDM ) (Level 2)
Count of Windows 10 bulk enrollment packages and profiles
Deployment success/failure statistics for on-premises MDM application deployments
OS deployment (Level 2)
Count of boot images, drivers, driver packages, multicast-enabled distribution points, PXE-enabled
distribution points, and task sequences
Count of boot images by Configuration Manager client version
Count of boot images by Windows PE version
Count of edition upgrade policies
Count of hardware identifiers excluded from PXE
Count of OS deployment by OS version
Count of OS upgrades over time
Count of task sequence deployments using option to pre-download content
Counts of task sequence step usage
Version of Windows ADK installed
Count of image servicing tasks
Count of imported machines
Count of duplicate hardware identifiers (MAC address and SMBIOS GUID) excluded from PXE and client
registration
Count of task sequences by type (OS deployment or generic task sequence)
Count of packages with pre-cache content settings
[New] Grouped sizes of task sequence policies
Site updates (Level 2)
Versions of installed Configuration Manager hotfixes
Software updates (Level 2)
Available and deadline deltas that are used in automatic deployment rules
Average and maximum number of assignments per update
Client update evaluation and scan schedules
Classifications synced by the software update point
Cluster patching statistics
Configuration of Windows 10 express updates
Configurations that are used for active Windows 10 servicing plans
Count of deployed Microsoft 365 Apps updates
Count of Microsoft Surface drivers synced
Count of update groups and assignments
Count of update packages and the maximum/minimum/average number of distribution points that are
targeted with packages
Count of updates that are created and deployed with System Center Update Publisher
Count of Windows Update for Business policies created and deployed
Aggregated statistics of Windows Update for Business configurations
Number of automatic deployment rules that are tied to synchronization
Number of automatic deployment rules that create new or add updates to an existing group
Number of automatic deployment rules that have multiple deployments
Number of update groups and minimum/maximum/average number of updates per group
Number of updates and percentage of updates that are deployed, expired, superseded, downloaded, and
contain EULAs
Software update point load-balancing statistics
Software update point synchronization schedule
Total/average number of collections that have software update deployments and the maximum/average
number of deployed updates
Update scan error codes and machine count
Windows 10 dashboard content versions
Count of third-party software update catalog subscriptions and usage
Count of software updates deployed with and without content
Aggregated statistics on the number of UUP updates that are required, deployed, expired, superseded,
and downloaded
Use of UUP product categories
Count of clients that have deployed at least one UUP quality update or UUP feature update
Top UUP error codes and count of affected devices
List of subscriptions to third-party software update catalogs
Use of WSUS maintenance settings
Orchestration group usage
Windows Update fallback configuration settings
SQL/performance data (Level 2)
Configuration and duration of site summarization
Count of largest database tables
Discovery operational statistics (count of objects found)
Discovery types, enabled, and schedule (full, incremental)
SQL Server change tracking performance issues, retention period, and autocleanup state
SQL Server change tracking retention period
State and status message performance statistics including most common and most expensive message
types
Management point traffic statistics (total bytes sent and received by endpoint)
Management point performance counter measurements
Aggregated performance statistics of calls made to Software Center endpoints on the management point
SQL Server maintenance task configuration and status
Status of recent re-initialization requests
Miscellaneous (Level 2)
Configuration of data warehouse service point including synchronization schedule, average time, and use
of customized tables feature
Count of scripts and run/edit statistics
Count of sites with Wake On LAN (WOL)
Reporting usage and performance statistics
Phased deployment usage statistics
Management insights item counts and progress
Count of crashes for unique non-Configuration Manager processes on the site server, and Watson
signature ID, if available
Aggregated system boot time statistics by OS, form-factor, and drive type
Usage of the Azure migration tool
Count of clients with browser usage
[New] Summary of how many site systems have the proxy enabled and how many are authenticated
proxy
Level 3 - Full
For Configuration Manager version 2010, this level includes the following data:
Automatic deployment rule evaluation schedule information
ATP health summary
Collection evaluation and refresh statistics
Compliance policy statistics on compliance and errors
Compliance settings: SCEP, VPN, Wi-Fi, and compliance policy template configuration details
DCM config pack for Configuration Manager usage
Detailed client deployment installation errors
Endpoint Protection health summary: including count of protected, at risk, unknown, and unsupported
clients
Endpoint Protection policy configuration
List of processes configured with installation behavior for applications
Minimum/maximum/average number of hours since last software update scan
Minimum/maximum/average number of inactive clients in software update deployment collections
Minimum/maximum/average number of software updates per package
MSI product code deployment statistics
Overall compliance of software update deployments
Count of groups that have expired software updates
Software update deployment error codes and counts
Software update deployment information: percentage of deployments that are targeted with client versus
UTC time, required versus optional versus silent, and reboot suppression
Software update products synced by software update point
Software update scan success percentages
Top 50 CPUs in the environment
Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that
Microsoft Intune manages
Microsoft Store for Business application details: non-aggregate list of synced applications including
AppID, online state or offline state, and total purchased license counts
Count of clients pushed with option to not allow fallback to NTLM
List of Configuration Manager console extensions
Diagnostic and usage data for version 2006
2/16/2022 • 14 minutes to read • Edit Online
IMPORTANT
Configuration Manager doesn't collect site codes, sites names, IP addresses, user names, computer names, physical
addresses, or email addresses on the Basic or Enhanced levels. Any collection of this information on the Full level is not
purposeful. It is potentially included in advanced diagnostic information like log files or memory snapshots. Microsoft
doesn't use this information to identify you, contact you, or develop advertising.
Level 1 - Basic
For Configuration Manager version 2006, this level includes the following data:
Statistics about Configuration Manager console connections: OS version, language, SKU and architecture,
system memory, logical processor count, connect site ID, installed .NET versions, console language packs,
and capable authentication level
Basic application and deployment type counts: total apps, total apps with multiple deployment types, total
apps with dependencies, total superseded apps, and count of deployment technologies in use
Basic Configuration Manager site hierarchy data: site list, type, version, status, client count, time zone, and
health status
Basic database configuration: processors, memory size, memory settings, Configuration Manager
database configuration, Configuration Manager database size, cluster configuration, configuration of
distributed views, and change tracking version
Basic discovery statistics: discovery count, minimum/maximum/average group sizes, and when the site is
running entirely with Azure Active Directory Services
Basic Endpoint Protection information about antimalware client versions
Basic OS deployment counts of images
Basic site system server information: site system roles used, internet and SSL status, OS, processors,
physical or virtual machine, and usage of site server high availability
Configuration Manager database schema (hash of all object definitions)
Configured level for diagnostics and usage data, online or offline mode, and fast update configuration
Count of client languages and locales
Count of Configuration Manager client versions, OS versions, and Office versions
Count of operating systems for managed devices and policies set by the Exchange Connector
Count of Windows 10 devices by branch, build, and unique Active Directory forest
Count of Windows 10 clients that use Windows Update for Business
Database performance metrics: replication processing information, top SQL Server stored procedures by
processor, and disk usage
Distribution point and management point types and basic configuration information: protected,
prestaged, PXE, multicast, SSL state, pull/peer distribution points, MDM-enabled, and SSL-enabled
Hashed list of extensions to admin console property pages and wizards
Setup Information:
Build, install type, language packs, features that you enabled
Pre-release use, setup media type, branch type
Software Assurance expiration date
Update pack deployment status and errors, download progress, and prerequisite errors
Use of update fast ring
Version of post-upgrade script
SQL Server version, service pack level, edition, collation ID, and character set
Diagnostics and usage data statistics: when run, runtime, errors
Whether network discovery is enabled or disabled
Count of clients joined to Azure Active Directory
Count of phased deployments created by type
Count of extended interoperability clients
Hashed list of hardware inventory properties longer than 255 characters
Count of clients by co-management enrollment method
Error statistics for co-management enrollment
Count of clients by Windows OS age, to the nearest three-month interval
Top 10 processor names used on clients and servers
Count and processing rates of key Configuration Manager objects: data discovery records (DDR), state
messages, status messages, hardware inventory, software inventory, and overall count of files in inboxes
Site server disk and processor performance information
Uptime and memory usage information for Configuration Manager site server processes
Count of crashes for Configuration Manager site server processes, and Watson signature ID, if available
Hashed list of top SQL queries by memory usage and lock count
Aggregated usage statistics of co-management: number of clients ever enrolled, number of enrolled
clients, number of clients pending enrollment, clients receiving policy, workload states, pilot/exclusion
collection sizes, and enrollment errors
Existence of Microsoft BitLocker Administration and Monitoring (MBAM) server-side extensions
Count of categorized and uncategorized applications for asset intelligence
Status and health of the administration service
Hash of key site attributes (site ID, SQL Server broker ID, and site exchange key)
Count of Microsoft Edge installations
Count of Azure Active Directory applications and services connected to Configuration Manager
Site health information
Configuration Manager console crash locations
Configuration Manager console usage statistics
Cloud attach and detach actions
Status of last sync with Intune cloud service
Counts of errors from administration service
Use of the bulk registration token
Count of clients by default and preferred browser
[Moved] Configuration and usage statistics of Cloud Management Gateway: counts of regions and
environments, and authentication/authorization statistics
[Moved] SQL Server Always On availability group replica information, usage, and health status
[New] Admin console notification configuration and status
[New] Site health check configuration and status
[New] Summarized count of Endpoint Analytics event
[Moved] Aggregated statistics on Desktop Analytics enrollment errors and usage
Level 2 - Enhanced
For Configuration Manager version 2006, this level includes the following data:
Application management
App requirements: count of built-in conditions referenced by deployment technology
App supersedence, maximum depth of chain
Application approval statistics and usage frequency
Application content size statistics
Application deployment information: use of install versus uninstall, requires approval, user interaction
enabled/disabled, dependency, supersedence, and usage count of install behavior feature
Application policy size and complexity statistics
Available application request statistics
Basic configuration information for packages and programs: deployment options and program flags
Basic usage/targeting information for deployment types: user versus device targeted, required versus
available, and universal apps
Count of App-V environments and deployment properties
Count of application applicability by OS
Count of applications referenced in a task sequence
Count of distinct branding for application catalog
Count of Microsoft 365 Apps applications created using dashboard
Count of packages by type
Count of package/program deployments
Count of Windows 10 licensed application licenses
Count of Windows Installer deployment types by uninstall content settings
Count of Microsoft Store for Business apps and sync statistics: summarized types of apps, licensed app
status, and number of online and offline licensed apps
Maintenance window type and duration
Minimum/maximum/average number of application deployments per user/device per time period
Most common application installation error codes by deployment technology
MSI configuration options and counts
Statistics on end-user interaction with notification for required software deployments
Universal Data Access usage, how created
Aggregated user device affinity statistics
Max and average primary users per device
Application global condition usage by type
Software Center customization configuration
Package Conversion Manager readiness and counts
Count of application detection methods by type
Count of application enforcement errors
MSI installer properties
Statistics of user install requests
Aggregated statistics on the use of the email approval feature
File count, content size, services count, and custom action count of MSIs in application catalog
Count of devices by Office ProPlus readiness state
Aggregated statistics on the use of application groups
Aggregated statistics on Office add-ins, usage of the Office Readiness Toolkit, and counts of clients with
Microsoft 365 Apps
Aggregated statistics on Office add-in health
Count and size of Office Pro Plus pilot collections
Number of Office Pro Plus devices sending Office health data
Client
Active Management Technology (AMT) client version
BIOS age in years
Count of devices with Secure Boot enabled
Count of devices by TPM state
Client auto-upgrade: deployment configuration including client piloting and exclusion usage (extended
interoperability client)
Client cache size configuration
Client deployment download errors
Client health statistics and top issue summary by client version, component, OS, and workload
Client notification operation action status: how many times each is run, max number of targeted clients,
and average success rate
Count of client installations from each source location type
Count of client installation failures
Count of devices virtualized by Hyper-V or Azure
Count of Software Center actions
Count of UEFI-enabled devices
Deployment methods used for client and count of clients per deployment method
List/count of enabled client agents
OS age in months
[Updated] Number of hardware inventory classes, software inventory rules, file collection rules, and
overall health status
Statistics for device health attestation: most common error codes, number of on-premises servers, and
counts of devices in various states
Count of devices by default browser
Count of Configuration Manager-generated server authentication certificates
Count of Microsoft Surface devices by model
Count of client health check failures by issue type
Cloud services
Azure Active Directory discovery statistics
Count of collections synced to Azure Log Analytics
Count of Upgrade Analytics Connectors
Whether the Azure Log Analytics cloud connector is enabled
Count of pull-distribution points with a cloud distribution point as a source location
Usage of the cloud services onboarding wizard
CMPivot
CMPivot usage statistics
Count of saved CMPivot queries
Count of queries by entity type
Co -management
Enrollment schedule and historical statistics
Count of clients eligible for co-management
Associated Microsoft Intune tenant
Collections
Collection ID usage (not running out of IDs)
Collection evaluation statistics: query time, assigned versus unassigned counts, counts by type, ID
rollover, and rule usage
Collections without a deployment
Count of collections synchronized to Azure Active Directory
Compliance settings
Basic configuration baseline information: count, number of deployments, and number of references
Compliance policy error statistics
Count of configuration items by type
Count of deployments that reference built-in settings, including remediate setting
Count of rules and deployments created for custom settings, including remediate setting
Count of deployed Simple Certificate Enrollment Protocol (SCEP), VPN, Wi-Fi, certificate (.pfx), and
compliance policy templates
Count of SCEP certificate, VPN, Wi-Fi, certificate (.pfx), and compliance policy deployments by platform
Windows Hello for Business policy (created, deployed)
Count of deployed Microsoft Edge Legacy browser policies
Count of OneDrive policies (created, deployed)
[New] Count of compliance settings deployed by category, OS, and source (cloud vs on-premises)
Configuration Manager console
Count of non-critical console notifications
Count of folders
Console performance information
25 most common actions, wizards, property sheets, and tree nodes accessed in the console
Content
Boundary group statistics: how many fast, how many slow, count per group, and fallback relationships
Boundary group information: count of boundaries and site systems that are assigned to each boundary
group
Boundary group relationships and fallback configuration
Client content download statistics
Count of boundaries by type
Count of peer cache clients, usage statistic, and partial download statistics
Distribution Manager configuration information: threads, retry delay, number of retries, and pull
distribution point settings
Distribution point configuration information: use of branch cache and distribution point monitoring
Distribution point group information: count of packages and distribution points that are assigned to each
distribution point group
Content library type, whether local or remote
Count of boundary groups by configuration
Count of subnets excluded from peer cache
Endpoint Protection
Microsoft Defender for Endpoint policies (formerly known as Windows Defender for Endpoint): count of
policies, and whether policies are deployed.
Count of alerts that are configured for Endpoint Protection feature
Count of collections that are selected to appear in Endpoint Protection dashboard
Count of Windows Defender Exploit Guard policies, deployments, and targeted clients
Endpoint Protection deployment errors, count of Endpoint Protection policy deployment error codes
Endpoint Protection antimalware and Windows Firewall policy usage (number of unique policies
assigned to group). This data doesn't include any information about the settings included in the policy.
Aggregated statistics for Microsoft Defender for Endpoint policies
Migration
Count of migrated objects (use of migration wizard)
Mobile device management (MDM )
Count of issued mobile device actions: lock, pin rest, wipe, retire, and sync now commands
Count of mobile device policies
Count of mobile devices Configuration Manager manages, and how you enrolled them (bulk, user-based)
Count of users who have multiple enrolled mobile devices
Mobile device polling schedule and statistics for mobile device check-in duration
Microsoft Intune troubleshooting
Count and size of device actions (wipe, retire, lock), usage data, and data messages that are replicated to
Microsoft Intune
Count and size of state, status, inventory, RDR, DDR, UDX, Tenant state, POL, LOG, Cert, CRP, Resync, CFD,
RDO, BEX, ISM, and compliance messages that are downloaded from Microsoft Intune
Full and delta user synchronization statistics for Microsoft Intune
On-premises mobile device management (MDM )
Count of Windows 10 bulk enrollment packages and profiles
Deployment success/failure statistics for on-premises MDM application deployments
OS deployment
Count of boot images, drivers, driver packages, multicast-enabled distribution points, PXE-enabled
distribution points, and task sequences
Count of boot images by Configuration Manager client version
Count of boot images by Windows PE version
Count of edition upgrade policies
Count of hardware identifiers excluded from PXE
Count of OS deployment by OS version
Count of OS upgrades over time
Count of task sequence deployments using option to pre-download content
Counts of task sequence step usage
Version of Windows ADK installed
Count of image servicing tasks
Count of imported machines
Count of duplicate hardware identifiers (MAC address and SMBIOS GUID) excluded from PXE and client
registration
Count of task sequences by type (OS deployment or generic task sequence)
Count of packages with pre-cache content settings
Site updates
Versions of installed Configuration Manager hotfixes
Software updates
Available and deadline deltas that are used in automatic deployment rules
Average and maximum number of assignments per update
Client update evaluation and scan schedules
Classifications synced by the software update point
Cluster patching statistics
Configuration of Windows 10 express updates
Configurations that are used for active Windows 10 servicing plans
Count of deployed Microsoft 365 Apps updates
Count of Microsoft Surface drivers synced
Count of update groups and assignments
Count of update packages and the maximum/minimum/average number of distribution points that are
targeted with packages
Count of updates that are created and deployed with System Center Update Publisher
Count of Windows Update for Business policies created and deployed
Aggregated statistics of Windows Update for Business configurations
Number of automatic deployment rules that are tied to synchronization
Number of automatic deployment rules that create new or add updates to an existing group
Number of automatic deployment rules that have multiple deployments
Number of update groups and minimum/maximum/average number of updates per group
Number of updates and percentage of updates that are deployed, expired, superseded, downloaded, and
contain EULAs
Software update point load-balancing statistics
Software update point synchronization schedule
Total/average number of collections that have software update deployments and the maximum/average
number of deployed updates
Update scan error codes and machine count
Windows 10 dashboard content versions
Count of third-party software update catalog subscriptions and usage
Count of software updates deployed with and without content
Aggregated statistics on the number of UUP updates that are required, deployed, expired, superseded,
and downloaded
Use of UUP product categories
Count of clients that have deployed at least one UUP quality update or UUP feature update
Top UUP error codes and count of affected devices
List of subscriptions to third-party software update catalogs
Use of WSUS maintenance settings
Orchestration group usage
Windows Update fallback configuration settings
SQL/performance data
Configuration and duration of site summarization
Count of largest database tables
Discovery operational statistics (count of objects found)
Discovery types, enabled, and schedule (full, incremental)
SQL Server change tracking performance issues, retention period, and autocleanup state
SQL Server change tracking retention period
State and status message performance statistics including most common and most expensive message
types
Management point traffic statistics (total bytes sent and received by endpoint)
Management point performance counter measurements
Aggregated performance statistics of calls made to Software Center endpoints on the management point
SQL Server maintenance task configuration and status
Status of recent re-initialization requests
Miscellaneous
Configuration of data warehouse service point including synchronization schedule, average time, and use
of customized tables feature
Count of scripts and run/edit statistics
Count of sites with Wake On LAN (WOL)
Reporting usage and performance statistics
Phased deployment usage statistics
Management insights item counts and progress
Count of crashes for unique non-Configuration Manager processes on the site server, and Watson
signature ID, if available
Aggregated system boot time statistics by OS, form-factor, and drive type
Usage of the Azure migration tool
Count of clients with browser usage
Level 3 - Full
For Configuration Manager version 2006, this level includes the following data:
Automatic deployment rule evaluation schedule information
ATP health summary
Collection evaluation and refresh statistics
Compliance policy statistics on compliance and errors
Compliance settings: SCEP, VPN, Wi-Fi, and compliance policy template configuration details
DCM config pack for Configuration Manager usage
Detailed client deployment installation errors
Endpoint Protection health summary: including count of protected, at risk, unknown, and unsupported
clients
Endpoint Protection policy configuration
List of processes configured with installation behavior for applications
Minimum/maximum/average number of hours since last software update scan
Minimum/maximum/average number of inactive clients in software update deployment collections
Minimum/maximum/average number of software updates per package
MSI product code deployment statistics
Overall compliance of software update deployments
Count of groups that have expired software updates
Software update deployment error codes and counts
Software update deployment information: percentage of deployments that are targeted with client versus
UTC time, required versus optional versus silent, and reboot suppression
Software update products synced by software update point
Software update scan success percentages
Top 50 CPUs in the environment
Type of Exchange Active Sync (EAS) conditional access policies (block or quarantine) for devices that
Microsoft Intune manages
Microsoft Store for Business application details: non-aggregate list of synced applications including
AppID, online state or offline state, and total purchased license counts
Count of clients pushed with option to not allow fallback to NTLM
List of Configuration Manager console extensions
Diagnostic usage data for tools
2/16/2022 • 2 minutes to read • Edit Online
NOTE
The ConfigurationManager PowerShell module also collects usage data. For more information, see Configuration
Manager cmdlet library privacy statement.
Certificates
Configuration Manager uses a combination of self-signed and public key infrastructure (PKI) digital certificates.
Use PKI certificates whenever possible. Some scenarios require PKI certificates. When PKI certificates aren't
available, the site automatically generates self-signed certificates. Some scenarios always use self-signed
certificates.
For more information, see Plan for certificates.
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
To help protect the data that clients send to management points, you can require clients to sign the data. You can
also require the SHA-256 algorithm for signing. This configuration is more secure, but don't require SHA-256
unless all clients support it. Many operating systems natively support this algorithm, but older operating
systems might require an update or hotfix.
While signing helps protect the data from tampering, encryption helps protect the data from information
disclosure. You can enable encryption for the inventory data and state messages that clients send to
management points in the site. You don't have to install any updates on clients to support this option. Clients
and management points require more CPU usage for encryption and decryption.
NOTE
To encrypt the data, the client uses the public key of the management point's encryption certificate. Only the
management point has the corresponding private key, so only it can decrypt the data.
The client bootstraps this certificate with the management point's signing certificate, which it bootstraps with the site's
trusted root key. Make sure to securely provision the trusted root key on clients. For more information, see The trusted
root key.
For more information about how to configure the settings for signing and encryption, see Configure signing
and encryption.
For more information on the cryptographic algorithms used for signing and encryption, see Cryptographic
controls technical reference.
Role-based administration
With Configuration Manager, you use role-based administration to secure the access that administrative users
need to use Configuration Manager. You also secure access to the objects that you manage, like collections,
deployments, and sites.
With the combination of security roles, security scopes, and collections, you segregate the administrative
assignments that meet your organization's requirements. Used together, they define the administrative scope of
a user. This administrative scope controls the objects that an administrative user views in the Configuration
Manager console, and it controls the permissions that a user has on those objects.
For more information, see Fundamentals of role-based administration.
For more information on how to configure this setting, see Configure SMS Provider authentication.
Next steps
Certificates in Configuration Manager
Plan for PKI certificates
Configure security
Cryptographic controls technical reference
Configure security in Configuration Manager
2/16/2022 • 7 minutes to read • Edit Online
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
NOTE
If clients can get the trusted root key from Active Directory Domain Services or client push, you don't have to pre-
provision it.
When clients use HTTPS communication to management points, you don't have to pre-provision the trusted root key.
They establish trust by the PKI certificates.
For more information on the trusted root key, see Plan for security.
Pre -provision a client with the trusted root key by using a file
1. On the site server, browse to the Configuration Manager installation directory. In the \bin\<platform>
subfolder, open the following file in a text editor: mobileclient.tcf
2. Locate the entry, SMSPublicRootKey . Copy the value from that line, and close the file without saving any
changes.
3. Create a new text file, and paste the key value that you copied from the mobileclient.tcf file.
4. Save the file in a location where all computers can access it, but where the file is safe from tampering.
5. Install the client by using any installation method that accepts client.msi properties. Specify the following
property: SMSROOTKEYPATH=<full path and file name>
IMPORTANT
When you specify the trusted root key during client installation, also specify the site code. Use the following
client.msi property: SMSSITECODE=<site code>
Pre -provision a client with the trusted root key without using a file
1. On the site server, browse to the Configuration Manager installation directory. In the \bin\<platform>
subfolder, open the following file in a text editor: mobileclient.tcf
2. Locate the entry, SMSPublicRootKey . Copy the value from that line, and close the file without saving any
changes.
3. Install the client by using any installation method that accepts client.msi properties. Specify the following
client.msi property: SMSPublicRootKey=<key> where <key> is the string that you copied from
mobileclient.tcf.
IMPORTANT
When you specify the trusted root key during client installation, also specify the site code. Use the following
client.msi property: SMSSITECODE=<site code>
The returned string is the trusted root key. Verify that it matches the SMSPublicRootKey value in the
mobileclient.tcf file on the site server.
Remove or replace the trusted root key
Remove the trusted root key from a client by using the client.msi property, RESETKEYINFORMATION = TRUE .
To replace the trusted root key, reinstall the client together with the new trusted root key. For example, use client
push, or specify the client.msi property SMSPublicRootKey .
For more information on these installation properties, see About client installation parameters and properties.
WARNING
Don't Require SHA-256 without first confirming that all clients support this hash algorithm. These clients
include ones that might be assigned to the site in the future.
If you choose this option, and clients with self-signed certificates can't support SHA-256, Configuration
Manager rejects them. The SMS_MP_CONTROL_MANAGER component logs the message ID 5443.
Use encr yption : Clients encrypt client inventory data and status messages before sending to the
management point.
Repeat this procedure for all primary sites in the hierarchy.
Role-based administration
Role-based administration combines security roles, security scopes, and assigned collections to define the
administrative scope for each administrative user. A scope includes the objects that a user can view in the
console, and the tasks related to those objects that they have permission to do. Role-based administration
configurations are applied at each site in a hierarchy.
For more information, see Configure role-based administration. This article details the following actions:
Create custom security roles
Configure security roles
Configure security scopes for an object
Configure collections to manage security
Create a new administrative user
Modify the administrative scope of an administrative user
IMPORTANT
Your own administrative scope defines the objects and settings that you can assign when you configure role-based
administration for another administrative user. For information about planning for role-based administration, see
Fundamentals of role-based administration.
Manage accounts
Configuration Manager supports Windows accounts for many different tasks and uses. To view accounts that
are configured for different tasks, and to manage the password that Configuration Manager uses for each
account, use the following procedure:
1. In the Configuration Manager console, go to the Administration workspace, expand Security , and then
choose the Accounts node.
2. To change the password for an account, select the account in the list. Then choose Proper ties in the
ribbon.
3. Choose Set to open the Windows User Account dialog box. Specify the new password for
Configuration Manager to use for this account.
NOTE
The password that you specify must match this account's password in Active Directory.
IMPORTANT
This configuration is a hierarchy-wide setting. Before you change this setting, make sure that all Configuration Manager
administrators can sign in to Windows with the required authentication level.
To configure this setting, use the following steps:
1. First sign in to Windows with the intended authentication level.
2. In the Configuration Manager console, go to the Administration workspace, expand Site
Configuration , and select the Sites node.
3. Select Hierarchy Settings in the ribbon.
4. Switch to the Authentication tab. Select the desired authentication level, and then select OK .
Only when necessary, select Add to exclude specific users or groups. For more information, see
Exclusions.
Exclusions
From the Authentication tab of Hierarchy Settings, you can also exclude certain users or groups. Use this
option sparingly. For example, when specific users require access to the Configuration Manager console, but
can't authenticate to Windows at the required level. It may also be necessary for automation or services that run
under the context of a system account.
Next steps
How to enable TLS 1.2
Cryptographic controls technical reference
Communication between endpoints
Cryptographic controls technical reference
2/16/2022 • 18 minutes to read • Edit Online
NOTE
If you configure HTTPS communication, these messages are encrypted twice. The message is encrypted with AES, then the
HTTPS transport is encrypted with AES.
When you use client communication over HTTPS, configure your public key infrastructure (PKI) to use
certificates with the maximum hashing algorithms and key lengths. When using CNG v3 certificates,
Configuration Manager clients only support certificates that use the RSA cryptographic algorithm. For more
information, see PKI certificate requirements and CNG v3 certificates overview.
For transport security, anything that uses TLS supports AES. This support includes when you configure the site
for enhanced HTTP or HTTPS. For on-premises site systems, you can control the TLS cipher suites. For cloud-
based roles like the cloud management gateway (CMG), if you enable TLS 1.2, Configuration Manager
configures the cipher suites.
For most cryptographic operations with Windows-based operating systems, Configuration Manager uses these
algorithms from the Windows CryptoAPI library rsaenh.dll.
For more information about specific functionality, see Site operations.
Site operations
Information in Configuration Manager can be signed and encrypted. It supports these operations with or
without PKI certificates.
Policy signing and encryption
The site signs client policy assignments with its self-signed certificate. This behavior helps prevent the security
risk of a compromised management point from sending tampered policies. If you use internet-based client
management, this behavior is important because it requires an internet-facing management point.
When policy contains sensitive data, starting in version 2107, the management point encrypts it with AES-256.
In version 2103 and earlier, it uses 3DES. Policy that contains sensitive data is only sent to authorized clients. The
site doesn't encrypt policy that doesn't have sensitive data.
When a client stores policy, it encrypts the policy using the Windows data protection application programming
interface (DPAPI).
Policy hashing
When a client requests policy, it first gets a policy assignment. Then it knows which policies apply to it, and it can
request only those policy bodies. Each policy assignment contains the calculated hash for the corresponding
policy body. The client downloads the applicable policy bodies and then calculates the hash for each policy body.
If the hash on the policy body doesn't match the hash in the policy assignment, the client discards the policy
body.
The hashing algorithm for policy is SHA-256 .
Content hashing
The distribution manager service on the site server hashes the content files for all packages. The policy provider
includes the hash in the software distribution policy. When the Configuration Manager client downloads the
content, the client regenerates the hash locally and compares it to the one supplied in the policy. If the hashes
match, the content isn't altered, and the client installs it. If a single byte of the content is altered, the hashes won't
match, and the client doesn't install the software. This check helps to make sure that the correct software is
installed because the actual content is compared with the policy.
The default hashing algorithm for content is SHA-256 .
Not all devices can support content hashing. The exceptions include:
Windows clients when they stream App-V content.
Windows Mobile clients, though these clients verify the signature of an application that's signed by a
trusted source.
Inventory signing and encryption
When a client sends hardware or software inventory to a management point, it always signs the inventory. It
doesn't matter if the client communicates with the management point over HTTP or HTTPS. If they use HTTP, you
can also choose to encrypt this data, which is recommended.
State migration encryption
When a task sequence captures data from a client for OS deployment, it always encrypts the data. In version
2103 and later, the task sequence runs the User State Migration Tool (USMT) with the AES-256 encryption
algorithm. In version 2010 and earlier, it uses 3DES .
Encryption for multicast packages
For every OS deployment package, you can enable encryption when you use multicast. This encryption uses the
AES algorithm. If you enable encryption, no other certificate configuration is required. The multicast-enabled
distribution point automatically generates symmetric keys to encrypt the package. Each package has a different
encryption key. The key is stored on the multicast-enabled distribution point by using standard Windows APIs.
When the client connects to the multicast session, the key exchange occurs over an encrypted channel. If the
client uses HTTPS, it uses the PKI-issued client authentication certificate. If the client uses HTTP, it uses the self-
signed certificate. The client only stores the encryption key in memory during the multicast session.
Encryption for OS deployment media
When you use media to deploy operating systems, you should always specify a password to protect the media.
With a password, the task sequence environment variables are encrypted with AES-128 . Other data on the
media, including packages and content for applications, isn't encrypted.
Encryption for cloud-based content
When you enable a cloud management gateway (CMG) to store content, the content is encrypted with AES-
256 . The content is encrypted whenever you update it. When clients download the content, it's encrypted and
protected by the HTTPS connection.
Signing in software updates
All software updates must be signed by a trusted publisher to protect against tampering. On client computers,
the Windows Update Agent (WUA) scans for the updates from the catalog. It won't install the update if it can't
locate the digital certificate in the Trusted Publishers store on the local computer.
When you publish software updates with System Center Updates Publisher, a digital certificate signs the
software updates. You can either specify a PKI certificate or configure Updates Publisher to generate a self-
signed certificate to sign the software update. If you use a self-signed certificate to publish the updates catalog,
such as WSUS Publishers Self-signed, the certificate must also be in the Trusted Root Certification Authorities
certificate store on the local computer. WUA also checks whether the Allow signed content from intranet
Microsoft update ser vice location group policy setting is enabled on the local computer. This policy setting
must be enabled for WUA to scan for the updates that were created and published with System Center Updates
Publisher.
Signed configuration data for compliance settings
When you import configuration data, Configuration Manager verifies the file's digital signature. If the files aren't
signed, or if the signature check fails, the console warns you to continue with the import. Only import the
configuration data if you explicitly trust the publisher and the integrity of the files.
Encryption and hashing for client notification
If you use client notification, all communication uses TLS and the highest algorithms that the server and client
can negotiate. For example, all supported Windows OS versions can use at least AES-128 encryption. The same
negotiation occurs for hashing the packets that are transferred during client notification, which uses SHA-2 .
Certificates
For a list of the public key infrastructure (PKI) certificates that can be used by Configuration Manager, any special
requirements or limitations, and how the certificates are used, see PKI certificate requirements. This list includes
the supported hash algorithms and key lengths. Most certificates support SHA-256 and 2048 -bits key length.
Most Configuration Manager operations that use certificates also support v3 certificates. For more information,
see CNG v3 certificates overview.
NOTE
All certificates that Configuration Manager uses must contain only single-byte characters in the subject name or subject
alternative name.
Server communication
Configuration Manager uses the following cryptographic controls for server communication.
Server communication within a site
Each site system server uses a certificate to transfer data to other site systems in the same Configuration
Manager site. Some site system roles also use certificates for authentication. For example, if you install the
enrollment proxy point on one server, and the enrollment point on another server, they can authenticate one
another by using this identity certificate.
When Configuration Manager uses a certificate for this communication, if there's a PKI certificate available with
server authentication capability, Configuration Manager automatically uses it. If not, Configuration Manager
generates a self-signed certificate. This self-signed certificate has server authentication capability, uses SHA-256,
and has a key length of 2048 bits. Configuration Manager copies the certificate to the Trusted People store on
other site system servers that might need to trust the site system. Site systems can then trust one another by
using these certificates and PeerTrust.
In addition to this certificate for each site system server, Configuration Manager generates a self-signed
certificate for most site system roles. When there is more than one instance of the site system role in the same
site, they share the same certificate. For example, you might have multiple management points in the same site.
This self-signed certificate uses SHA-256 and has a key length of 2048 bits. It's copied to the Trusted People
Store on site system servers that might need to trust it. The following site system roles generate this certificate:
Asset Intelligence synchronization point
Certificate registration point
Endpoint Protection point
Enrollment point
Fallback status point
Management point
Multicast-enabled distribution point
Reporting services point
Software update point
State migration point
Configuration Manager automatically generates and manages these certificates.
To send status messages from the distribution point to the management point, Configuration Manager uses a
client authentication certificate. When you configure the management point for HTTPS, it requires a PKI
certificate. If the management point accepts HTTP connections, you can use a PKI certificate. It can also use a
self-signed certificate with client authentication capability, uses SHA-256, and has a key length of 2048 bits.
Server communication between sites
Configuration Manager transfers data between sites by using database replication and file-based replication. For
more information, see Data transfers between sites and Communications between endpoints.
Configuration Manager automatically configures the database replication between sites. If available, it uses PKI
certificates with server authentication capability. If not available, Configuration Manager creates self-signed
certificates for server authentication. In both cases, it authenticates between sites by using certificates in the
Trusted People store that uses PeerTrust. It uses this certificate store to make sure that only the Configuration
Manager hierarchy SQL Servers participate in site-to-site replication.
Site servers establish site-to-site communication by using a secure key exchange that happens automatically.
The sending site server generates a hash and signs it with its private key. The receiving site server checks the
signature by using the public key and compares the hash with a locally generated value. If they match, the
receiving site accepts the replicated data. If the values don't match, Configuration Manager rejects the replication
data.
Database replication in Configuration Manager uses the SQL Server Service Broker to transfer data between
sites. It uses the following mechanisms:
SQL Server to SQL Server: This connection uses Windows credentials for server authentication and self-
signed certificates with 1024 bits to sign and encrypt the data with the AES algorithm. If available, it uses
PKI certificates with server authentication capability. It only uses certificates in the computer's Personal
certificate store.
SQL Service Broker: This service uses self-signed certificates with 2048 bits for authentication and to sign
and encrypt the data with the AES algorithm. It only uses certificates in the SQL Server master database.
File-based replication uses the server message block (SMB) protocol. It uses SHA-256 to sign data that isn't
encrypted and doesn't contain any sensitive data. To encrypt this data, use IPsec, which you implement
independently from Configuration Manager.
IMPORTANT
The PKI certificates that Configuration Manager uses for client communication protect the communication only between
the client and some site systems. They don't protect the communication channel between the site server and site systems
or between site servers.
NOTE
Updates to Configuration Manager download from the Azure content delivery network (CDN), which has cipher suite
requirements. For more information, see Azure Front Door: TLS configuration FAQ..
Certificates in Configuration Manager
2/16/2022 • 5 minutes to read • Edit Online
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
CNG v3 certificates
Configuration Manager supports Cryptography: Next Generation (CNG) v3 certificates. Configuration Manager
clients can use a PKI client authentication certificate with private key in a CNG Key Storage Provider (KSP). With
KSP support, Configuration Manager clients support hardware-based private keys, such as a TPM KSP for PKI
client authentication certificates.
For more information, see CNG v3 certificates overview.
Enhanced HTTP
Using HTTPS communication is recommended for all Configuration Manager communication paths, but is
challenging for some customers because of the overhead of managing PKI certificates. The introduction of Azure
Active Directory (Azure AD) integration reduces some but not all of the certificate requirements. You can instead
enable the site to use enhanced HTTP. This configuration supports HTTPS on site systems by using self-signed
certificates, along with Azure AD for some scenarios. It doesn't require PKI.
For more information, see Enhanced HTTP.
NOTE
The cloud-based distribution point (CDP) is deprecated. Starting in version 2107, you can't create new CDP instances. To
provide content to internet-based devices, enable the CMG to distribute content. For more information, see Deprecated
features.
For more information about certificates for a CDP, see Certificates for the cloud distribution point.
NOTE
For clients that also have a PKI certificate, the Configuration Manager console displays the Client cer tificate property as
Self-signed . The client control panel Client cer tificate property shows PKI .
When you update to version 2107 or later, clients with PKI certificates will recreate self-signed certificates, but
don't reregister with the site. Clients without a PKI certificate will reregister with the site, which can cause extra
processing at the site. Make sure that your process to update clients allows for randomization. If you
simultaneously update lots of clients, it may cause a backlog on the site server.
Configuration Manager doesn't use TPMs that are known vulnerable. If a device has a vulnerable TPM, the client
falls back to using a software-based KSP. The certificate is still not exportable.
OS deployment media doesn't use hardware-bound certificates, it continues to use self-signed certificates from
the site. You create the media on a device that has the console, but then it can run on any client.
To troubleshoot certificate behaviors, use the Cer tificateMaintenance.log on the client.
Next steps
Plan for PKI certificates in Configuration Manager
Configure security
Cryptographic controls technical reference
Plan for PKI certificates in Configuration Manager
2/16/2022 • 12 minutes to read • Edit Online
IMPORTANT
Because the location of the CRL is added to a certificate when a CA issues it, make sure that you plan for the CRL before
you deploy any PKI certificates that Configuration Manager uses.
IIS always checks the CRL for client certificates, and you can't change this configuration in Configuration
Manager. By default, Configuration Manager clients always check the CRL for site systems. Disable this setting
by specifying a site property and by specifying a CCMSetup property.
Computers that use certificate revocation checking but can't locate the CRL behave as if all certificates in the
certification chain are revoked. This behavior is because they can't verify if the certificates are in the certificate
revocation list. In this scenario, all connections fail that require certificates and include CRL checking. When
validating that your CRL is accessible by browsing to its HTTP location, it's important to note that the
Configuration Manager client runs as LOCAL SYSTEM. Testing CRL accessibility with a web browser under a user
context may succeed, but the computer account may be blocked when attempting to make an HTTP connection
to the same CRL URL. For example, it can be blocked because of an internal web filtering solution like a proxy.
Add the CRL URL to the approved list for any web filtering solutions.
Checking the CRL every time that a certificate is used offers more security against using a certificate that's
revoked. It does introduce a connection delay and more processing on the client. Your organization may require
this security check for clients on the internet or an untrusted network.
Consult your PKI administrators before you decide whether Configuration Manager clients need to check the
CRL. When both of the following conditions are true, consider keeping this option enabled in Configuration
Manager:
Your PKI infrastructure supports a CRL, and it's published where all Configuration Manager clients can
locate it. These clients might include devices on the internet, and ones in untrusted forests.
The requirement to check the CRL for each connection to a site system that's configured to use a PKI
certificate is greater than the following requirements:
Faster connections
Efficient processing on the client
The risk of clients failing to connect to servers if they can't locate the CRL
NOTE
When you issue client PKI certificates from the same CA hierarchy that issues the server certificates that you use
for management points, you don't have to specify this root CA certificate. However, if you use multiple CA
hierarchies and you aren't sure whether they trust each other, import the root CA for the clients' CA hierarchy.
If you need to import root CA certificates for Configuration Manager, export them from the issuing CA or from
the client computer. If you export the certificate from the issuing CA that's also the root CA, don't export the
private key. Store the exported certificate file in a secure location to prevent tampering. You need access to the
file when you set up the site. If you access the file over the network, make sure the communication is protected
from tampering by using IPsec.
If any root CA certificate that you import are renewed, import the renewed certificate.
These imported root CA certificates and the root CA certificate of each management point create the certificate
issuers list. Configuration Manager computers use this list in the following ways:
When clients connect to management points, the management point verifies that the client certificate is
chained to a trusted root certificate in the site's certificate issuers list. If it doesn't, the certificate is
rejected, and the PKI connection fails.
When clients select a PKI certificate and have a certificate issuers list, they select a certificate that chains
to a trusted root certificate in the certificate issuers list. If there's no match, the client doesn't select a PKI
certificate. For more information, see PKI client certificate selection.
NOTE
Some devices don't support a certificate selection method. Instead, they automatically select the first certificate that fulfills
the certificate requirements. For example, clients on macOS computers and mobile devices don't support a certificate
selection method.
In many cases, the default configuration and behavior are sufficient. The Configuration Manager client on
Windows computers filters multiple certificates by using these criteria in this order:
1. The certificate issuers list: The certificate chains to a root CA that's trusted by the management point.
2. The certificate is in the default certificate store of Personal .
3. The certificate is valid, not revoked, and not expired. The validity check also verifies that the private key is
accessible.
4. The certificate has client authentication capability.
5. The certificate Subject Name contains the local computer name as a substring.
6. The certificate has the longest validity period.
Configure clients to use the certificate issuers list by using the following mechanisms:
Publish it with Configuration Manager site information to Active Directory Domain Services.
Install clients by using client push.
Clients download it from the management point after they're successfully assigned to their site.
Specify it during client installation as a CCMSetup client.msi property of CCMCERTISSUERS.
If clients don't have the certificate issuers list when they're first installed, and aren't yet assigned to the site, they
skip this check. When clients do have the certificate issuers list, and don't have a PKI certificate that chains to a
trusted root certificate in the certificate issuers list, certificate selection fails. Clients don't continue with the other
certificate selection criteria.
In most cases, the Configuration Manager client correctly identifies a unique and appropriate PKI certificate.
When this behavior isn't the case, instead of selecting the certificate based on the client authentication capability,
you can set up two alternative selection methods:
A partial string match on the client certificate subject name. This method is a case-insensitive match. It's
appropriate if you're using the fully qualified domain name (FQDN) of a computer in the subject field and
want the certificate selection to be based on the domain suffix, for example contoso.com . You can use
this selection method to identify any string of sequential characters in the certificate subject name that
differentiates the certificate from others in the client certificate store.
NOTE
You can't use the partial string match with the subject alternative name (SAN) as a site setting. Although you can
specify a partial string match for the SAN by using CCMSetup, it'll be overwritten by the site properties in the
following scenarios:
Clients retrieve site information that's published to Active Directory Domain Services.
Clients are installed by using client push installation.
Use a partial string match in the SAN only when you install clients manually and when they don't retrieve site
information from Active Directory Domain Services. For example, these conditions apply to internet-only clients.
A match on the client certificate subject name attribute values or the subject alternative name (SAN)
attribute values. This method is a case-sensitive match. It's appropriate if you're using an X500
distinguished name or equivalent object identifiers (OIDs) in compliance with RFC 3280, and you want
the certificate selection to be based on the attribute values. You can specify only the attributes and their
values that you require to uniquely identify or validate the certificate and differentiate the certificate from
others in the certificate store.
The following table shows the attribute values that Configuration Manager supports for the client certificate
selection criteria:
O ID AT T RIB UT E DIST IN GUISH ED N A M E AT T RIB UT E AT T RIB UT E DEF IN IT IO N
2.5.4.7 L Locality
NOTE
If you configure either of the above alternate certificate selection methods, the certificate Subject Name doesn't need to
contain the local computer name.
If more than one appropriate certificate is located after the selection criteria are applied, you can override the
default configuration to select the certificate that has the longest validity period. Instead, you can specify that no
certificate is selected. In this scenario, the client can't communicate with IIS site systems with a PKI certificate.
The client sends an error message to its assigned fallback status point to alert you to the certificate selection
failure. Then you can change or refine your certificate selection criteria.
The client behavior then depends on whether the failed connection was over HTTPS or HTTP:
If the failed connection was over HTTPS: The client tries to connect over HTTP and uses the client self-
signed certificate.
If the failed connection was over HTTP: The client tries to connect again over HTTP by using the self-
signed client certificate.
To help identify a unique PKI client certificate, you can also specify a custom store other than the default of
Personal in the Computer store. Create a custom certificate store outside of Configuration Manager. You need
to be able to deploy certificates to this custom store and renew them before the validity period expires.
For more information, see Configure settings for client PKI certificates.
NOTE
When you install the Configuration Manager client, it installs the CMHttpsReadiness.exe tool in the
%windir%\CCM folder. The following command-line options are available when you run this tool:
/Store:<Certificate store name> : This option is the same as the CCMCERTSTORE client.msi property
/Issuers:<Case-sensitive issuer common name> : This option is the same as the CCMCERTISSUERS
client.msi property
/Criteria:<Selection criteria> : This option is the same as the CCMCERTSEL client.msi property
/SelectFirstCert : This option is the same as the CCMFIRSTCERT client.msi property
7. When you're confident that enough clients are successfully using their client PKI certificate for
authentication over HTTP, follow these steps:
a. Deploy a PKI web server certificate to a member server that runs another management point for
the site, and configure that certificate in IIS. For more information, see Deploy the web server
certificate for site systems that run IIS.
b. Install the management point role on this server. Configure the Client connections option in the
management point properties for HTTPS .
8. Monitor and verify that clients that have a PKI certificate use the new management point by using HTTPS.
You can use IIS logging or performance counters to verify.
9. Reconfigure other site system roles to use HTTPS client connections. If you want to manage clients on the
internet, make sure that site systems have an internet FQDN. Configure individual management points
and distribution points to accept client connections from the internet.
IMPORTANT
Before you set up site system roles to accept connections from the internet, review the planning information and
prerequisites for internet-based client management. For more information, see Communications between
endpoints.
10. Extend the PKI certificate rollout for clients and for site systems that run IIS. Set up the site system roles
for HTTPS client connections and internet connections, as required.
11. For the highest security: When you're confident that all clients are using a client PKI certificate for
authentication and encryption, change the site properties to use HTTPS only.
Next steps
Configure security
Cryptographic controls technical reference
PKI certificate requirements
CNG v3 certificates overview
2/16/2022 • 2 minutes to read • Edit Online
Configuration Manager supports Cryptography: Next Generation (CNG) certificates. Configuration Manager
clients can use a PKI client authentication certificate with the private key generated and stored in a CNG Key
Storage Provider (KSP). With KSP support, Configuration Manager clients support hardware-based private keys,
such as a TPM KSP for PKI client authentication certificates.
NOTE
When using CNG certificates, Configuration Manager clients only support certificates that use the RSA cryptographic
algorithm.
Supported scenarios
You can use Cryptography API: Next Generation (CNG) v3 certificate templates for the following scenarios:
Client registration and communication with an HTTPS management point
Software distribution and application deployment with an HTTPS distribution point
OS deployment
Client messaging SDK (with latest update) and ISV Proxy
Cloud management gateway (CMG) configuration
User-targeted available applications in Software Center
Also use CNG v3 certificates for the following HTTPS-enabled server roles:
Management point
Distribution point
Software update point
State migration point
Certificate registration point, including the NDES server with the Configuration Manager policy module
NOTE
CNG is backward compatible with Crypto API (CAPI). CAPI certificates continue to be supported even when CNG support
is enabled on the client.
Unsupported scenarios
The following scenarios currently aren't supported:
The following server roles aren't operational when installed in HTTPS mode with a CNG v3 certificate
bound to the web site in Internet Information Services (IIS):
Enrollment point
Enrollment proxy point
NOTE
The requirements for your environment or organization may be different. Contact your PKI expert. The important point to
consider is a certificate template must use a Key Storage Provider to take advantage of CNG.
For best results, we recommend building the Subject Name from Active Directory information. Use the DNS
Name for Subject name format and include the DNS name in the alternate subject name. Otherwise, you
must provide this information when the device enrolls into the certificate profile.
PKI certificate requirements for Configuration
Manager
2/16/2022 • 11 minutes to read • Edit Online
Subject Name:
If the site system accepts connections from the internet, the Subject Name or Subject
Alternative Name must contain the internet fully qualified domain name (FQDN).
If the site system accepts connections from the intranet, the Subject Name or Subject
Alternative Name must contain either the intranet FQDN (recommended) or the computer's
name, depending on how the site system is set up.
If the site system accepts connections from both the internet and the intranet, both the internet
FQDN and the intranet FQDN (or computer name) must be specified. Use the ampersand ( & )
symbol delimiter between the two names.
NOTE
When the software update point accepts client connections from the internet only, the certificate must contain
both the internet FQDN and the intranet FQDN.
Key length: Configuration Manager doesn't specify a maximum supported key length for this certificate.
Consult your PKI and IIS documentation for any key-size related issues for this certificate.
Most site system roles support key storage providers for certificate private keys (v3). For more information, see
CNG v3 certificates overview.
This certificate must be in the Personal store in the Computer certificate store.
Cloud management gateway (CMG )
This service certificate is used to:
Authenticate the CMG service in Azure to Configuration Manager clients
Encrypt all data transferred between them by using TLS.
Export this certificate in a Public Key Certificate Standard (PKCS #12) format. You need to know the password, so
that you can import the certificate when you create the CMG.
Certificate requirements:
Certificate purpose: Ser ver authentication
Microsoft certificate template: Web Ser ver
The Enhanced Key Usage value must contain Server Authentication (1.3.6.1.5.5.7.3.1)
The Subject Name must contain a customer-defined service name as the Common Name for the
specific instance of the cloud management gateway.
The private key must be exportable.
Supported key lengths: 2048-bit or 4096-bit
This certificate supports key storage providers for certificate private keys (v3).
For more information, see CMG server authentication certificate.
Site system servers that run Microsoft SQL Server
This certificate is used for server-to-server authentication.
Certificate requirements:
Certificate purpose: Ser ver authentication
Microsoft certificate template: Web Ser ver
The Enhanced Key Usage value must contain Server Authentication (1.3.6.1.5.5.7.3.1)
The Subject Name must contain the intranet fully qualified domain name (FQDN)
Maximum supported key length is 2,048 bits.
This certificate must be in the Personal store in the Computer certificate store. Configuration Manager
automatically copies it to the Trusted People Store for servers in the Configuration Manager hierarchy that might
have to establish trust with the server.
SQL Server Always On failover cluster instance
This certificate is used for server-to-server authentication.
Certificate requirements:
Certificate purpose: Ser ver authentication
Microsoft certificate template: Web Ser ver
The Enhanced Key Usage value must contain Server Authentication (1.3.6.1.5.5.7.3.1)
The Subject Name must contain the intranet fully qualified domain name (FQDN) of the cluster
The private key must be exportable
The certificate must have a validity period of at least two years when you configure Configuration
Manager to use the failover cluster instance
Maximum supported key length is 2,048 bits.
Request and install this certificate on one node in the cluster. Then export the certificate and import it to the
other nodes.
This certificate must be in the Personal store in the Computer certificate store. Configuration Manager
automatically copies it to the Trusted People Store for servers in the Configuration Manager hierarchy that might
have to establish trust with the server.
Site system monitoring
Applies to:
Management point
State migration point
Certificate requirements:
Certificate purpose: Client authentication
Microsoft certificate template: Workstation Authentication
The Enhanced Key Usage value must contain Client Authentication (1.3.6.1.5.5.7.3.2)
Computers must have a unique value in the Subject Name field or in the Subject Alternative Name
field.
NOTE
If you use multiple values for the Subject Alternative Name , it only uses the first value.
There are no specific requirements for the certificate Subject Name or Subject Alternative Name
(SAN). You can use the same certificate for multiple servers running the Network Device Enrollment
Service.
Supported key lengths: 1,024 bits and 2,048 bits.
Site systems that have a distribution point installed
This certificate has two purposes:
It authenticates the distribution point to an HTTPS-enabled management point before the distribution point
sends status messages.
A PXE-enabled distribution point sends this certificate to computers. If the task sequence includes client
actions like client policy retrieval or sending inventory information, the computer can connect to an HTTPS-
enabled management point during the OS deployment process.
This certificate is only used during the OS deployment process. It isn't installed on the client. Because of this
temporary use, you can use the same certificate for every OS deployment if you don't want to use multiple
client certificates.
NOTE
The requirements for this certificate are the same as the client certificate for boot images. Because the requirements are
the same, you can use the same certificate file.
Certificate requirements:
Certificate purpose: Client authentication
Microsoft certificate template: Workstation Authentication
The Enhanced Key Usage value must contain Client Authentication (1.3.6.1.5.5.7.3.2)
There are no specific requirements for the certificate Subject Name or Subject Alternative Name
(SAN). It's recommended to use a different certificate for each distribution point, but you can use the
same certificate.
The private key must be exportable.
Maximum supported key length is 2,048 bits.
Export this certificate in a Public Key Certificate Standard (PKCS #12) format. You need to know the password, so
that you can import the certificate to the distribution point properties.
Proxy web servers for internet-based client management
If the site supports internet-based client management, and you use a proxy web server by using SSL termination
(bridging) for incoming internet connections, the proxy web server has the following certificate requirements:
NOTE
If you use a proxy web server without SSL termination (tunneling), no additional certificates are required on the proxy
web server.
Certificate requirements:
Certificate purpose: Ser ver authentication and Client authentication
Microsoft certificate template: Web Ser ver and Workstation Authentication
Internet FQDN in the Subject Name or Subject Alternative Name field. If you use Microsoft
certificate templates, the Subject Alternative Name is only available with the workstation template.
This certificate is used to authenticate the following servers to internet clients and to encrypt all data transferred
between the client and this server with TLS:
Internet-based management point
Internet-based distribution point
Internet-based software update point
The client authentication is used to bridge client connections between the Configuration Manager clients and the
internet-based site systems.
The Key Usage value must contain Digital Signature, Key Encipherment (a0)
Client computers must have a unique value in the Subject Name or Subject Alternative Name field. If
used, the Subject Name field must contain the local computer name unless an alternative certificate
selection criteria is specified. For more information, see Plan for PKI client certificate selection.
NOTE
If you use multiple values for the Subject Alternative Name , it only uses the first value.
NOTE
The requirements for this certificate are the same as the server certificate for site systems with the distribution point role.
Because the requirements are the same, you can use the same certificate file.
Certificate requirements:
Certificate purpose: Client authentication
Microsoft certificate template: Workstation Authentication
The Enhanced Key Usage value must contain Client Authentication (1.3.6.1.5.5.7.3.2)
There are no specific requirements for the certificate Subject Name or Subject Alternative Name
(SAN) fields. You can use the same certificate for all boot images.
The private key must be exportable.
Maximum supported key length is 2,048 bits.
Export this certificate in a Public Key Certificate Standard (PKCS #12) format. You need to know the password, so
that you can import the certificate to the boot image properties.
macOS client computers
This certificate authenticates the macOS client computer to the site system servers that it communicates with.
For example, management points and distribution points.
Certificate requirements:
Certificate purpose: Client authentication
Microsoft certificate template:
For Configuration Manager enrollment: Authenticated Session
For certificate installation independent from Configuration Manager: Workstation Authentication
The Enhanced Key Usage value must contain Client Authentication (1.3.6.1.5.5.7.3.2)
Subject Name:
For Configuration Manager that creates a User certificate, the certificate Subject value is
automatically populated with the user name of the person who enrolls the macOS computer.
For certificate installation that doesn't use Configuration Manager enrollment, but deploys a
Computer certificate independently from Configuration Manager, the certificate Subject value must
be unique. For example, specify the FQDN of the computer.
The Subject Alternative Name field isn't supported.
Maximum supported key length is 2,048 bits.
Mobile device clients
This certificate authenticates the mobile device client to the site system servers that it communicates with. For
example, management points and distribution points.
Certificate requirements:
Certificate purpose: Client authentication
Microsoft certificate template: Authenticated Session
The Enhanced Key Usage value must contain Client Authentication (1.3.6.1.5.5.7.3.2)
TIP
You can adapt the instructions in this topic for operating systems that aren't documented in the Test Network
Requirements section. However, if you are running the issuing CA on Windows Server 2012, you're not prompted for the
certificate template version. Instead, specify this on the Compatibility tab of the template properties:
Cer tification Authority : Windows Ser ver 2003
Cer tificate recipient : Windows XP / Ser ver 2003
Web server certificate for site systems that run IIS This certificate is used to encrypt data and authenticate the
server to clients. It must be installed externally from
Configuration Manager on site systems servers that run
Internet Information Services (IIS) and that are set up in
Configuration Manager to use HTTPS.
For the steps to set up and install this certificate, see Deploy
the web server certificate for site systems that run IIS in this
topic.
Service certificate for clients to connect to cloud-based For the steps to configure and install this certificate, see
distribution points Deploy the service certificate for cloud-based distribution
points in this topic.
Client certificate for Windows computers This certificate is used to authenticate Configuration
Manager client computers to site systems that are set up to
use HTTPS. It can also be used for management points and
state migration points to monitor their operational status
when they are set up to use HTTPS. It must be installed
externally from Configuration Manager on computers.
For the steps to set up and install this certificate, see Deploy
the client certificate for Windows computers in this topic.
Client certificate for distribution points This certificate has two purposes:
For the steps to set up and install this certificate, see Deploy
the client certificate for distribution points in this topic.
Enrollment certificate for mobile devices This certificate is used to authenticate Configuration
Manager mobile device clients to site systems that are set
up to use HTTPS. It must be installed as part of mobile
device enrollment in Configuration Manager, and you
choose the configured certificate template as a mobile device
client setting.
Client certificate for Mac computers You can request and install this certificate from a Mac
computer when you use Configuration Manager enrollment
and choose the configured certificate template as a mobile
device client setting.
For the steps to set up this certificate, see Deploy the client
certificate for Mac computers in this topic.
Deploy the web server certificate for site systems that run IIS
This certificate deployment has the following procedures:
Create and issue the web server certificate template on the certification authority
Request the web server certificate
Configure IIS to use the web server certificate
Create and issue the web server certificate template on the certification authority
This procedure creates a certificate template for Configuration Manager site systems and adds it to the
certification authority.
To c r e a t e a n d i ssu e t h e w e b se r v e r c e r t i fi c a t e t e m p l a t e o n t h e c e r t i fi c a t i o n a u t h o r i t y
1. Create a security group named ConfigMgr IIS Ser vers that has the member servers to install
Configuration Manager site systems that will run IIS.
2. On the member server that has Certificate Services installed, in the Certification Authority console, right-
click Cer tificate Templates and then choose Manage to load the Cer tificate Templates console.
3. In the results pane, right-click the entry that has Web Ser ver in the Template Display Name column,
and then choose Duplicate Template .
4. In the Duplicate Template dialog box, ensure that Windows 2003 Ser ver, Enterprise Edition is
selected, and then choose OK .
IMPORTANT
Do not select Windows 2008 Ser ver, Enterprise Edition .
5. In the Proper ties of New Template dialog box, on the General tab, enter a template name, like
ConfigMgr Web Ser ver Cer tificate , to generate the web certificates that will be used on
Configuration Manager site systems.
6. Choose the Subject Name tab, and make sure that Supply in the request is selected.
7. Choose the Security tab, and then remove the Enroll permission from the Domain Admins and
Enterprise Admins security groups.
8. Choose Add , enter ConfigMgr IIS Ser vers in the text box, and then choose OK .
9. Choose the Enroll permission for this group, and do not clear the Read permission.
10. Choose OK , and then close the Cer tificate Templates Console .
11. In the Certification Authority console, right-click Cer tificate Templates , choose New , and then choose
Cer tificate Template to Issue .
12. In the Enable Cer tificate Templates dialog box, choose the new template that you just created,
ConfigMgr Web Ser ver Cer tificate , and then choose OK .
13. If you do not need to create and issue more certificates, close Cer tification Authority .
Request the web server certificate
This procedure lets you specify the intranet and internet FQDN values that will be set up in the site system
server properties and then installs the web server certificate on to the member server that runs IIS.
To r e q u e st t h e w e b se r v e r c e r t i fi c a t e
1. Restart the member server that runs IIS to ensure that the computer can access the certificate template
that you created by using the Read and Enroll permissions that you configured.
2. Choose Star t , choose Run , and then type mmc.exe. In the empty console, choose File , and then choose
Add/Remove Snap-in .
3. In the Add or Remove Snap-ins dialog box, choose Cer tificates from the list of Available snap-ins ,
and then choose Add .
4. In the Cer tificate snap-in dialog box, choose Computer account , and then choose Next .
5. In the Select Computer dialog box, ensure that Local computer : (the computer this console is
running on) is selected, and then choose Finish .
6. In the Add or Remove Snap-ins dialog box, choose OK .
7. In the console, expand Cer tificates (Local Computer) , and then choose Personal .
8. Right-click Cer tificates , choose All Tasks , and then choose Request New Cer tificate .
9. On the Before You Begin page, choose Next .
10. If you see the Select Cer tificate Enrollment Policy page, choose Next .
11. On the Request Cer tificates page, identify the ConfigMgr Web Ser ver Cer tificate from the list of
available certificates, and then choose More information is required to enroll for this cer tificate.
Click here to configure settings .
12. In the Cer tificate Proper ties dialog box, in the Subject tab, do not make any changes to Subject
name . This means that the Value box for the Subject name section remains blank. Instead, from the
Alternative name section, choose the Type drop-down list, and then choose DNS .
13. In the Value box, specify the FQDN values that you will specify in the Configuration Manager site system
properties, and then choose OK to close the Cer tificate Proper ties dialog box.
Examples:
If the site system will only accept client connections from the intranet, and the intranet FQDN of
the site system server is ser ver1.internal.contoso.com , enter ser ver1.internal.contoso.com ,
and then choose Add .
If the site system will accept client connections from the intranet and the internet, and the intranet
FQDN of the site system server is ser ver1.internal.contoso.com and the internet FQDN of the
site system server is ser ver.contoso.com :
a. Enter ser ver1.internal.contoso.com , and then choose Add .
b. Enter ser ver.contoso.com , and then choose Add .
NOTE
You can specify the FQDNs for Configuration Manager in any order. However, check that all devices that
will use the certificate, such as mobile devices and proxy web servers, can use a certificate subject
alternative name (SAN) and multiple values in the SAN. If devices have limited support for SAN values in
certificates, you might have to change the order of the FQDNs or use the Subject value instead.
14. On the Request Cer tificates page, choose ConfigMgr Web Ser ver Cer tificate from the list of
available certificates, and then choose Enroll .
15. On the Cer tificates Installation Results page, wait until the certificate is installed, and then choose
Finish .
16. Close Cer tificates (Local Computer) .
Configure IIS to use the web server certificate
This procedure binds the installed certificate to the IIS Default Web Site .
To se t u p I I S t o u se t h e w e b se r v e r c e r t i fi c a t e
1. On the member server that has IIS installed, choose Star t , choose Programs , choose Administrative
Tools , and then choose Internet Information Ser vices (IIS) Manager .
2. Expand Sites , right-click Default Web Site , and then choose Edit Bindings .
3. Choose the https entry, and then choose Edit .
4. In the Edit Site Binding dialog box, select the certificate that you requested by using the ConfigMgr
Web Server Certificates template, and then choose OK .
NOTE
If you are not sure which is the correct certificate, choose one, and then choose View . This lets you compare the
selected certificate details to the certificates in the Certificates snap-in. For example, the Certificates snap-in shows
the certificate template that was used to request the certificate. You can then compare the certificate thumbprint
of the certificate that was requested by using the ConfigMgr Web Server Certificates template to the certificate
thumbprint of the certificate currently selected in the Edit Site Binding dialog box.
5. Choose OK in the Edit Site Binding dialog box, and then choose Close .
6. Close Internet Information Ser vices (IIS) Manager .
The member server is now set up with a Configuration Manager web server certificate.
IMPORTANT
When you install the Configuration Manager site system server on this computer, make sure that you specify the same
FQDNs in the site system properties as you specified when you requested the certificate.
NOTE
This procedure uses a different certificate template from the web server certificate template that you created for site
systems that run IIS. Although both certificates require server authentication capability, the certificate for cloud-based
distribution points requires you to enter a custom-defined value for the Subject Name and the private key must be
exported. As a security best practice, do not set up certificate templates so that the private key can be exported unless
this configuration is required. The cloud-based distribution point requires this configuration because you must import the
certificate as a file, rather than choose it from the certificate store.
When you create a new certificate template for this certificate, you can restrict the computers that can request a
certificate whose private key can be exported. On a production network, you might also consider adding the following
changes for this certificate:
Require approval to install the certificate for additional security.
Increase the certificate validity period. Because you must export and import the certificate each time before it
expires, an increase of the validity period reduces how often you must repeat this procedure. However, an
increase of the validity period also decreases the security of the certificate because it provides more time for an
attacker to decrypt the private key and steal the certificate.
Use a custom value in the certificate Subject Alternative Name (SAN) to help identify this certificate from
standard web server certificates that you use with IIS.
To c r e a t e a n d i ssu e t h e c u st o m w e b se r v e r c e r t i fi c a t e t e m p l a t e o n t h e c e r t i fi c a t i o n a u t h o r i t y
1. Create a security group named ConfigMgr Site Ser vers that has the member servers to install
Configuration Manager primary site servers that will manage cloud-based distribution points.
2. On the member server that is running the Certification Authority console, right-click Cer tificate
Templates , and then choose Manage to load the Certificate Templates management console.
3. In the results pane, right-click the entry that has Web Ser ver in the Template Display Name column,
and then choose Duplicate Template .
4. In the Duplicate Template dialog box, ensure that Windows 2003 Ser ver, Enterprise Edition is
selected, and then choose OK .
IMPORTANT
Do not select Windows 2008 Ser ver, Enterprise Edition .
5. In the Proper ties of New Template dialog box, on the General tab, enter a template name, like
ConfigMgr Cloud-Based Distribution Point Cer tificate , to generate the web server certificate for
cloud-based distribution points.
6. Choose the Request Handling tab, and then choose Allow private key to be expor ted .
7. Choose the Security tab, and then remove the Enroll permission from the Enterprise Admins security
group.
8. Choose Add , enter ConfigMgr Site Ser vers in the text box, and then choose OK .
9. Select the Enroll permission for this group, and do not clear the Read permission.
10. Choose the Cr yptography tab and ensure that Minimum key size has been set to 2048 .
11. Choose OK , and then close Cer tificate Templates Console .
12. In the Certification Authority console, right-click Cer tificate Templates , choose New , and then choose
Cer tificate Template to Issue .
13. In the Enable Cer tificate Templates dialog box, choose the new template that you just created,
ConfigMgr Cloud-Based Distribution Point Cer tificate , and then choose OK .
14. If you do not have to create and issue more certificates, close Cer tification Authority .
Request the custom web server certificate
This procedure requests and then installs the custom web server certificate on the member server that will run
the site server.
To r e q u e st t h e c u st o m w e b se r v e r c e r t i fi c a t e
1. Restart the member server after you create and configure the ConfigMgr Site Ser vers security group
to ensure that the computer can access the certificate template that you created by using the Read and
Enroll permissions that you configured.
2. Choose Star t , choose Run , and then enter mmc.exe. In the empty console, choose File , and then choose
Add/Remove Snap-in .
3. In the Add or Remove Snap-ins dialog box, choose Cer tificates from the list of Available snap-ins ,
and then choose Add .
4. In the Cer tificate snap-in dialog box, choose Computer account , and then choose Next .
5. In the Select Computer dialog box, ensure that Local computer : (the computer this console is
running on) is selected, and then choose Finish .
6. In the Add or Remove Snap-ins dialog box, choose OK .
7. In the console, expand Cer tificates (Local Computer) , and then choose Personal .
8. Right-click Cer tificates , choose All Tasks , and then choose Request New Cer tificate .
9. On the Before You Begin page, choose Next .
10. If you see the Select Cer tificate Enrollment Policy page, choose Next .
11. On the Request Cer tificates page, identify the ConfigMgr Cloud-Based Distribution Point
Cer tificate from the list of available certificates, and then choose More information is required to
enroll for this cer tificate. choose here to configure settings .
12. In the Cer tificate Proper ties dialog box, in the Subject tab, for the Subject name , choose Common
name as the Type .
13. In the Value box, specify your choice of service name and your domain name by using an FQDN format.
For example: clouddp1.contoso.com .
NOTE
Make the service name unique in your namespace. You will use DNS to create an alias (CNAME record) to map
this service name to an automatically generated identifier (GUID) and an IP address from Windows Azure.
14. Choose Add , and then choose OK to close the Cer tificate Proper ties dialog box.
15. On the Request Cer tificates page, choose ConfigMgr Cloud-Based Distribution Point Cer tificate
from the list of available certificates, and then choose Enroll .
16. On the Cer tificates Installation Results page, wait until the certificate is installed, and then choose
Finish .
17. Close Cer tificates (Local Computer) .
Export the custom web server certificate for cloud-based distribution points
This procedure exports the custom web server certificate to a file, so that it can be imported when you create
the cloud-based distribution point.
To e x p o r t t h e c u st o m w e b se r v e r c e r t i fi c a t e fo r c l o u d - b a se d d i st r i b u t i o n p o i n t s
1. In the Cer tificates (Local Computer) console, right-click the certificate that you just installed, choose
All Tasks , and then choose Expor t .
2. In the Certificates Export Wizard, choose Next .
3. On the Expor t Private Key page, choose Yes, expor t the private key , and then choose Next .
NOTE
If this option is not available, the certificate has been created without the option to export the private key. In this
scenario, you cannot export the certificate in the required format. You must set up the certificate template so that
the private key can be exported, and then request the certificate again.
4. On the Expor t File Format page, ensure that the Personal Information Exchange - PKCS #12
(.PFX) option is selected.
5. On the Password page, specify a strong password to protect the exported certificate with its private key,
and then choose Next .
6. On the File to Expor t page, specify the name of the file that you want to export, and then choose Next .
7. To close the wizard, choose Finish in the Cer tificate Expor t Wizard page, and then choose OK in the
confirmation dialog box.
8. Close Cer tificates (Local Computer) .
9. Store the file securely and ensure that you can access it from the Configuration Manager console.
The certificate is now ready to be imported when you create a cloud-based distribution point.
1. On the member server that is running the Certification Authority console, right-click Cer tificate
Templates , and then choose Manage to load the Certificate Templates management console.
2. In the results pane, right-click the entry that has Workstation Authentication in the Template Display
Name column, and then choose Duplicate Template .
3. In the Duplicate Template dialog box, ensure that Windows 2003 Ser ver, Enterprise Edition is
selected, and then choose OK .
IMPORTANT
Do not select Windows 2008 Ser ver, Enterprise Edition .
4. In the Proper ties of New Template dialog box, on the General tab, enter a template name, like
ConfigMgr Client Cer tificate , to generate the client certificates that will be used on Configuration
Manager client computers.
5. Choose the Security tab, select the Domain Computers group, and then select the additional
permissions of Read and Autoenroll . Do not clear Enroll .
6. Choose OK , and then close Cer tificate Templates Console .
7. In the Certification Authority console, right-click Cer tificate Templates , choose New , and then choose
Cer tificate Template to Issue .
8. In the Enable Cer tificate Templates dialog box, choose the new template that you just created,
ConfigMgr Client Cer tificate , and then choose OK .
9. If you do not need to create and issue more certificates, close Cer tification Authority .
Configure autoenrollment of the Workstation Authentication template by using Group Policy
This procedure sets up Group Policy to autoenroll the client certificate on computers.
To se t u p a u t o e n r o l l m e n t o f t h e W o r k st a t i o n A u t h e n t i c a t i o n t e m p l a t e b y u si n g G r o u p P o l i c y
1. On the domain controller, choose Star t , choose Administrative Tools , and then choose Group Policy
Management .
2. Go to your domain, right-click the domain, and then choose Create a GPO in this domain, and Link
it here .
NOTE
This step uses the best practice of creating a new Group Policy for custom settings rather than editing the Default
Domain Policy that is installed with Active Directory Domain Services. When you assign this Group Policy at the
domain level, you will apply it to all computers in the domain. In a production environment, you can restrict the
autoenrollment so that it enrolls on only selected computers. You can assign the Group Policy at an organizational
unit level, or you can filter the domain Group Policy with a security group so that it applies only to the computers
in the group. If you restrict autoenrollment, remember to include the server that is set up as the management
point.
3. In the New GPO dialog box, enter a name, like Autoenroll Cer tificates , for the new Group Policy, and
then choose OK .
4. In the results pane, on the Linked Group Policy Objects tab, right-click the new Group Policy, and then
choose Edit .
5. In the Group Policy Management Editor , expand Policies under Computer Configuration , and
then go to Windows Settings / Security Settings / Public Key Policies .
6. Right-click the object type named Cer tificate Ser vices Client - Auto-enrollment , and then choose
Proper ties .
7. From the Configuration Model drop-down list, choose Enabled , choose Renew expired cer tificates,
update pending cer tificates, remove revoked cer tificates , choose Update cer tificates that use
cer tificate templates , and then choose OK .
8. Close Group Policy Management .
Automatically enroll the Workstation Authentication certificate and verify its installation on computers
This procedure installs the client certificate on computers and verifies the installation.
To a u t o m a t i c a l l y e n r o l l t h e W o r k st a t i o n A u t h e n t i c a t i o n c e r t i fi c a t e a n d v e r i fy i t s i n st a l l a t i o n o n t h e c l i e n t c o m p u t e r
1. Restart the workstation computer, and wait a few minutes before you sign in.
NOTE
Restarting a computer is the most reliable method of ensuring success with certificate autoenrollment.
NOTE
This procedure uses a different certificate template from the certificate template that you created for client computers.
Although both certificates require client authentication capability, the certificate for distribution points requires that the
private key is exported. As a security best practice, do not set up certificate templates so the private key can be exported
unless this configuration is required. The distribution point requires this configuration because you must import the
certificate as a file rather than choose it from the certificate store.
When you create a new certificate template for this certificate, you can restrict the computers that can request a
certificate whose private key can be exported. In our example deployment, this will be the security group that you
previously created for Configuration Manager site system servers that run IIS. On a production network that distributes
the IIS site system roles, consider creating a new security group for the servers that run distribution points so that you
can restrict the certificate to just these site system servers. You might also consider adding the following modifications for
this certificate:
Require approval to install the certificate for additional security.
Increase the certificate validity period. Because you must export and import the certificate each time before it
expires, an increase of the validity period reduces how often you must repeat this procedure. However, an
increase of the validity period also decreases the security of the certificate because it provides more time for an
attacker to decrypt the private key and steal the certificate.
Use a custom value in the certificate Subject field or Subject Alternative Name (SAN) to help identify this
certificate from standard client certificates. This can be particularly helpful if you will use the same certificate for
multiple distribution points.
To c r e a t e a n d i ssu e t h e c u st o m W o r k st a t i o n A u t h e n t i c a t i o n c e r t i fi c a t e t e m p l a t e o n t h e c e r t i fi c a t i o n a u t h o r i t y
1. On the member server that is running the Certification Authority console, right-click Cer tificate
Templates , and then choose Manage to load the Certificate Templates management console.
2. In the results pane, right-click the entry that has Workstation Authentication in the Template Display
Name column, and then choose Duplicate Template .
3. In the Duplicate Template dialog box, ensure that Windows 2003 Ser ver, Enterprise Edition is
selected, and then choose OK .
IMPORTANT
Do not select Windows 2008 Ser ver, Enterprise Edition .
4. In the Proper ties of New Template dialog box, on the General tab, enter a template name, like
ConfigMgr Client Distribution Point Cer tificate , to generate the client authentication certificate for
distribution points.
5. Choose the Request Handling tab, and then choose Allow private key to be expor ted .
6. Choose the Security tab, and then remove the Enroll permission from the Enterprise Admins security
group.
7. Choose Add , enter ConfigMgr IIS Ser vers in the text box, and then choose OK .
8. Select the Enroll permission for this group, and do not clear the Read permission.
9. Choose OK , and then close Cer tificate Templates Console .
10. In the Certification Authority console, right-click Cer tificate Templates , choose New , and then choose
Cer tificate Template to Issue .
11. In the Enable Cer tificate Templates dialog box, choose the new template that you just created,
ConfigMgr Client Distribution Point Cer tificate , and then choose OK .
12. If you do not have to create and issue more certificates, close Cer tification Authority .
Request the custom Workstation Authentication certificate
This procedure requests and then installs the custom client certificate on to the member server that runs IIS and
that will be set up as a distribution point.
To r e q u e st t h e c u st o m W o r k st a t i o n A u t h e n t i c a t i o n c e r t i fi c a t e
1. Choose Star t , choose Run , and then enter mmc.exe. In the empty console, choose File , and then choose
Add/Remove Snap-in .
2. In the Add or Remove Snap-ins dialog box, choose Cer tificates from the list of Available snap-ins ,
and then choose Add .
3. In the Cer tificate snap-in dialog box, choose Computer account , and then choose Next .
4. In the Select Computer dialog box, ensure that Local computer : (the computer this console is
running on) is selected, and then choose Finish .
5. In the Add or Remove Snap-ins dialog box, choose OK .
6. In the console, expand Cer tificates (Local Computer) , and then choose Personal .
7. Right-click Cer tificates , choose All Tasks , and then choose Request New Cer tificate .
8. On the Before You Begin page, choose Next .
9. If you see the Select Cer tificate Enrollment Policy page, choose Next .
10. On the Request Cer tificates page, choose ConfigMgr Client Distribution Point Cer tificate from
the list of available certificates, and then choose Enroll .
11. On the Cer tificates Installation Results page, wait until the certificate is installed, and then choose
Finish .
12. In the results pane, confirm that a certificate has Client Authentication in the Intended Purpose
column and that ConfigMgr Client Distribution Point Cer tificate is in the Cer tificate Template
column.
13. Do not close Cer tificates (Local Computer) .
Export the client certificate for distribution points
This procedure exports the custom Workstation Authentication certificate to a file so that it can be imported in
the distribution point properties.
To e x p o r t t h e c l i e n t c e r t i fi c a t e fo r d i st r i b u t i o n p o i n t s
1. In the Cer tificates (Local Computer) console, right-click the certificate that you just installed, choose
All Tasks , and then choose Expor t .
2. In the Certificates Export Wizard, choose Next .
3. On the Expor t Private Key page, choose Yes, expor t the private key , and then choose Next .
NOTE
If this option is not available, the certificate has been created without the option to export the private key. In this
scenario, you cannot export the certificate in the required format. You must set up the certificate template so that
the private key can be exported and then request the certificate again.
4. On the Expor t File Format page, ensure that the Personal Information Exchange - PKCS #12
(.PFX) option is selected.
5. On the Password page, specify a strong password to protect the exported certificate with its private key,
and then choose Next .
6. On the File to Expor t page, specify the name of the file that you want to export, and then choose Next .
7. To close the wizard, choose Finish on the Cer tificate Expor t Wizard page, and choose OK in the
confirmation dialog box.
8. Close Cer tificates (Local Computer) .
9. Store the file securely and ensure that you can access it from the Configuration Manager console.
The certificate is now ready to be imported when you set up the distribution point.
TIP
You can use the same certificate file when you set up media images for an operating system deployment that does not
use PXE boot, and the task sequence to install the image must contact a management point that requires HTTPS client
connections.
1. Create a security group that has users who will enroll mobile devices in Configuration Manager.
2. On the member server that has Certificate Services installed, in the Certification Authority console, right-
click Cer tificate Templates , and then choose Manage to load the Certificate Templates management
console.
3. In the results pane, right-click the entry that has Authenticated Session in the Template Display
Name column, and then choose Duplicate Template .
4. In the Duplicate Template dialog box, ensure that Windows 2003 Ser ver, Enterprise Edition is
selected, and then choose OK .
IMPORTANT
Do not select Windows 2008 Ser ver, Enterprise Edition .
5. In the Proper ties of New Template dialog box, on the General tab, enter a template name, like
ConfigMgr Mobile Device Enrollment Cer tificate , to generate the enrollment certificates for the
mobile devices to be managed by Configuration Manager.
6. Choose the Subject Name tab, make sure that Build from this Active Director y information is
selected, select Common name for the Subject name format:, and then clear User principal name
(UPN) from Include this information in alternate subject name .
7. Choose the Security tab, choose the security group that has users who have mobile devices to enroll,
and then choose the additional permission of Enroll . Do not clear Read .
8. Choose OK , and then close Cer tificate Templates Console .
9. In the Certification Authority console, right-click Cer tificate Templates , choose New , and then choose
Cer tificate Template to Issue .
10. In the Enable Cer tificate Templates dialog box, choose the new template that you just created,
ConfigMgr Mobile Device Enrollment Cer tificate , and then choose OK .
11. If you do not need to create and issue more certificates, close the Certification Authority console.
The mobile device enrollment certificate template is now ready to be selected when you set up a mobile
device enrollment profile in the client settings.
NOTE
This procedure uses a different certificate template from the certificate template that you might have created for Windows
client computers or for distribution points.
When you create a new certificate template for this certificate, you can restrict the certificate request to authorized users.
To c r e a t e a n d i ssu e t h e M a c c l i e n t c e r t i fi c a t e t e m p l a t e o n t h e c e r t i fi c a t i o n a u t h o r i t y
1. Create a security group that has user accounts for administrative users who will enroll the certificate on
the Mac computer by using Configuration Manager.
2. On the member server that is running the Certification Authority console, right-click Cer tificate
Templates , and then choose Manage to load the Certificate Templates management console.
3. In the results pane, right-click the entry that displays Authenticated Session in the Template Display
Name column, and then choose Duplicate Template .
4. In the Duplicate Template dialog box, ensure that Windows 2003 Ser ver, Enterprise Edition is
selected, and then choose OK .
IMPORTANT
Do not select Windows 2008 Ser ver, Enterprise Edition .
5. In the Proper ties of New Template dialog box, on the General tab, enter a template name, like
ConfigMgr Mac Client Cer tificate , to generate the Mac client certificate.
6. Choose the Subject Name tab, make sure that Build from this Active Director y information is
selected, choose Common name for the Subject name format:, and then clear User principal name
(UPN) from Include this information in alternate subject name .
7. Choose the Security tab, and then remove the Enroll permission from the Domain Admins and
Enterprise Admins security groups.
8. Choose Add , specify the security group that you created in step one, and then choose OK .
9. Choose the Enroll permission for this group, and do not clear the Read permission.
10. Choose OK , and then close Cer tificate Templates Console .
11. In the Certification Authority console, right-click Cer tificate Templates , choose New , and then choose
Cer tificate Template to Issue .
12. In the Enable Cer tificate Templates dialog box, choose the new template that you just created,
ConfigMgr Mac Client Cer tificate , and then choose OK .
13. If you do not have to create and issue more certificates, close Cer tification Authority .
The Mac client certificate template is now ready to be selected when you set up client settings for
enrollment.
Additional information about privacy for
Configuration Manager
2/16/2022 • 6 minutes to read • Edit Online
Usage data
Configuration Manager collects diagnostics and usage data about itself, which Microsoft uses to improve the
installation experience, quality, and security of future releases. Diagnostics and usage data is enabled for each
Configuration Manager hierarchy. It consists of SQL Server queries that run on a weekly basis on each primary
site and at the central administration site. When the hierarchy uses a central administration site, the data from
primary sites is then replicated to that site. At the top-level site of your hierarchy, the service connection point
submits this information when it checks for updates. If the service connection point is in offline mode, the
information is transferred by using the service connection tool.
Configuration Manager collects data only from the site's SQL Server database, and it doesn't collect data directly
from clients or site servers.
Administrators can change the level of data that's collected by going to the Usage Data section of the
Configuration Manager console.
For more information about usage data levels and settings, see Diagnostics and usage data.
Asset Intelligence
Asset Intelligence lets administrators define, track, and proactively manage conformity with configuration
standards. Metering and reporting on the deployment and use of both physical and virtual applications helps
organizations make better business decisions about software licensing and maintain compliance with licensing
agreements. After collecting usage data from Configuration Manager clients, you can use different features to
view the data, including collections, queries, and reporting.
During each synchronization, a catalog of known software is downloaded from Microsoft. You can choose to
send Microsoft information about uncategorized software titles that are discovered within your organization to
be researched and added to the catalog. Prior to uploading this information, a dialog box shows data that's
going to be uploaded. Uploaded data can't be recalled. Asset Intelligence doesn't send information about users
and computers or license usage to Microsoft.
After a software title is uploaded, Microsoft researchers identify, categorize, and then make that knowledge
available to all other customers who use this feature and other consumers of the catalog. Any uploaded
software title becomes public. The application and its categorization become part of the catalog and then can be
downloaded to other consumers of the catalog. Before you configure Asset Intelligence data collection and
decide whether to submit information to Microsoft, consider the privacy requirements of your organization.
Asset Intelligence isn't enabled by default in Configuration Manager. Uploading uncategorized titles never occurs
automatically, and the system isn't designed to automate this task. You must manually select and approve the
upload of each software title.
Endpoint Protection
Microsoft Cloud Protection Service was formerly known as Microsoft Active Protection Service or MAPS.
The applicable products are System Center Endpoint Protection and the Endpoint Protection feature of
Configuration Manager (to manage System Center Endpoint Protection and Windows Defender for Windows 10
or later).
The Microsoft Cloud Protection Service antimalware community is a voluntary worldwide online community
that includes System Center Endpoint Protection users. When you join Microsoft Cloud Protection Service,
System Center Endpoint Protection automatically sends information to Microsoft. Microsoft uses the
information to determine software to investigate for potential threats and to help improve the effectiveness of
System Center Endpoint Protection. This community helps stop the spread of new malicious software infections.
If a Microsoft Cloud Protection Service report includes details about malware or potentially unwanted software
that the Endpoint Protection client may be able to remove, Microsoft Cloud Protection Service downloads the
latest signature to address it. Microsoft Cloud Protection Service can also find "false positives" and fix them.
(False positives are where something originally identified as malware turns out not to be.)
Microsoft Cloud Protection Service reports include information about potential malware files, like file names,
cryptographic hash, vendor, size, and date stamps. In addition, Microsoft Cloud Protection Service might collect
full URLs to indicate the origin of the file. These URLs might occasionally have personal information like search
terms or data that was entered in forms. Reports might also include actions that you took when Endpoint
Protection notified you about unwanted software. Microsoft Cloud Protection Service reports include this
information to help Microsoft gauge how effectively Endpoint Protection can detect and remove malware and
potentially unwanted software and to attempt to identify new malware.
You can join Microsoft Cloud Protection Service if you have a basic or advanced membership. Basic member
reports have the information described previously. Advanced member reports are more comprehensive and
may include additional details about the software that Endpoint Protection detects, like the location of such
software, file names, how the software operates, and how it has affected your computer. These reports and
reports from other Endpoint Protection users who participate in Microsoft Cloud Protection Service help
Microsoft researchers discover new threats more rapidly. Malware definitions are then created for programs
that meet the analysis criteria, and the updated definitions are made available to all users through Microsoft
Update.
To help detect and fix certain kinds of malware infections, the product regularly sends Microsoft Cloud
Protection Service information about the security state of your PC. This information includes information about
your PC's security settings and log files that describe the drivers and other software that load while your PC
boots.
A number that uniquely identifies your PC is also sent. Also, Microsoft Cloud Protection Service may collect the
IP addresses that the potential malware files connect to.
Microsoft Cloud Protection Service reports are used to improve Microsoft software and services. The reports
might also be used for statistical or other testing or analytical purposes and to generate definitions. Only
Microsoft employees, contractors, partners, and vendors who have a business need to use the reports can
access them.
Microsoft Cloud Protection Service does not intentionally collect personal information. To the extent that
Microsoft Cloud Protection Service collects any personal information, Microsoft does not use the information to
identify you or contact you.
For more information, see Endpoint Protection.
In the Configuration Manager console, go to the Monitoring workspace, select the Site Hierarchy node, and
switch to the Geographical View . This view lets you use maps that Microsoft Bing Maps provides to view your
Configuration Manager physical server topology. To enable this feature, location information that you provide is
sent from your server to the Bing Maps Web service.
Microsoft uses the information to operate and improve Microsoft Bing Maps and other Microsoft sites and
services. For more information, see the Microsoft Privacy Statement.
You can choose not to use the Geographical View for the Site Hierarchy. The default Hierarchy Diagram view lets
you see the hierarchy and doesn't use the Bing Maps service.
How to enable TLS 1.2
2/16/2022 • 5 minutes to read • Edit Online
IMPORTANT
Start this process with the clients, especially previous versions of Windows. Before enabling TLS 1.2 and disabling the older
protocols on the Configuration Manager servers, make sure that all clients support TLS 1.2. Otherwise, the clients can't
communicate with the servers and can be orphaned.
Tasks for Configuration Manager clients, site servers, and remote site
systems
To enable TLS 1.2 for components that Configuration Manager depends on for secure communication, you'll
need to do multiple tasks on both the clients and the site servers.
Enable TLS 1.2 for Configuration Manager clients
Update Windows and WinHTTP on Windows 8.0, Windows Server 2012 (non-R2) and earlier
Ensure that TLS 1.2 is enabled as a protocol for SChannel at the OS level
Update and configure the .NET Framework to support TLS 1.2
Enable TLS 1.2 for Configuration Manager site servers and remote site systems
Ensure that TLS 1.2 is enabled as a protocol for SChannel at the OS level
Update and configure the .NET Framework to support TLS 1.2
Update SQL Server and the SQL Server Native Client
Update Windows Server Update Services (WSUS)
Site database server Update SQL Server and its client components
Secondary site servers Update SQL Server and its client components to a compliant
version of SQL Server Express
Site system roles - Update .NET Framework and verify strong cryptography
settings
- Update SQL Server and its client components on roles that
require it, including the SQL Server Native Client
Reporting services point - Update .NET Framework on the site server, the SQL Server
Reporting Services servers, and any computer with the
console
- Restart the SMS_Executive service as necessary
Configuration Manager client with HTTPS site system roles Update Windows to support TLS 1.2 for client-server
communications by using WinHTTP
Windows 7 clients Before you enable TLS 1.2 on any server components,
update Windows to support TLS 1.2 for client-server
communications by using WinHTTP. If you enable TLS 1.2 on
server components first, you can orphan earlier versions of
clients.
Additional resources
Cryptographic controls technical reference
Transport layer security (TLS) best practices with the .NET Framework
KB 3135244: TLS 1.2 support for Microsoft SQL Server
Next steps
Enable TLS 1.2 on clients
Enable TLS 1.2 on the site servers
How to enable TLS 1.2 on clients
2/16/2022 • 4 minutes to read • Edit Online
IMPORTANT
Enable these settings on all clients running earlier versions of Windows before enabling TLS 1.2 and disabling the older
protocols on the Configuration Manager servers. Otherwise, you can inadvertently orphan them.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp\
DefaultSecureProtocols = (DWORD): 0xAA0
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp\
DefaultSecureProtocols = (DWORD): 0xAA0
NOTE
Starting in version 2107, Configuration Manager requires Microsoft .NET Framework version 4.6.2 for site servers,
specific site systems, clients, and the console. If possible in your environment, install the latest version of .NET
version 4.8.
Update NET Framework 4.6 and earlier versions to support TLS 1.1 and TLS 1.2. For more information,
see .NET Framework versions and dependencies.
If you're using .NET Framework 4.5.1 or 4.5.2 on Windows 8.1, Windows Server 2012 R2, or Windows
Server 2012, it's highly recommended that you install the latest security updates for the .Net Framework
4.5.1 and 4.5.2 to ensure TLS 1.2 can be enabled properly.
For your reference, TLS 1.2 was first introduced into .Net Framework 4.5.1 and 4.5.2 with the following
hotfix rollups:
For Windows 8.1 and Server 2012 R2: Hotfix rollup 3099842
For Windows Server 2012: Hotfix rollup 3099844
Configure for strong cryptography
Configure .NET Framework to support strong cryptography. Set the SchUseStrongCrypto registry setting to
DWORD:00000001 . This value disables the RC4 stream cipher and requires a restart. For more information about
this setting, see Microsoft Security Advisory 296038.
Make sure to set the following registry keys on any computer that communicates across the network with a TLS
1.2-enabled system. For example, Configuration Manager clients, remote site system roles not installed on the
site server, and the site server itself.
For 32-bit applications that are running on 32-bit OSs and for 64-bit applications that are running on 64-bit
OSs, update the following subkey values:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727]
"SystemDefaultTlsVersions" = dword:00000001
"SchUseStrongCrypto" = dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
"SystemDefaultTlsVersions" = dword:00000001
"SchUseStrongCrypto" = dword:00000001
For 32-bit applications that are running on 64-bit OSs, update the following subkey values:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727]
"SystemDefaultTlsVersions" = dword:00000001
"SchUseStrongCrypto" = dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319]
"SystemDefaultTlsVersions" = dword:00000001
"SchUseStrongCrypto" = dword:00000001
NOTE
The SchUseStrongCrypto setting allows .NET to use TLS 1.1 and TLS 1.2. The SystemDefaultTlsVersions setting
allows .NET to use the OS configuration. For more information, see TLS best practices with the .NET Framework.
Next steps
Enable TLS 1.2 on the site servers and remote site systems
Common issues when enabling TLS 1.2
How to enable TLS 1.2 on the site servers and
remote site systems
2/16/2022 • 4 minutes to read • Edit Online
NOTE
Starting in version 2107, Configuration Manager requires Microsoft .NET Framework version 4.6.2 for site servers,
specific site systems, clients, and the console. If possible in your environment, install the latest version of .NET
version 4.8.
Update NET Framework 4.6 and earlier versions to support TLS 1.1 and TLS 1.2. For more information,
see .NET Framework versions and dependencies.
If you're using .NET Framework 4.5.1 or 4.5.2 on Windows 8.1, Windows Server 2012 R2, or Windows
Server 2012, it's highly recommended that you install the latest security updates for the .Net Framework
4.5.1 and 4.5.2 to ensure TLS 1.2 can be enabled properly.
For your reference, TLS 1.2 was first introduced into .Net Framework 4.5.1 and 4.5.2 with the following
hotfix rollups:
For Windows 8.1 and Server 2012 R2: Hotfix rollup 3099842
For Windows Server 2012: Hotfix rollup 3099844
Configure for strong cryptography
Configure .NET Framework to support strong cryptography. Set the SchUseStrongCrypto registry setting to
DWORD:00000001 . This value disables the RC4 stream cipher and requires a restart. For more information about
this setting, see Microsoft Security Advisory 296038.
Make sure to set the following registry keys on any computer that communicates across the network with a TLS
1.2-enabled system. For example, Configuration Manager clients, remote site system roles not installed on the
site server, and the site server itself.
For 32-bit applications that are running on 32-bit OSs and for 64-bit applications that are running on 64-bit
OSs, update the following subkey values:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727]
"SystemDefaultTlsVersions" = dword:00000001
"SchUseStrongCrypto" = dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
"SystemDefaultTlsVersions" = dword:00000001
"SchUseStrongCrypto" = dword:00000001
For 32-bit applications that are running on 64-bit OSs, update the following subkey values:
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727]
"SystemDefaultTlsVersions" = dword:00000001
"SchUseStrongCrypto" = dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319]
"SystemDefaultTlsVersions" = dword:00000001
"SchUseStrongCrypto" = dword:00000001
NOTE
The SchUseStrongCrypto setting allows .NET to use TLS 1.1 and TLS 1.2. The SystemDefaultTlsVersions setting
allows .NET to use the OS configuration. For more information, see TLS best practices with the .NET Framework.
Make sure to also update the SQL Server Native Client to at least version SQL Server 2012 SP4 (11.*.7001.0).
This requirement is a prerequisite check (warning).
Configuration Manager uses SQL Server Native Client on the following site system roles:
Site database server
Site server: central administration site, primary site, or secondary site
Management point
Device management point
State migration point
SMS Provider
Software update point
Multicast-enabled distribution point
Asset Intelligence update service point
Reporting services point
Enrollment point
Endpoint Protection point
Service connection point
Certificate registration point
Data warehouse service point
Next steps
Common issues when enabling TLS 1.2
Common issues when enabling TLS 1.2
2/16/2022 • 3 minutes to read • Edit Online
This article provides advice for common issues that occur when you enable TLS 1.2 support in Configuration
Manager.
Unsupported platforms
The following client platforms are supported by Configuration Manager but aren't supported in a TLS 1.2
environment:
Apple OS X
Windows devices managed with on-premises MDM
Microsoft.ConfigurationManager.CloudBase.AAD.AADAuthenticationException
Service returned error. Check InnerException for more details
at Microsoft.ConfigurationManager.CloudBase.AAD.AADAuthenticationContext.GetAADAuthResultObject
...
Microsoft.IdentityModel.Clients.ActiveDirectory.AdalServiceException
Service returned error. Check InnerException for more details
at Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext.RunAsyncTask
...
System.Net.WebException
The underlying connection was closed: An unexpected error occurred on a receive.
at System.Net.HttpWebRequest.GetResponse
In the System EventLog, SChannel EventID 36874 may be logged with the following description:
An TLS 1.2 connection request was received from a remote client application, but none of the cipher suites
supported by the client application are supported by the server. The TLS connection request has failed.
Additional resources
Transport layer security (TLS) best practices with the .NET Framework
KB 3135244: TLS 1.2 support for Microsoft SQL Server
Cryptographic controls technical reference
Next steps
Enable TLS 1.2 on clients
Enable TLS 1.2 on the site servers and remote site systems
Evaluate Configuration Manager by building your
own lab environment
2/16/2022 • 2 minutes to read • Edit Online
NOTE
Microsoft offers a pre-configured version of this lab using an evaluation version of Configuration Manager. For more
information, see Windows and Office deployment and management lab kit.
Core components
Setting up your environment for Configuration Manager requires some core components to support the
installation of Configuration Manager.
The lab environment uses Windows Ser ver 2012 R2 , into which we will install Configuration
Manager.
You can download an evaluation version of Windows Server 2012 R2 from the Evaluation Center.
Consider modifying or disabling Internet Explorer Enhanced Security Configuration in order to more
easily access some of the downloads referenced throughout the course of these exercises. For more
information, see Internet Explorer: Enhanced Security Configuration.
The lab environment uses SQL Ser ver 2012 SP2 for the site database.
You can download an evaluation version of SQL Server 2012 from the Microsoft Download Center.
SQL Server has Supported versions of SQL Server that must be met for use with Configuration Manager.
Configuration Manager requires a 64-bit version of SQL Server to host the site database.
SQL_Latin1_General_CP1_CI_AS as the SQL Collation class.
Windows authentication , rather than SQL Server authentication, is required.
A dedicated SQL Ser ver instance is required.
Do not limit the system addressable memor y for SQL Server.
Configure the SQL Ser ver ser vice account to run using a low rights domain user account.
You must install SQL Ser ver repor ting ser vices .
Intersite communications use the SQL Server Service Broker on default port TCP 4022.
Intrasite communications between the SQL Server database engine and select Configuration
Manager site system roles use default port TCP 1433.
The domain controller uses Windows Ser ver 2008 R2 with Active Directory Domain Services
installed. The domain controller also functions as the host for the DHCP and the DNS servers for use with
a fully qualified domain name.
For more information, see overview of Active Directory Domain Services.
Hyper-V is used with a few vir tual machines to verify that the management steps taken in these
exercises are functioning as expected. A minimum of three virtual machines is recommended, with
Windows 10 installed.
For more information, see overview of Hyper-V.
Administrator permissions will be required for all of these components.
Configuration Manager requires an administrator with local permissions within the Windows
Server environment
Active Directory requires an administrator with permissions to modify the schema
Virtual machines require local permissions on the machines themselves
Though not required for this lab, you can review Supported configurations for Configuration Manager for
additional information on requirements for implementing Configuration Manager. Refer to documentation for
software versions other than those referenced here.
Once you have installed all of these components, there are additional steps you must take to configure your
Windows environment for Configuration Manager:
IMPORTANT
Confirm that you are connected to the site server's domain prior to beginning the following procedure.
IMPORTANT
Ensure that you are logged on to the schema master domain controller with an account that is a member of the Schema
Admins security group. Attempting to use alternate credentials will fail.
Step 7: Prerequisite Downloads Select Download required files and specify your
predefined location.
Step 11: Primar y Site Installation Select Install the primar y site as a stand-alone
site , then click Next .
Step 12: Database Installation - SQL Ser ver name (FQDN): input your FQDN here.
- Instance name: leave this blank, as you will use the
default instance of SQL Server that you previously
installed.
- Ser vice Broker Por t: leave as default port of 4022.
Step 15: Client Communication Settings Confirm that All site system roles accept only
HTTPS communication from clients is not selected
Step 16: Site System Roles Input your FQDN and confirm that your selection of All
site system roles accept only HTTPS
communication from clients is still deselected.
Prerequisites
This process requires an Azure subscription in which you can create the following objects:
Two Standard_B2s virtual machines for domain controller, management point, and distribution point.
One Standard_B2ms virtual machine for the primary site server and the SQL Server database server.
Standard_LRS storage account
TIP
To help determine potential costs, see the Azure pricing calculator.
Process
1. Go to the Configuration Manager technical preview template or Configuration Manager current branch
template.
2. Select Deploy to Azure , which opens the Azure portal.
3. Complete the Azure quickstart template with the following information:
Basics
Subscription : The name of the subscription in which to create the VMs
Resource group : Select a resource group to use for these VMs
Location : Select an Azure data center to host this lab environment
Settings
Prefix : The prefix name of the machines. For more information, see Azure VM info.
Admin Username : The name of a user on the VMs with administrative rights. You use this
user to sign in to the VMs.
Admin Password : The password must meet the Azure complexity requirements. For more
information, see adminPassword.
IMPORTANT
The following settings are required by Azure. Use the default values. Don't change these values.
_ar tifacts Location : The location of the scripts for this template
_ar tifacts Location Sas Token : The sasToken is required to access the artifacts location
Location : The location for all resources
4. Read the terms and conditions. If you agree, select I agree to the terms and conditions stated
above . Then select Purchase to continue.
Azure validates the settings, and then begins the deployment. Check the status of the deployment in the Azure
portal.
NOTE
The process can take 2-4 hours. Even when the Azure portal shows successful deployment, configuration scripts continue
to run. Don't restart the VMs during the process.
To see the status of the configuration scripts, connect to the <prefix>PS1 server, and view the following file:
%windir%\TEMP\ProvisionScript\PS1.json . If it shows all steps as complete, the process is done.
To connect to the VMs, first get from the Azure portal the public IP addresses for each VM. When you connect to
the VM, the domain name is contoso.com . Use the credentials that you specified in the deployment template.
For more information, see How to connect and log on to an Azure virtual machine running Windows.
Azure VM info
All Three VMs have the following specifications:
150 GB of disk space
Both a public and private IP address. The public IPs are in a network security group that only allows remote
desktop connections on TCP port 3389.
The prefix that you specified in the deployment template is the VM name prefix. For example, if you set
"contoso" as the prefix, then the domain controller machine name is contosoDC .
<prefix>DC01
TIP
You can use RSS to be notified when this page is updated. For more information, see How to use the docs.
For most product prerequisites, use the information in the Supported configurations. The following exceptions
apply to the technical preview branch:
Each install is active for 90 days before it becomes inactive.
English is the only language supported.
It only supports the following setup command-line parameters:
/silent
/testdbupgrade
The service connection point installs to online mode. It doesn't support offline mode.
NOTE
You may need to allow specific internet URLs, some of which are specific to the technical preview branch. For more
information, see Internet access requirements.
The separate articles for each specific version of the technical preview include additional limitations or
requirements, as applicable.
The following features aren't supported with the technical preview branch:
Migration to or from this preview branch.
Upgrade to this preview branch.
Site recovery from the cd.latest folder.
There's no support for updating to current branch from this preview branch.
NOTE
When updates are available for a preview version, you still find and install them from the Updates and
Ser vicing node of the Configuration Manager console. For a video of the in-console upgrade process, see
Installing Configuration Manager update packages on youtube.com.
It only supports a standalone primary site. There's no support for a central administration site, multiple
primary sites, or secondary sites.
The technical preview branch of Configuration Manager supports the following products and technologies:
Unless otherwise noted, the technical preview branch supports the same versions of SQL Server as the
current branch. For more information, see Supported SQL Server versions.
The site supports up to 10 clients, which can run any supported client OS version.
NOTE
The inclusion of these products in this content doesn't imply an extension of support for a version that's beyond its
support lifecycle. Configuration Manager doesn't support products that are beyond their support lifecycle. For more
information, see Microsoft Lifecycle Policy.
Providing feedback
We love to hear your feedback about the new features in the technical preview. For more information, see
Product feedback.
If you have ideas about new features you would like to see, let us know! Submit new ideas and vote on the ideas
by others: Feedback for Configuration Manager.
NOTE
Features that were available in a previous version of the technical preview remain available in later versions. Similarly,
features that are added to the Configuration Manager current branch remain available in the technical preview branch.
Customize maximum run time for other software update Tech preview 2112
types
Branding in the Windows Update native reboot experience Tech preview 2110
Intune role-based access control for tenant attach Tech preview 2106
Windows Update native experience for software updates Tech preview 2105.2
Next steps
For more information, see the following articles:
Evaluate Configuration Manager in a lab
What's new in Configuration Manager incremental versions
Introduction to Configuration Manager
TIP
For more information on current branch features that require consent to enable, see pre-release features.
For more information on current branch features that you must enable first, see Enable optional features from updates.
Features in Configuration Manager technical
preview version 2201
2/16/2022 • 11 minutes to read • Edit Online
TIP
Navigating this graph is similar to the collection relationships graphical view. That article includes tips to navigate the
viewer, many of which also apply to this graph for content distribution.
Try it out!
Try to complete the tasks. Then send Feedback with your thoughts on the feature.
1. In the Configuration Manager console, go to the Monitoring workspace, expand Distribution Status
and select the Content Status node.
2. If this node doesn't show anything, first distribute content.
3. Select a distributed content item. For example, the Configuration Manager client package .
4. In the ribbon, select View Content Distribution . This action displays the distribution graph for the
selected content.
Hover over the status icon to quickly view more information. Select the path or the status icon to
view status messages for the content.
Hover over the title of the site system to quickly view more information. Select it to drill through to
the Distribution Points node.
NOTE
The existing task sequence property page for Performance is now renamed to More Options .
4. In the section for the icon, select Browse . Select an icon from the default shell library, or browse to
another file in a local or network path.
It supports the following file types:
Programs ( .exe )
Libraries ( .dll )
Icons ( .ico )
Images ( .png , .jpeg , .jpg )
The file doesn't need to be on clients that you target with the deployment. Configuration Manager
includes the image with the deployment policy.
The maximum file size for an image is 256 KB.
Icons can have pixel dimensions of up to 512 x 512.
After you save the properties, deploy the task sequence or package, if it's not already deployed. For more
information, see one of the following articles:
Deploy a task sequence
Deploy packages and programs
When clients receive the deployment policy, they'll display the icon in Software Center.
NOTE
To take full advantage of new Configuration Manager features, after you update the site, also update clients to the latest
version. While new functionality appears in the Configuration Manager console when you update the site and console, the
complete scenario isn't functional until the client version is also the latest.
Get-CMAADTenant
Get-CMAADTenant -Id $id
Get-CMAADTenant -Name $name
Set-CMCollectionCloudSync
Use this cmdlet to configure the following cloud sync features for a collection:
Make a collection available to assign endpoint security policies from the Microsoft Endpoint Manager
admin center. For more information, see Tenant attach: Onboard Configuration Manager clients to
Microsoft Defender for Endpoint from the admin center.
Synchronize collection member results to Azure AD groups. For more information, see Synchronize
members to Azure AD groups.
Modified cmdlets
Get-CMDeploymentTypeDetectionClause
For more information, see Get-CMDeploymentTypeDetectionClause.
Non-breaking changes
The cmdlet can now get a detection clause from a script deployment type.
Get-CMDeploymentStatusDetails
For more information, see Get-CMDeploymentStatusDetails.
Bugs that were fixed
Updated the cmdlet to avoid a potential null reference error.
Import-CMApplication
For more information, see Import-CMApplication.
Non-breaking changes
Updated the import logic to align with console. Added new warning messages.
New-CMCoManagementPolicy
For more information, see New-CMCoManagementPolicy.
Non-breaking changes
The cmdlet now supports applicability for Windows 11 on ARM64 devices.
New-CMApplication
For more information, see New-CMApplication.
Non-breaking changes
It can now get an application icon from the specified file.
New-CMTaskSequence
For more information, see New-CMTaskSequence.
Non-breaking changes
Added the IconLocationFile parameter to support specifying an icon for the task sequence. For more
information, see Support for task sequence and package icons.
New-CMTaskSequenceDeployment
For more information, see New-CMTaskSequenceDeployment.
Bugs that were fixed
Fixed an issue with the AllowSharedContent parameter.
Publish-CMThirdPartySoftwareUpdateContent
For more information, see Publish-CMThirdPartySoftwareUpdateContent.
Non-breaking changes
Added the Force parameter to run the command without asking for confirmation.
Set-CMSoftwareUpdatePointComponent
For more information, see Set-CMSoftwareUpdatePointComponent.
Non-breaking changes
Added the NonWindowsUpdateMaxRuntimeMins parameter to change the default maximum run time for
non-Windows software updates.
Set-CMTaskSequence
For more information, see Set-CMTaskSequence.
Non-breaking changes
Added the IconLocationFile parameter to support specifying an icon for the task sequence. For more
information, see Support for task sequence and package icons.
Set-CMTaskSequenceDeployment
For more information, see Set-CMTaskSequenceDeployment.
Bugs that were fixed
Fixed an issue with the AllowSharedContent parameter.
Start-CMTaskSequenceDeployment
For more information, see Start-CMTaskSequenceDeployment.
Bugs that were fixed
Fixed an issue with the AllowSharedContent parameter.
Next steps
For more information about installing or updating the technical preview branch, see Technical preview.
For more information about the different branches of Configuration Manager, see Which branch of
Configuration Manager should I use?.
Features in Configuration Manager technical
preview version 2112
2/16/2022 • 4 minutes to read • Edit Online
NOTE
The new run time for these updates only applies to updates that are newly synchronized after the change. Existing
updates that have already been synchronized will not use this value.
Next steps
For more information about installing or updating the technical preview branch, see Technical preview.
For more information about the different branches of Configuration Manager, see Which branch of
Configuration Manager should I use?.
Features in Configuration Manager technical
preview version 2111
2/16/2022 • 4 minutes to read • Edit Online
New-CMOrchestrationGroup
Use this cmdlet to create a new orchestration group.
Remove-CMOrchestrationGroup
Use this cmdlet to remove the specified orchestration group.
Set-CMOrchestrationGroup
Use this cmdlet to configure an orchestration group.
Deprecated cmdlets
The Remove-CMDeploymentTypeSupersedence cmdlet for deployment type supersedence is deprecated
and may be removed in a future release. Instead, use the new Set-CMApplicationSupersedence cmdlet.
Modified cmdlets
Add-CMDeviceCollectionDirectMembershipRule
For more information, see Add-CMDeviceCollectionDirectMembershipRule.
Bugs that were fixed
Fixed an issue when adding a rule by resource object.
Get-CMClientSetting
For more information, see Get-CMClientSetting.
Non-breaking changes
Added support to return the value for the Disable Deadline Randomization setting in the Computer Agent
group.
New-CMBoundary
For more information, see New-CMBoundary.
Non-breaking changes
Added new parameter ValueStar tsWith to support Improvements to VPN boundary types.
New-CMTSStepApplyWindowsSetting
For more information, see New-CMTSStepApplyWindowsSetting.
Breaking changes
Removed the following unsupported parameters:
MaximumConnection
Ser verLicensing
New-CMTSPartitionSetting
For more information, see New-CMTSPartitionSetting.
Non-breaking changes
Set default value for AssignVolumeLetter.
New-CMTSStepPrestartCheck
For more information, see New-CMTSStepPrestartCheck.
Non-breaking changes
Added new parameters for TPM existence check:
CheckTpmEnabled
CheckTpmActivated
New-CMWdacSetting
For more information, see New-CMWdacSetting.
Non-breaking changes
Added support for new platform rules for Windows 10 ARM64 and Windows 10 multi-session.
Remove-CMPersistentUserSettingsGroup
For more information, see Remove-CMPersistentUserSettingsGroup.
Bugs that were fixed
Fixed a query issue when remove settings group by name.
Set-CMTSStepPrestartCheck
For more information, see Set-CMTSStepPrestartCheck.
Non-breaking changes
Added new parameters for TPM existence check:
CheckTpmEnabled
CheckTpmActivated
Set-CMBoundary
For more information, see Set-CMBoundary.
Non-breaking changes
Added new parameter ValueStar tsWith to support Improvements to VPN boundary types.
Set-CMDistributionPoint
For more information, see Set-CMDistributionPoint.
Non-breaking changes
Added new parameter EnableMaintenanceMode to support to manage maintenance mode.
Set-CMSoftwareUpdatePoint
For more information, see Set-CMSoftwareUpdatePoint.
Bugs that were fixed
Fixed an issue with regular expression processing when trying to clear the WSUS access account from a
software update point.
Set-CMTSStepApplyWindowsSetting
For more information, see Set-CMTSStepApplyWindowsSetting.
Breaking changes
Removed the following unsupported parameters:
MaximumConnection
Ser verLicensing
Next steps
For more information about installing or updating the technical preview branch, see Technical preview.
For more information about the different branches of Configuration Manager, see Which branch of
Configuration Manager should I use?.
Features in Configuration Manager technical
preview version 2110
2/16/2022 • 11 minutes to read • Edit Online
NOTE
This maximum value for the slider control is the same as the Retain client status histor y for the following
number of days in Client Status Settings . It's 31 days by default.
It's limited by the amount of client health data in the site database. In the following example, while it's configured
to display 31 days of history, there's only three days of available data.
The following example shows the trend for client health evaluation:
Enable update notifications from Microsoft 365 Apps
You can now configure the end-user experience for Microsoft 365 Apps updates. This client setting allows you to
enable or disable notifications from Microsoft 365 Apps for these updates. The new Enable update
notifications from Microsoft 365 Apps option has been added to the Software Updates group of client
settings. The following options are available for the setting:
No : Doesn't display Microsoft 365 Apps updates notifications from Microsoft 365 Apps (default)
Yes : Displays Microsoft 365 Apps updates notifications from Microsoft 365 Apps
End-user experience for update notifications from Microsoft 365 Apps
Which notifications are displayed to the user about updates for Microsoft 365 Apps is also determined by the
settings for per deployment notifications from Software Center. If deployment notifications from Software
Center are disabled, then the end user won't receive any notifications from either Software Center or Microsoft
365 Apps, regardless of how notifications from Microsoft 365 Apps are set. If notifications from both Software
Center and Microsoft 365 Apps are enabled, then the end user will receive notifications from Software Center
and Microsoft 365 Apps. Below is a chart of which notifications for Microsoft 365 Apps updates are displayed to
the end user for these settings:
Enable update notifications from User receives notifications from No notifications from Software Center
Microsoft 365 Apps: Yes Software Center
No notifications from Microsoft 365
User receives notifications from Apps
Microsoft 365 Apps
Enable update notifications from User receives notifications from No notifications from Software Center
Microsoft 365 Apps: No Software Center
No notifications from Microsoft 365
No notifications from Microsoft 365 Apps
Apps
IMPORTANT
Editing a script after it's approved will reset the approval state to Waiting for approval. This also means that the
previously approved version of the script will not run if you start orchestration on the group while that script is in the
Waiting for approval state.
Permissions
Approving scripts for orchestration groups requires one of the following security roles:
Full Administrator
Operations Administrator
Approve or deny a script for an orchestration group
1. From the Configuration Manager console, go to the Assets and Compliance workspace > Over view >
Orchestration Groups .
2. Select an orchestration group and then select the Scripts tab for the group.
3. Select one of the scripts and choose Approve/Deny from either the ribbon or the right-click menu.
4. Review the script from the Script Details page in the Approve or Deny Script wizard. Select Next when
you're finished reviewing the script.
5. On the Script Approval page in the wizard, select Approve or Deny . If needed, enter in a comment to be
displayed in the Scripts detail pane.
6. Complete the wizard to finish the approval process.
Console improvements
Based on your feedback, this release includes the following improvements to the Configuration Manager
console:
When you show the members of a device collection, and select a device in the list, switch to the
Collections tab in the details pane. This new view shows the list of collections of which the selected
device is a member. It makes it easier for you to see this information.
When viewing a collection, you could previously see the amount of time the site took to evaluate the
collection membership. This data is now also available in the Monitoring workspace. When you select a
collection in either subnode of the Collection Evaluation node, the details pane displays this collection
evaluation time data.
Status messages for console extensions
To improve the visibility and transparency of console extensions, the site now creates status messages for
related events. These status messages have IDs from 54201 to 54208 . They all include the following
information:
The user that made the change
The ID of the extension
The version of the extension
There are four categories of message events:
Required or optional
Approve or disapprove
Enable or disable
Tombstone or untombstone
For example, the description of status message ID 54201 is User "%1" made console extension with ID
"%2" and version "%3" required .
Use these status messages to make sure your site uses known and trusted console extensions.
Next steps
For more information about installing or updating the technical preview branch, see Technical preview.
For more information about the different branches of Configuration Manager, see Which branch of
Configuration Manager should I use?.
Migrate data between hierarchies in Configuration
Manager
2/16/2022 • 6 minutes to read • Edit Online
Concepts
Configuration Manager uses the following concepts and terms during migration.
Source hierarchy
A hierarchy that runs a supported version of Configuration Manager and has data that you want to migrate.
When you set up migration, you identify the source hierarchy when you specify the top-level site of a source
hierarchy. After you specify a source hierarchy, the top-level site of the destination hierarchy gathers data from
the database of the designated source site to identify the data that you can migrate.
For more information, see Source hierarchies.
Source sites
The sites in the source hierarchy that have data that you can migrate to your destination hierarchy.
For more information, see Source sites.
Destination hierarchy
A Configuration Manager (current branch) hierarchy where migration runs to import data from a source
hierarchy.
Data gathering
The ongoing process of identifying the information in a source hierarchy that you can migrate to your
destination hierarchy. Configuration Manager checks the source hierarchy on a schedule. This process identifies
any changes to information in the source hierarchy that you previously migrated and that you might want to
update in the destination hierarchy.
For more information, see Data gathering.
Migration jobs
The process of configuring the specific objects to migrate, and then managing the migration of those objects to
the destination hierarchy.
For more information, see Planning a migration job strategy.
Client migration
The process of transferring information that clients use from the database of the source site to the database of
the destination hierarchy. This migration of data is then followed by an upgrade of client software on devices to
the client software version from the destination hierarchy.
For more information, see Planning a client migration strategy.
Shared distribution points
The distribution points from the source hierarchy that Configuration Manager shares with the destination
hierarchy during the migration period.
During the migration period, clients assigned to sites in the destination hierarchy can get content from shared
distribution points.
For more information, see Share distribution points between source and destination hierarchies.
Monitoring migration
The process of monitoring migration activities. You monitor migration progress and success from the
Migration node in the Administration workspace.
For more information, see Planning to monitor migration activity.
Stop gathering data
The process of stopping data gathering from source sites. When you no longer have data to migrate from a
source hierarchy, or if you want to pause migration-related activities, you can configure the destination
hierarchy to stop gathering data from the source hierarchy.
For more information, see Data gathering.
Clean up migration data
The process of finishing migration from a source hierarchy by removing information about the migration from
the destination hierarchies database.
For more information, see Planning to complete migration.
Typical workflow
To set up a workflow for migration:
1. Specify a supported source hierarchy.
2. Set up data gathering. Data gathering enables Configuration Manager to collect information about data
that can migrate from the source hierarchy.
Configuration Manager automatically repeats the process to collect data on a simple schedule until you
stop the data gathering process. By default, the data gathering process repeats every four hours so that
Configuration Manager can identify changes to data in the source hierarchy. Data gathering is also
necessary to share distribution points.
3. Create migration jobs to migrate data between the source and destination hierarchy.
4. You can stop the data gathering process at any time by using the Stop Gathering Data action. When
you stop data gathering, Configuration Manager no longer identifies changes to data in the source
hierarchy and can no longer share distribution points. Typically, you use this action when you no longer
plan to migrate data or share distribution points from the source hierarchy.
5. Optionally, after data gathering has stopped at all sites for the source hierarchy, you can clean up the
migration data by using the Clean Up Migration Data action. This action deletes the historical data
about migration from a source hierarchy from the database of the destination hierarchy.
After you migrate data, and you no longer need the source hierarchy to manage devices in your environment,
you can decommission that source hierarchy and infrastructure.
Scenarios
Configuration Manager supports the following migration scenarios:
Migration from Configuration Manager 2007 hierarchies
Migration from Configuration Manager 2012 or another Configuration Manager hierarchy
NOTE
The expansion of a hierarchy that has a standalone site into a hierarchy that has a central administration site isn't
categorized as a migration. For information about hierarchy expansion, see Expand a stand-alone primary site.
See also
Planning for migration to Configuration Manager
Configuring source hierarchies and source sites for migration
Operations for migration
Security and privacy for migration
Start using Configuration Manager
Plan for migration to Configuration Manager
current branch
2/16/2022 • 2 minutes to read • Edit Online
TIP
In addition to migration, you can use an in-place upgrade of sites that run System Center 2012 Configuration
Manager to Configuration Manager current branch.
IMPORTANT
If you use the Configuration Manager computer account for either access account, ensure that this account is a
member of the security group Distributed COM Users in the domain where the source site resides.
When gathering data, the following network protocols and ports are used:
NetBIOS/SMB - 445 (TCP)
RPC (WMI) - 135 (TCP & UDP)
Dynamic RPC. Dynamic ports use a range of port numbers that are defined by the OS version.
These ports are also known as ephemeral ports. For more information about the default port
ranges, see Service overview and network port requirements for Windows.
SQL Server - The TCP ports in use by both the source and destination site databases.
Migrate Software Updates:
Before you migrate software updates, you must configure the destination hierarchy with a software
update point. For more information, see Planning to migrate software updates.
Share distribution points:
To successfully share any distribution points from a source site, at least one primary site or the central
administration site in the destination hierarchy must use the same port numbers for client requests as
the source site. For information about client request ports, see How to configure client communication
ports
For each source site, only the distribution points that are installed on site system servers that are
configured with a FQDN are shared.
In addition, to share a distribution point from a System Center 2012 Configuration Manager or
Configuration Manager current branch source site, the Source Site Account (which accesses the SMS
Provider for the source site server), must have Modify permissions to the Site object on the source site.
You grant this permission to the account by using role-based administration. For information about how
to use role-based administration, see Fundamentals of role-based administration for Configuration
Manager.
Upgrade or reassign distribution points:
The Source Site Access Account configured to gather data from the SMS Provider of the source site
must have the following permissions:
To upgrade a Configuration Manager 2007 distribution point, the account requires Read , Execute ,
and Delete permissions to the Site class on the Configuration Manager2007 site server to
successfully remove the distribution point from the Configuration Manager2007 source site
To reassign a System Center 2012 Configuration Manager or Configuration Manager current
branch distribution point, the account must have Modify permission to the Site object on the
source site. You grant this permission to the account by using role-based administration. For
information about how to use role-based administration, see Fundamentals of role-based
administration for Configuration Manager.
To successfully upgrade or reassign a distribution point to a new hierarchy, the ports that are
configured for client requests at the site that manages the distribution point in the source
hierarchy must match the ports that are configured for client requests at the destination site that
will manage the distribution point. For information about client request ports, see How to
configure client communication ports.
Administrator checklists for migration planning in
Configuration Manager
2/16/2022 • 7 minutes to read • Edit Online
NOTE
When the source hierarchy runs System Center 2012 Configuration Manager or later, you do not need to
configure additional source sites.
Source hierarchies
A source hierarchy is a Configuration Manager hierarchy that has data that you want to migrate. When you set
up migration and specify a source hierarchy, you specify the top-level site of the source hierarchy. This site is
also called a source site. Additional sites that you can migrate data from in the source hierarchy are also called
source sites.
When you set up a migration job to migrate data from a Configuration Manager 2007 source hierarchy,
you configure it to migrate data from one or more specific source sites in the source hierarchy.
When you set up a migration job to migrate data from a source hierarchy that runs System Center 2012
Configuration Manager or later, you only need to specify the top-level site.
You can set up only one source hierarchy at a time.
If you set up a new source hierarchy, that hierarchy automatically becomes the current source hierarchy
replacing the previous source hierarchy.
When you set up a source hierarchy, you must specify the top-level site of the source hierarchy and
specify credentials for Configuration Manager to use to connect to the SMS Provider and site database of
that source site.
Configuration Manager uses these credentials to run data gathering to retrieve information about the
objects and distribution points from the source site.
As part of the data gathering process, child sites in the source hierarchy are identified.
If the source hierarchy is a Configuration Manager 2007 hierarchy, you can set up those additional sites
as source sites with separate credentials for each source site.
Although you can set up multiple source hierarchies in succession, migration is active for only one source
hierarchy at a time.
If you set up an additional source hierarchy before you complete migration from the current source
hierarchy, Configuration Manager cancels any active migration jobs and postpones any scheduled
migration jobs for the current source hierarchy.
The newly configured source hierarchy then becomes the current source hierarchy, and the original
source hierarchy is now inactive.
You can then set up connection credentials, additional source sites, and migration jobs for the new source
hierarchy.
If you restore an inactive source hierarchy and have not previously used Cleanup Migration Data , you can
view the previously configured migration jobs for that source hierarchy. However, before you can continue
migration from that hierarchy, you must reconfigure the credentials to connect to applicable source sites in the
hierarchy, and then reschedule any migration jobs that did not finish.
Cau t i on
If you migrate data from more than a single source hierarchy, each additional source hierarchy must contain a
unique set of site codes.
Source and destination hierarchies also requires different set of site codes.
For more about configuring a source hierarchy, see Configuring source hierarchies and source sites for
migration to Configuration Manager current branch
Source sites
Source sites are the sites in the source hierarchy that have the data that you want to migrate. The top-level site
of the source hierarchy is always the first source site. When migration collects data from the first source site of a
new source hierarchy, it discovers information about additional sites in that hierarchy.
After data gathering completes for the initial source site, the actions you take next depend on the product
version of the source hierarchy.
Source sites that run Configuration Manager 2007 SP2
After data is gathered from the initial source site of the Configuration Manager 2007 SP2 hierarchy, you do not
have to set up additional source sites before you create migration jobs. However, before you can migrate data
from additional sites, you must set up additional sites as source sites, and Configuration Manager must
successfully gather data from those sites.
To gather data from additional sites, you individually set up each site as a source site. This requires you to
specify the credentials for Configuration Manager to connect to the SMS Provider and site database of each
source site. After you set up the credentials for a source site, the data gathering process for that site begins.
When you set up additional source sites in a Configuration Manager 2007 SP2 source hierarchy, you must set
up source sites from the top down, which means you set up the bottom-tier sites last. You can configure source
sites in a branch of the hierarchy at any time, but you must set up a site as a source site before you set up any of
its child sites as source sites.
NOTE
Only primary sites in a Configuration Manager 2007 SP2 hierarchy are supported for migration.
Source sites that run System Center 2012 Configuration Manager or later
After data is gathered from the initial source site of the System Center 2012 Configuration Manager or later
hierarchy, you do not have to set up additional source sites in that source hierarchy. This is because unlike
Configuration Manager 2007, these versions of Configuration Manager use a shared database, and the shared
database lets you identify and then migrate all available objects from the initial source site.
When you set up the access accounts to gather data, you might need to grant the Source Site SMS Provider
Account access to multiple computers in the source hierarchy. This might be needed when the source site
supports multiple instances of the SMS Provider, each on a different computer. When data gathering begins, the
top-level site of the destination hierarchy contacts the top-level site in the source hierarchy to identify the
locations of the SMS Provider for that site. Only the first instance of the SMS provider is identified. If the data
gathering process cannot access the SMS Provider at the location it identifies, the process fails and does not try
to connect to additional computers that run an instance of SMS Provider for that site.
Data gathering
Immediately after you specify a source hierarchy, set up credentials for each additional source site in a source
hierarchy, or share the distribution points for a source site, Configuration Manager starts to gather data from
the source site.
The data gathering process then repeats itself on a simple schedule to maintain synchronization with any
changes to data in the source site. By default, the process repeats every four hours. You can change the schedule
for this cycle by editing the Proper ties of the source site. The initial data gathering process must review all
objects in the Configuration Manager database and can take a long time to finish. Subsequent data gathering
processes identify only changes to the data and require less time to finish.
To gather data, the top-level site in the destination hierarchy connects to the SMS Provider and the site database
of the source site to retrieve a list of objects and distribution points. These connections use the source site access
accounts. For information about required configurations for gathering data, see Prerequisites for migration.
You can start and stop the data gathering process by using Gather Data Now and Stop Gathering Data in
the Configuration Manager console.
After you use Stop Gathering Data for a source site for any reason, you must reconfigure credentials for the
site before you can gather data from that site again. Until you reconfigure the source site, Configuration
Manager cannot identify new objects or changes to previously migrated objects at that site.
NOTE
Before you expand a standalone primary site into a hierarchy with a central administration site, you must stop all data
gathering. You can reconfigure data gathering after the site expansion completes.
NOTE
Collection migration jobs are available only when you migrate objects from a Configuration Manager 2007 SP2 source
hierarchy.
IMPORTANT
Although you can migrate a virtual application package by using object migration, the packages cannot be
migrated by using the migration job type of Previously Migrated Object Migration . Instead, you must delete
the migrated virtual application package from the destination site and then create a new migration job to migrate
the virtual application.
NOTE
After you have finished migration by using the Clean Up Migration Data action, you can reconfigure the same
hierarchy as the current source hierarchy to restore visibility to the objects you previously migrated.
You can view the objects contained in any migration job in the Configuration Manager console by selecting the
migration job and then choosing the Objects in Job tab.
Use the information in the following sections to help you plan for all migration jobs.
Data selection
When you create a collection migration job, you must select one or more collections. After you select the
collections, the Create Migration Job wizard shows the objects that are associated with the collections. By
default, all objects associated with the selected collections are migrated, but you can uncheck the objects that
you do not want to migrate with that job. When you uncheck an object that has dependent objects, those
dependent objects are also unchecked. All unchecked objects are added to an exclusion list. Objects on an
exclusion list are removed from automatic selection for future migration jobs. You must manually edit the
exclusion list to remove objects that you want to have automatically selected for migration in migration jobs you
create in the future.
Site ownership for migrated content
When you migrate content for deployments, you must assign the content object to a site in the destination
hierarchy. This site then becomes the owner for that content in the destination hierarchy. Although the top-level
site of your destination hierarchy is the site that actually migrates the metadata for content, it is the assigned site
that accesses the original source files for the content across the network.
To minimize the network bandwidth that is used during migration, consider transferring ownership of content to
the closest available site. Because information about the content is shared globally in Configuration Manager, it
will be available at every site.
Information about content is shared to all sites in the destination hierarchy by using database replication.
However, any content that you assign to a primary site and then deploy to distribution points at other primary
sites transfers by using file-based replication. This transfer is routed through the central administration site and
then to each additional primary site. By centralizing packages that you plan to distribute to multiple primary
sites before or during migration when you assign a site as the content owner, you can reduce data transfers
across low-bandwidth networks.
Role -based administration security scopes for migrated data
When you migrate data to a destination hierarchy, you must assign one or more role-based administration
security scopes to the objects whose data is migrated. This ensures that only the appropriate administrative
users have access to this data after it is migrated. The security scopes that you specify are defined by the
migration job and are applied to each object that is migrated by that job. If you require different security scopes
to be applied to different sets of objects and you want to assign those scopes during migration, you must
migrate the different sets of objects by using different migration jobs.
Before you set up a migration job, review how role-based administration works in Configuration Manager. If
necessary, set up one or more security scopes for the data that you migrate to control who will have access to
the migrated objects in the destination hierarchy.
For more about security scopes and role-based administration, see Fundamentals of role-based administration
for Configuration Manager.
Review migration actions
When you set up a migration job, the Create Migration Job wizard shows a list of actions that you must take to
ensure a successful migration and a list of actions that Configuration Manager takes during the migration of the
selected data. Review this information carefully to check the expected outcome.
Schedule migration jobs
By default, a migration job runs immediately after it is created. However, you can specify when the migration job
runs when you create the job or by editing the properties of the job. You can schedule the migration job to run
as follows:
Run the job now
Run the job at a specific start time
Not run the job
Specify conflict resolution for migrated data
By default, migration jobs do not overwrite data in the destination database unless you configure the migration
job to skip or overwrite data that has previously been migrated to the destination database.
NOTE
You see the Enable programs for deployment in Configuration Manager after an adver tisement is migrated
option only when you are creating a collection-based migration job and the migration job contains advertisements.
To enable a program after migration, clear Disable this program on computers where it is adver tised on
the Advanced tab of the program properties.
NOTE
This migration job can identify objects that are automatically updated by the source hierarchy and objects that an
administrative user updates.
Plan a client migration strategy in Configuration
Manager
2/16/2022 • 5 minutes to read • Edit Online
NOTE
When the product version of a hierarchy is not supported for migration to your destination hierarchy, upgrade all
sites and clients in the source hierarchy to a compatible product version. After the source hierarchy upgrades to a
supported product version, you can migrate between the hierarchies. For more information, see Versions of
Configuration Manager that are supported for migration in Prerequisites for migration.
Use the following information to help you plan the client migration:
To upgrade or reassign clients from a source site to a destination site, you can use any client deployment
method that is supported for deploying clients in the destination hierarchy. Typical client deployment
methods include client push installation, software distribution, Group Policy, and software update-based
client installation. For more information, see Client installation methods.
Ensure that the device that runs the client software in the source hierarchy meets the minimum hardware
requirements and runs an operating system that is supported by the version of Configuration Manager in
the destination hierarchy.
Before you migrate a client, run a migration job to migrate the information that the client will use in the
destination hierarchy.
Clients that upgrade retain their run history for deployments. This prevents deployments from rerunning
unnecessarily in the destination hierarchy.
For Configuration Manager 2007 clients, advertisement run history is retained.
For clients from System Center 2012 Configuration Manager or Configuration Manager current
branch, deployment run history is retained.
You can migrate clients from sites in the source hierarchy in any order that you choose. However,
consider migrating limited numbers of clients in phases rather than migrating large numbers of clients at
a single time. A phased migration reduces the network bandwidth requirements and server processing
when each newly upgraded client submits its initial full inventory and compliance data to its assigned
site.
When you migrate Configuration Manager 2007 clients, the existing client software is uninstalled from
the client computer and the new client software is installed.
Configuration Manager cannot migrate a Configuration Manager 2007 client that has the App-V client
installed unless the App-V client version is 4.6 SP1 or later.
You can monitor the client migration process in the Migration node of the Administration workspace in the
Configuration Manager console.
After you migrate the client to the destination hierarchy, you can no longer manage that device by using your
source hierarchy, and you should consider removing the client from the source hierarchy. Although this is not a
requirement when you migrate hierarchies, it can help prevent identification of a migrated client in a source
hierarchy report, or an incorrect count of resources between the two hierarchies during the migration. For
example, when a migrated client remains in the source site database, you might run a software updates report
that incorrectly identifies the computer as an unmanaged resource when it is now managed by the destination
hierarchy.
Use the following information to help you plan for shared distribution points:
Distribution points that you share must meet the prerequisites for shared distribution points. For more
about these prerequisites, see Required configurations for migration in Prerequisites for migration.
The share distribution point action is a site-wide setting that shares all qualifying distribution points at a
source site and at any direct child secondary sites. You cannot select individual distribution points to
share when you enable distribution point sharing.
Clients in the destination hierarchy can receive content location information for packages that are
distributed to distribution points that are shared from the source hierarchy. For distribution points from a
Configuration Manager 2007 source hierarchy, this includes branch distribution points, distribution
points on server shares, and standard distribution points.
WARNING
If you change the source hierarchy, shared distribution points from the original source hierarchy are no longer
available and cannot be offered as content locations to clients in the destination hierarchy. If you reconfigure
migration to use the original source hierarchy, the previously shared distribution points are restored as valid
content location servers.
When you migrate a package that is hosted on a shared distribution point, the package version must
remain the same in the source and destination hierarchies. When a package version is not the same in the
source and destination hierarchy, clients in the destination hierarchy cannot retrieve that content from the
shared distribution point. Therefore, if you update a package in the source hierarchy, you must re-migrate
the package data before clients in the destination hierarchy can retrieve that content from a shared
distribution point.
NOTE
When you view details for a package that is hosted on a shared distribution point, the number of packages that
display as Hosted Migrated Packages on the source site's Shared Distribution Points tab is not updated
until the next data gathering cycle is finished.
You can view shared distribution points and their properties in the Source Hierarchy node of the
Administration workspace in the Configuration Manager console that connects to the destination
hierarchy.
You cannot use a shared distribution point from a Configuration Manager 2007 source hierarchy to host
packages for Microsoft Application Virtualization (App-V). App-V packages must migrate and be
converted for use by clients in the destination hierarchy. However, you can use a shared distribution point
from a System Center 2012 Configuration Manager or Configuration Manager current branch source
hierarchy to host App-V packages for clients in a destination hierarchy.
When you share a protected distribution point from a Configuration Manager 2007 source hierarchy, the
destination hierarchy creates a boundary group that includes the protected network locations of that
distribution point. You cannot change this boundary group in the destination hierarchy. However, if you
change the protected boundary information for the distribution point in the Configuration Manager 2007
source hierarchy, that change is reflected in the destination hierarchy after the next data gathering cycle
finishes.
NOTE
System Center 2012 Configuration Manager and Configuration Manager current branch sites use the concept of
preferred distribution points instead of protected distribution points. This condition only applies to distribution
points that are shared from Configuration Manager 2007 source sites.
The eligible distribution points are not visible in the Configuration Manager console before you share
distribution points from a source site. After you share distribution points, only the distribution points that are
successfully shared are listed.
After you have shared distribution points, you can change the configuration of any shared distribution point in
the source hierarchy. Changes that you make to the configuration of a distribution point are reflected in the
destination hierarchy after the next data gathering cycle. Distribution points that you updated to qualify for
sharing are shared automatically, while those that no longer qualify stop sharing distribution points. For
example, you might have a distribution point that is not set up with an intranet FQDN and was not initially
shared with the destination hierarchy. After you set up the FQDN for that distribution point, the next data
gathering cycle identifies this configuration, and the distribution point is then shared with the destination
hierarchy.
NOTE
You can upgrade only those Configuration Manager 2007 shared distribution points that are on a computer that runs an
operating system version that is supported for distribution points in the destination hierarchy. For example, although you
can share a Configuration Manager 2007 distribution point that is on a computer that runs Windows Vista, you cannot
upgrade this shared distribution point because the operating system is not supported by Configuration Manager current
branch for use as a distribution point.
The following table lists the supported locations for each type of Configuration Manager 2007 distribution point
that you can upgrade.
DIST RIB UT IO N P O IN T O N A
DIST RIB UT IO N P O IN T O N A SIT E SY ST EM C O M P UT ER
SIT E SY ST EM C O M P UT ER OT H ER T H A N T H E SIT E
T Y P E O F DIST RIB UT IO N OT H ER T H A N T H E SIT E SERVER A N D H O ST IN G DIST RIB UT IO N P O IN T O N A
P O IN T SERVER OT H ER SIT E SY ST EM RO L ES SEC O N DA RY SIT E SERVER
1 Configuration Manager current branch does not support server shares for site systems, but it does support the
upgrade of a Configuration Manager 2007 distribution point that is on a server share. When you upgrade a
Configuration Manager 2007 distribution point that is on a server share, the distribution point type is
automatically converted to a server, and you must select the drive on the distribution point computer that will
store the single instance content store.
WARNING
Before you upgrade a branch distribution point, uninstall the Configuration Manager 2007 client software. When you
upgrade a branch distribution point that has the Configuration Manager 2007 client software installed, the content that
was previously deployed to the computer is removed from the computer, and the upgrade of the distribution point fails.
To identify distribution points that are eligible for upgrade in the Configuration Manager console in the Source
Hierarchy node, select a source site, and then select the Shared Distribution Points tab. Eligible distribution
points display Yes in the Eligible for Upgrade column.
When you upgrade a distribution point that is installed on a Configuration Manager 2007 secondary site server,
the secondary site is uninstalled from the source hierarchy. Although this scenario is called a secondary site
upgrade, this applies only to the distribution point site system role. The result is that the secondary site is not
upgraded and instead is uninstalled. This leaves a distribution point from the destination hierarchy on the
computer that was the secondary site server. If you plan to upgrade the distribution point on a secondary site,
see Plan to upgrade Configuration Manager 2007 secondary sites in this topic.
Distribution point upgrade process
You can use the Configuration Manager console to upgrade Configuration Manager 2007 distribution points
that you have shared with the destination hierarchy. When you upgrade a shared distribution point, the
distribution point is uninstalled from the Configuration Manager 2007 site. It is then installed as a distribution
point that is attached to a primary or secondary site that you specify in the destination hierarchy. The upgrade
process creates a copy of the migrated content that is stored on the distribution point, and then converts this
copy to the single instance content store. When Configuration Manager converts a package to the single
instance content store, it deletes that package from the SMSPKG share on the distribution point computer unless
the package has one or more advertisements that are set to Run program from distribution point .
To upgrade the distribution point, Configuration Manager uses the Source Site Access Account that is set up
to gather data from the SMS Provider of the source site. Although this account requires only Read permission
for site objects to gather data from the source site, it must also have Delete and Modify permission to the Site
class to successfully remove the distribution point from the Configuration Manager 2007 site during the
upgrade.
NOTE
Configuration Manager can convert content to the single instance store on only one distribution point at a time. When
you set up multiple distribution point upgrades, the distribution points are queued for upgrade and processed one at a
time.
Before you upgrade a shared distribution point, ensure that all content that is deployed to the distribution point
is migrated. Content that you do not migrate before you upgrade the distribution point is not available in the
destination hierarchy after the upgrade. When you upgrade a distribution point, the content in the migrated
packages is converted into a format that is compatible with the single instance store of the destination hierarchy.
To upgrade a distribution point from within the Configuration Manager console, the Configuration Manager
2007 site system server must meet the following conditions:
The distribution point configuration and location must be eligible for upgrade.
The distribution point computer must have sufficient disk space for the content to be converted from the
Configuration Manager 2007 content storage format to the single instance store format. This conversion
requires available free disk space equal to the size of the largest package that is stored on the distribution
point.
The distribution point computer must run an operating system version that is supported as a distribution
point in the destination hierarchy.
NOTE
When Configuration Manager checks for the eligibility of a distribution point for upgrade, it does not validate the
operating system version of the distribution point computer.
To upgrade a distribution point, in the Administration workspace, expand Migration , expand the Source
Hierarchy node, and then select the site that has the distribution point that you want to upgrade. Next, in the
details pane, on the Shared Distribution Points tab, select the distribution point that you want to upgrade.
You can confirm that the distribution point is ready for upgrade by viewing the status in the Eligible for
Reassignment column. Next, on the Configuration Manager console ribbon, on the Distribution Points tab,
in the Distribution Point group, select Reassign . This opens a wizard that you use to finish the upgrade of the
distribution point.
When you upgrade a shared distribution point, you must assign the distribution point to a primary or secondary
site of your choice in the destination hierarchy. After the distribution point is upgraded, manage the distribution
point as a distribution point in the destination hierarchy like any other distribution point.
You can monitor the progress of a distribution point upgrade in the Configuration Manager console by selecting
the Distribution Point Migration node under the Migration node of the Administration workspace. You
can also view information in the Migmctrl.log on the central administration site server of the destination
hierarchy, or in the distmgr.log on the site server in the destination hierarchy that manages the upgraded
distribution point.
NOTE
When you upgrade a distribution point to the destination hierarchy, the distribution point site system role is removed
from the Configuration Manager 2007 source site. However, packages that were sent to the distribution point are not
updated in the Configuration Manager 2007 hierarchy. In the Configuration Manager 2007 console, packages that had
been sent to the distribution point continue to list the site system computer as a distribution point with a Type of
Unknown . Subsequent updates to the package in Configuration Manager 2007 result in Distribution Manager reporting
errors in the distmgr.log for that site when the site attempts to update the package on the unknown site system.
If you decide not to upgrade a shared distribution point, you can still install a distribution point from the
destination hierarchy on a former Configuration Manager 2007 distribution point. Before you can install the
new distribution point, you must first uninstall all Configuration Manager 2007 site system roles from the
distribution point computer. This includes the Configuration Manager 2007 site if it is the site server computer.
When you uninstall a Configuration Manager 2007 distribution point, content that was deployed to the
distribution point is not deleted from the computer.
Plan to upgrade Configuration Manager 2007 secondary sites
When you use migration to upgrade a shared distribution point that is hosted on a Configuration Manager 2007
secondary site server, Configuration Manager upgrades the distribution point site system role to be a
distribution point in the destination hierarchy. It also uninstalls the secondary site from the source hierarchy. The
result is a Configuration Manager current branch distribution point, but no secondary site.
For a distribution point on the site server computer to be eligible for upgrade, Configuration Manager must be
able to uninstall the secondary site and each of the site system roles on that computer. Typically, a shared
distribution point on a Configuration Manager 2007 server share is eligible for upgrade. However, when a
server share exists on the secondary site server, the secondary site and any shared distribution points on that
computer are not eligible for upgrade. This is because the server share is treated as an additional site system
object when the process attempts to uninstall the secondary site, and this process cannot uninstall this object. In
this scenario, you can enable a standard distribution point on the secondary site server and then redistribute the
content to that standard distribution point. This process does not use network bandwidth, and when finished,
you can uninstall the distribution point on the server share, remove the server share, and then upgrade the
distribution point and secondary site.
Before you upgrade a shared distribution point, review the distribution point configuration in Configuration
Manager 2007 to avoid upgrading a distribution point on a secondary site that you still want to use with
Configuration Manager 2007. This is a good practice, because after you upgrade a shared distribution point that
is on a secondary site server, the site system server is removed from the Configuration Manager 2007 hierarchy
and is no longer available for use with that hierarchy. When the secondary site is removed, any remaining
distribution points at that secondary site are orphaned. This means they become unmanaged from
Configuration Manager 2007 and are no longer shared or eligible for upgrade.
WARNING
When you view shared distribution points in the Configuration Manager console, there is no visible indication that a
shared distribution point is on a remote site system server or on the secondary site server.
When you have a secondary site in a remote network location that is used primarily to control the deployment
of content to that remote location, consider upgrading secondary sites that have a shared distribution point.
Because you can set up bandwidth control for when you distribute content to a Configuration Manager current
branch distribution point, you can often upgrade a secondary site to a distribution point, set up the distribution
point for bandwidth controls, and avoid installing a secondary site in that network location in the destination
hierarchy.
The process to upgrade a shared distribution point on a secondary site server is the same as any other shared
distribution point upgrade. Content is copied and converted to the single instance store in use by the destination
hierarchy. However, when you upgrade a shared distribution point that is on a secondary site server, the
upgrade process also uninstalls the management point (if present) and then uninstalls the secondary site from
the server. The result is that the secondary site is removed from the Configuration Manager 2007 hierarchy. To
uninstall the secondary site, Configuration Manager uses the account that is set up to gather data from the
source site.
During the upgrade, there is a delay between when the Configuration Manager 2007 secondary site is
uninstalled and the when the installation of the distribution point in the destination hierarchy begins. The data-
gathering cycle determines this delay of up to four hours. The delay is intended to provide time for the
secondary site to uninstall before the new distribution point installation begins.
For more about how to upgrade a shared distribution point, see Plan to upgrade Configuration Manager 2007
shared distribution points.
WARNING
Configuration Manager does not support use of the WSUSutil tool to sync data between a source and destination
hierarchy.
You cannot migrate custom updates that are published by using System Center Updates Publisher.
Instead, custom updates must be republished to the destination hierarchy.
When you migrate from a Configuration Manager 2007 source hierarchy, the migration process modifies some
software update objects to the format in use by the destination hierarchy. Use the following table to help you
plan the migration of software update objects from Configuration Manager 2007.
Software update lists Software update lists are converted to software update
groups.
Software update packages Software update packages remain software update packages.
When you migrate objects from a System Center 2012 Configuration Manager or Configuration Manager
current branch source hierarchy, the software updates objects are not modified.
TIP
For each package that you migrate, update the package in the destination hierarchy. This action can prevent issues with
deploying the package to distribution points in the destination hierarchy. However, when you update a package on the
distribution point in the destination hierarchy, clients in that hierarchy will no longer be able to get that package from a
shared distribution point. To update a package in the destination hierarchy, in the Configuration Manager console, go to
the Software Library, right-click on the package, and then select Update Distribution Points . Do this action for each
package that you migrate.
TIP
Use Package Conversion Manager to convert packages and programs into Configuration Manager applications. For more
information, see Package Conversion Manager.
Virtual applications
When you migrate App-V packages from a supported Configuration Manager 2007 site, the migration process
converts them to applications in the destination hierarchy. Additionally, based on existing advertisements for the
App-V package, the following deployment types are created in the destination hierarchy:
If there are no advertisements, one deployment type is created that uses the default deployment type
settings.
If one advertisement exists, one deployment type is created that uses the same settings as the
Configuration Manager 2007 advertisement.
If multiple advertisements exist, a deployment type is created for each Configuration Manager 2007
advertisement by using the settings for that advertisement.
IMPORTANT
If you migrate a previously migrated Configuration Manager 2007 App-V package, the migration fails because virtual
application packages do not support the overwrite migration behavior. In this scenario, you must delete the migrated
virtual application package from the destination hierarchy, and then create a new migration job to migrate the virtual
application.
NOTE
After you migrate an App-V package, you can use the Update Content wizard to change the source path for App-V
deployment types. For more about how to update content for a deployment type, see How to manage deployment types
in Management tasks for Configuration Manager applications.
When you migrate from a System Center 2012 Configuration Manager or Configuration Manager current
branch source hierarchy, you can migrate objects for the App-V virtual environment in addition to App-V
deployment types and applications. For more about App-V environments, see Deploying App-V virtual
applications.
Advertisements
You can migrate advertisements from a supported Configuration Manager 2007 source site to the destination
hierarchy by using collection-based migration. If you upgrade a client, it retains the history of previously run
advertisements to prevent the client from rerunning migrated advertisements.
NOTE
You cannot migrate advertisements for virtual packages. This is an exception to the migration of advertisements.
Applications
You can migrate applications from a supported System Center 2012 Configuration Manager or Configuration
Manager current branch source hierarchy to a destination hierarchy. If you reassign a client from the source
hierarchy to the destination hierarchy, the client retains the history of previously installed applications to
prevent the client from rerunning a migrated application.
Plan to migrate collections
You can migrate the criteria for collections from a supported System Center 2012 Configuration Manager or
Configuration Manager current branch source hierarchy. For this, you use an object-based migration job. When
you migrate a collection, you migrate the rules for the collection and not information about the members of the
collection or information or objects related to the members of the collection.
Migration of the collection object is not supported when you migrate from a Configuration Manager 2007
source hierarchy.
NOTE
When you migrate a task sequence, Configuration Manager might migrate objects that are not required in the
destination hierarchy. These objects include boot images and Configuration Manager 2007 client installation
packages.
Drivers and driver packages. When you migrate driver packages, the computer account of the SMS
Provider in the destination hierarchy must have full control to the package source.
NOTE
Uninterpreted configuration items from Configuration Manager 2007 source hierarchies aren't supported for migration.
You can't migrate or import these configuration items to the destination hierarchy.
You can import Configuration Manager 2007 Configuration Packs. The import process automatically converts
the configuration packs to be compatible with Configuration Manager current branch.
Plan to migrate boundaries
You can migrate boundaries between hierarchies. When you migrate boundaries from Configuration Manager
2007, each boundary from the source site migrates at the same time and is added to a new boundary group
that is created in the destination hierarchy. When you migrate boundaries from a System Center 2012
Configuration Manager or Configuration Manager current branch hierarchy, each boundary you select is added
to a new boundary group in the destination hierarchy.
Each automatically created boundary group is enabled for content location but not for site assignment. This
prevents overlapping boundaries for site assignment between the source and destination hierarchies. When you
migrate from a Configuration Manager 2007 source site, this helps prevent new Configuration Manager 2007
clients that install from incorrectly assigning to the destination hierarchy. By default, Configuration Manager
current branch clients do not automatically assign to Configuration Manager 2007 sites.
During migration, if you share a distribution point with the destination hierarchy, any boundaries that are
associated with that distribution automatically migrate to the destination hierarchy. In the destination hierarchy,
migration creates a new read-only boundary group for each shared distribution point. If you change the
boundaries for the distribution point in the source hierarchy, the boundary group in the destination hierarchy
updates with these changes during the next data gathering cycle.
NOTE
Because there are schema changes for reports between Configuration Manager 2007 and Configuration Manager current
branch, test each report that you import from a Configuration Manager 2007 hierarchy to ensure that it functions as
expected.
NOTE
Configuration Manager current branch doesn't support the migration of Asset Intelligence objects from a Configuration
Manager 2007 site that is using Asset Intelligence Service 2.0 (AIS 2.0).
NOTE
If a migration job fails, review the details in the migmctrl.log file as soon as possible. The migration log entries are
continually added to the file and overwrite old details. If the entries are overwritten, you might not be able to
identify whether any problems that you might encounter with the migrated objects relate to migration issues.
Migration activity is logged at the top-level site of the hierarchy regardless of the site your Configuration
Manager console connects to when you configure migration.
Use Configuration Manager reporting. Configuration Manager provides several built-in reports for
migration, or you can edit those reports to fit your requirements. For more information about
Configuration Manager reports, see Introduction to reporting.
Plan to complete migration in Configuration
Manager
2/16/2022 • 3 minutes to read • Edit Online
NOTE
Operations for migration are run at the top-level site in the destination hierarchy. If you configure migration when you
use a Configuration Manager console that is connected to a primary child site, you must allow time for the configuration
to replicate to the central administration site, start, and then replicate status back to the primary site to which you are
connected.
Use the information and procedures in the following sections to specify the source hierarchy and add additional
source sites. After you finish these procedures, you can create migration jobs and start to migrate data from the
source hierarchy to the destination hierarchy.
Specify a source hierarchy for migration
Identify additional source sites of the source hierarchy
NOTE
The following procedure for creating a migrating job that migrates by collections applies only to source hierarchies that
run a supported version of Configuration Manager 2007. The collection-based migration job type is not available when
you migrate from a System Center 2012 Configuration Manager or Configuration Manager current branch source
hierarchy.
IMPORTANT
Before you upgrade a Configuration Manager 2007 branch distribution point, you must uninstall the Configuration
Manager 2007 client software from the branch distribution point computer. If the Configuration Manager 2007 client
software is installed when you attempt to upgrade the distribution point, the upgrade fails and content that was
previously deployed to the branch distribution point is removed from the computer.
Cau t i on
When you upgrade or reassign a shared distribution point, the distribution point site system role and site
system computer are removed from the source site and added as a distribution point to the site in the
destination hierarchy that you select.
Upgrade or reassign a shared distribution point
1. In the Configuration Manager console, choose Administration .
2. In the Administration workspace, expand Migration , and then choose Source Hierarchy .
3. Select the site that owns the distribution point you want to upgrade, choose the Shared Distribution
Points tab, and select the eligible distribution point that you want to upgrade or reassign.
4. On the Distribution Point tab, in the Distribution Point group, choose Reassign .
5. Specify settings in the Reassign Shared Distribution Point wizard like you are installing a new distribution
point for the destination hierarchy, with the following addition:
On the Content Conversion page, review the guidance about the space required to convert the
existing content. Then, on the Drive Settings page of the wizard, ensure that the drive of the
distribution point computer that is selected has the required amount of free disk space.
6. Confirm the settings and then finish the wizard.
Migrate clients
After you migrate data for clients between hierarchies but before you finish migration, plan to migrate clients to
the destination hierarchy. The migration of clients between hierarchies involves uninstalling the Configuration
Manager client software from computers that are assigned to the source hierarchy, and then installing the
Configuration Manager client software from the destination hierarchy. When you install the client from the
destination hierarchy you also assign the client to a primary site in that hierarchy. For more about migrating
clients, see Planning a client migration strategy.
Finish migration
Use this procedure to finish migration from the source hierarchy.
1. In the Configuration Manager console, choose Administration .
2. In the Administration workspace, expand Migration , and then choose Source Hierarchy .
3. For a Configuration Manager 2007 source hierarchy, select a source site that is at the bottom level of the
source hierarchy. For a System Center 2012 Configuration Manager or Configuration Manager current
branch source hierarchy, select the available source site.
4. On the Home tab, in the Clean Up group, choose Stop Gathering Data .
5. Choose Yes to confirm the action.
6. For a Configuration Manager 2007 source hierarchy, before you continue to the next step, repeat steps 3,
4, and 5. Go through these steps at each site in the hierarchy, from the bottom of the hierarchy to the top.
For a System Center 2012 Configuration Manager or Configuration Manager current branch source
hierarchy, continue to the next step.
7. On the Home tab, in the Clean Up group, choose Clean Up Migration Data .
8. On the Clean Up Migration Data dialog box, from the Source hierarchy drop-down list, select the
site code and site server of the top-level site of the source hierarchy, and then choose OK .
9. Choose Yes to finish the migration process for the source hierarchy.
Security and privacy for migration to Configuration
Manager current branch
2/16/2022 • 2 minutes to read • Edit Online
Use the computer account for the Source Site SMS Provider If you must use a user account for migration, remove the
Account and the Source Site SQL Server Account rather than account details when migration is completed.
a user account.
Use IPsec when you migrate content from a distribution Although the migrated content is hashed to detect
point in a source site to a distribution point in your tampering, if the data is modified while it is transferred, the
destination site. migration will fail.
Restrict and monitor the administrative users who can create The integrity of the database of the destination hierarchy
migration jobs. depends upon the integrity of data that the administrative
user chooses to import from the source hierarchy. In
addition, this administrative user can read all data from the
source hierarchy.
Example 2
Setup downloader only verifies the files in the specified download folder.
setupdl.exe /VERIFY C:\Download
Example 3
Setup downloader verifies the files in the specified download folder, and then downloads files. The tool doesn't
show any user interface.
setupdl.exe /NOUI C:\Download
Example 4
Setup downloader verifies the language files in the specified download folder, and then downloads only the
language files.
setupdl.exe /LANG C:\Download
NOTE
This file is in the subfolder for the install language. For instance, English is in the 00000409 subfolder.
The destination folders on your device should look like the following example:
C:\ConfigManInstall\setupdl.exe
C:\ConfigManInstall\00000409\setupdlres.dll
3. Run the setup downloader from the destination computer. Use either the user interface or the command
prompt.
Prerequisite Checker for Configuration Manager
2/16/2022 • 6 minutes to read • Edit Online
NOTE
Prerequisite Checker always runs as part of Setup.
Source folders
By default, the prerequisite checker tool is in one of the following locations:
<Configuration Manager installation media>\SMSSETUP\BIN\X64
<Configuration Manager installation path>\BIN\X64
NOTE
The tool requires administrative permissions on the local computer.
Prerequisite Checker detects existing sites, and if found, runs the checks for upgrade readiness. If no sites are
found, it runs all checks. The Site Type column provides information about the site server or site system with
which the rule is associated.
In the Prerequisite Checker user interface, Prerequisite Checker creates a list of discovered problems in the
Prerequisite result section.
Select an item in the list for details about how to resolve the problem.
Before you install the component, resolve all items in the list that have an Error status.
To review results after you close the tool, open the ConfigMgrPrereq.log file in the root of the system
drive. The log file might contain more information that's not displayed in the tool.
Command-line options
There are four installation scenarios. The following list summarizes all of the command-line options for each
scenario:
Central administration site (CAS)
Required
/CAS
/SDK
/SQL
Optional
/EXPAND
/INSTALLDIR
/NOUI
/SCP
/SSBPORT
Primar y site
Required
/PRI
/SDK
/SQL
Optional
/DP
/INSTALLDIR
/JOIN
/MP
/NOUI
/SCP
/SSBPORT
Secondar y site
Required
/SEC
Optional
/INSTALLDIR
/INSTALLSQLEXPRESS
/NOUI
/SECUPGRADE
/SOURCEDIR
/SQLPORT
/SSBPORT
Configuration Manager console
/ADMINUI
For more information on these options, see the following sections.
/AdminUI
Applies to: Console
Required. This option verifies that the local computer meets the requirements for installing the Configuration
Manager console. It doesn't check any server requirements. You can't combine this option with any other option.
/CAS
Applies to: CAS
Required. This option verifies that the local server meets the requirements for the CAS. You can't combine it with
the /PRI or /SEC options.
/DP
Applies to: Primary
Optional. Specify the FQDN of the server to host the distribution point role, for example:
/PRI /DP dp01.contoso.com
This option verifies that the specified server meets the requirements for the distribution point site system role.
This option can be used alone or with the /PRI option.
/Expand
Applies to: CAS
Optional. Specify the FQDN of a primary site, for example: /CAS /EXPAND cmprimary.contoso.com
This option verifies that the referenced primary site meets the requirements to expand a hierarchy with a CAS.
/InstallDir
Applies to: CAS, Primary, Secondary
Optional. Specify the local installation path, for example /InstallDir C:\ConfigMgr
This option verifies the minimum disk space for site installation.
/InstallSQLExpress
Applies to: Secondary
Optional. This option verifies that SQL Server Express can be installed on the specified secondary site server.
/Join
Applies to: Primary
Optional. Specify the FQDN of the CAS server, for example, /PRI /JOIN cas.contoso.com
This option verifies that the local server meets the requirements for connecting to the CAS server.
/MP
Applies to: Primary
Optional. Specify the FQDN of the server to host the management point role, for example:
/PRI /MP mp01.contoso.com
This option verifies that the specified server meets the requirements for the management point site system role.
This option can be used alone or with the /PRI option.
/NoUI
Applies to: CAS, Primary, Secondary
Optional. This option starts the prerequisite checker without displaying the user interface. Specify this option
before any other option in the command line.
/Pri
Applies to: Primary
Required. This option verifies that the local server meets the requirements for a primary site. You can't combine
it with the /CAS or /SEC options.
/SCP
Applies to: CAS, Primary
Optional. Specify the FQDN of the server to host the service connection point. This server may be the same as
the site server.
Starting in version 2111, this option verifies that the specified computer meets the requirements for the service
connection point site system role. You can use this option alone or with the /PRI or /CAS options.
/SDK
Applies to: CAS, Primary
Required. Specify the FQDN of the server to host the SMS Provider role. This server may be the same as the site
server.
This option verifies that the specified server meets the requirements for the SMS Provider.
/Sec
Applies to: Secondary
Required. Specify the FQDN of the secondary site server, for example: /SEC sec01.contoso.com
This option verifies that the specified server meets the requirements for the secondary site. You can't combine it
with the /CAS or /PRI options.
/SecUpgrade
Applies to: Secondary
Optional. Specify the FQDN of the secondary site server, for example: /SECUPGRADE sec01.contoso.com
This option verifies that the specified server meets the requirements for the secondary site upgrade. You can't
combine it with the /CAS , /PRI , or /SEC options.
/SourceDir
Applies to: Secondary
Optional. This option verifies that the computer account of the secondary site can access the folder that hosts
the source files for Configuration Manager setup.
/SQL
Applies to: CAS, Primary
Required. Specify the fully qualified domain name (FQDN) of the SQL Server, for example
/SQL sql01.contoso.com
This option verifies that the specified server meets the requirements for SQL Server to host the Configuration
Manager site database.
/SQLPort
Applies to: Secondary
Optional. This option verifies that a firewall exception exists to allow communication for the SQL Server service
port. It also checks that the port isn't in use by another named instance of SQL Server. The default port is 1433.
/SSBPort
Applies to: CAS, Primary, Secondary
Optional. This option verifies that a firewall exception exists to allow communication on the SQL Server Service
Broker (SSB) port. The default SSB port is 4022.
List of prerequisite checks for Configuration
Manager
2/16/2022 • 26 minutes to read • Edit Online
Errors
Active migration mappings on the target primary site
Applies to: Central administration site
There are no active migration mappings to primary sites.
Active replica MP
Applies to: Primary site
There's an active management point replica.
Administrative rights on expand primary site
Applies to: Central administration site
When you expand a primary site to a hierarchy, the user account that runs setup has Administrator rights on
the standalone primary site server.
Administrative rights on site system
Applies to: Central administration site, primary site, secondary site
The user account that runs Configuration Manager setup has Administrator rights on the site server.
Administrator rights on central administration site
Applies to: Primary site
The user account that runs Configuration Manager setup has Administrator rights on the central
administration site server.
Application catalog rules are unsupported
Applies to: Primary site
Starting in version 2107, this error happens if the site has either of the following site system roles:
Application catalog website point
Application catalog web service point
Support for the application catalog was removed in version 1910. For more information, see Remove the
application catalog.
Asset Intelligence synchronization point on the expanded primary site
IMPORTANT
Starting in November 2021, this feature of Configuration Manager is deprecated. For more information, see Introduction
to asset intelligence in Configuration Manager.
HKLM:SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired
HKLM:Software\Microsoft\ServerManager, CurrentRebootAttempts
Primary FQDN
Applies to: Central administration site, primary site, secondary site, site database server
The NetBIOS name of the computer matches the local hostname in the fully qualified domain name (FQDN).
Read-only domain controller
Applies to: Central administration site, primary site, secondary site
Site database servers and secondary site servers aren't supported on a read-only domain controller (RODC).
For more information, see Installing SQL Server on a domain controller.
Required SQL Server collation
Applies to: Central administration site, primary site, secondary site
The instance for SQL Server is configured to use the SQL_Latin1_General_CP1_CI_AS collation.
If the Configuration Manager site database is already installed, this check also applies to the database. For
information about changing your SQL Server instance and database collations, see SQL Server collation and
unicode support.
If you're using a Chinese OS and require GB18030 support, this check doesn't apply. For more information
about enabling GB18030 support, see International support.
Required version of Microsoft .NET Framework (error)
Applies to: CAS, primary site, secondary site
This rule checks if the .NET Framework is at least version 4.6.2. You'll see this error if the system has less than
version 4.6.2.
Starting in version 2111, Configuration Manager requires Microsoft .NET Framework version 4.6.2 for site
servers, specific site systems, clients, and the console. If possible in your environment, .NET version 4.8 is
recommended. A later version of Configuration Manager will require .NET version 4.8. Before you run setup to
install or update the site, first update .NET and restart the system. For more information, Site and site system
prerequisites.
NOTE
Third-party add-ons that use Microsoft .NET Framework and rely on Configuration Manager libraries also need to use
.NET 4.6.2 or later. For more information, see External dependencies require .NET 4.6.2.
NOTE
If you use administrative shares, for example, C$ and D$, the secondary site computer account must be an
Administrator on the server.
WARNING
This check only applies when you select to have setup use an existing instance of SQL Server.
Warnings
Active Directory domain functional level
Applies to: Central administration site, primary site
The Active Directory domain and forest functional level is a minimum of Windows Server 2008 R2. For more
information, see Support for Active Directory domains.
Administrative rights on distribution point
Applies to: Distribution point
The user account running setup has Administrator rights on the distribution point.
Administrative rights on management point
Applies to: Management point, distribution point
The computer account of the site server has Administrator rights on the management point and distribution
point.
Administrative share (site system)
Applies to: Management point
The required administrative shares are present on the site system computer.
Application compatibility
Applies to: Central administration site, primary site
Current applications are compliant with the application schema.
Backlogged inboxes
Applies to: Central administration site, primary site
The site server is processing critical inboxes in a timely fashion. Inboxes don't contain files older than one day.
It checks the following inbox folders:
despoolr.box\receive\*.i??
despoolr.box\receive\*.s??
despoolr.box\receive\*.nil
schedule.box\requests\*.sr?
To resolve this warning, check whether the despooler and scheduler site system components are running.
BITS installed
Applies to: Management point
The Background Intelligent Transfer Service (BITS) is installed and enabled in IIS.
Check if the site uses Microsoft Operations Management Suite (OMS ) Connector
Applies to: Central administration site, primary site
Starting in version 2103, this check warns about the presence of the Log Analytics connector for Azure Monitor.
(This feature is called the OMS Connector in the Azure Services wizard.)
Starting in version 2107, this connector is removed from the product. This check will be an error that blocks
upgrade.
Check if the site uses Upgrade Readiness cloud service connector
Applies to: Central administration site, primary site
The Upgrade Readiness service is retired as of January 31, 2020. For more information, see Windows Analytics
retirement on January 31, 2020.
Desktop Analytics is the evolution of Windows Analytics. For more information, see What is Desktop Analytics.
If your Configuration Manager site had a connection to Upgrade Readiness, you need to remove it and
reconfigure clients. For more information, see Remove Upgrade Readiness connection.
If you ignore this prerequisite warning, Configuration Manager setup automatically removes the Upgrade
Readiness connector.
Cloud management gateway requires either token-based authentication or an HTTPS management point
Applies to: Cloud management gateway
With some versions of Configuration Manager, you can't use an HTTP management point with the cloud
management gateway (CMG). Either configure the CMG for HTTPS, or configure the site for enhanced HTTP. For
more information, see Overview of cloud management gateway.
Configuration for SQL Server memory usage
Applies to: Site database server
SQL Server is configured for unlimited memory use. Configure SQL Server memory to have a maximum limit.
Distribution point package version
Applies to: Distribution points
All distribution points in the site have the latest version of software distribution packages.
Domain membership (warning)
Applies to: Management point, distribution point
The Configuration Manager computer is a member of a Windows domain.
Enable site system roles for HTTPS or Enhanced HTTP
Applies to: central administration site, primary site
Starting in version 2103, if your site is configured to allow HTTP communication without enhanced HTTP, you'll
see this warning. To improve the security of client communications, in the future Configuration Manager will
require HTTPS communication or enhanced HTTP.
This check looks at the following settings:
1. In the Configuration Manager console, go to the Administration workspace, expand Site
Configuration , and select the Sites node.
2. Select a site, and then in the ribbon select Proper ties .
3. Switch to the Communication Security tab.
Configure one of the following options:
HTTPS only : This site setting requires that all site systems that use IIS use HTTPS. These site
systems need a server authentication certificate, and clients need a client authentication certificate.
For more information, see Plan a transition strategy for PKI certificates.
HTTPS or HTTP and Use Configuration Manager-generated cer tificates for HTTP site
systems : This combination of settings enables Enhanced HTTP.
NOTE
If you see this warning when updating the central administration site, it may be because of a child primary site.
HKLM:SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired
HKLM:Software\Microsoft\ServerManager, CurrentRebootAttempts
IMPORTANT
Starting in version 2111, if this check fails, it returns an error instead of a warning.
Configuration Manager requires Microsoft .NET Framework version 4.6.2 for site servers, specific site systems,
clients, and the console. If possible in your environment, .NET version 4.8 is recommended. A later version of
Configuration Manager will require .NET version 4.8. Before you run setup to install or update the site, first
update .NET and restart the system. For more information, Site and site system prerequisites.
Schema extensions
Applies to: Central administration site, primary site
The Active Directory schema has been extended. If it's extended, the version of the schema extensions that were
used.
Configuration Manager doesn't require Active Directory schema extensions for site server installation. Microsoft
recommends them for the full use of all Configuration Manager features. For more information about the
advantages of extending the schema, see Prepare Active Directory for site publishing.
Share name in package
Applies to: Central administration site, primary site
Packages don't have invalid characters in the share name, such as # .
Site system to SQL Server communication
Applies to: Secondary site, management point
The account that you configured to run the SQL Server service for the site database instance has a valid service
principal name (SPN) in Active Directory Domain Services. Register a valid SPN in Active Directory to support
Kerberos authentication.
SQL Server 2012 lifecycle
Applies to: CAS, primary site, secondary site
This rule warns for the presence of SQL Server 2012. The support lifecycle for SQL Server 2012 ends on July 12,
2022. Plan to upgrade database servers in your environment, including SQL Server Express at secondary sites.
For more information, see Removed and deprecated for site servers: SQL Server.
SQL Server change tracking cleanup
Applies to: Site database server
Check if the site database has a backlog of SQL Server change tracking data.
Manually verify this check by running a diagnostic stored procedure in the site database. First, create a
diagnostic connection to your site database. The easiest method is to use SQL Server Management Studio's
Database Engine Query Editor, and connect to admin:<instance name> .
In a dedicated administrator connection query window, run the following commands:
Depending upon the size of your database and the backlog size, this stored procedure could run in a few
minutes or several hours. When the query completes, you see two sections of data related to the backlog. First
look at CT_Days_Old . This value tells you the age (days) of the oldest entry in your syscommittab table. It
should be five days, which is the Configuration Manager default value. Don't change this default value. At times
of heavy data processing or replication, the oldest entry in syscommittab could be over five days. If this value is
above seven days, run a manual cleanup of change tracking data.
To clean up the change tracking data, run the following command in the dedicated administration connection:
This command starts a cleanup of syscommittab and all of the associated side tables. It can run in several
minutes or several hours. To monitor its progress, query the vLogs view. To see the current progress, run the
following query:
NOTE
This check can't resolve the status of site system roles installed in Azure or for the cloud storage used by Microsoft Intune.
Ignore warnings for these roles as false positives.
NOTE
If you manually verify the permissions, you can ignore this warning.
TIP
When managing Configuration Manager site and hierarchy infrastructure, the terms upgrade, update, and install are used
to describe three separate concepts. To learn how each term is used, see About upgrade, update, and install.
Stand-alone primary site Secondary site (you can expand the primary site, which
converts the stand-alone primary site to a child primary site)
Installation media : When you install a central administration site to expand a stand-alone primary site, or if
you install a new child primary site in an existing hierarchy, you must use installation media (that contains
source files) that matches the version of the existing site or sites.
IMPORTANT
If you have installed in-console updates that have changed the version of the previously installed sites, do not use the
original installation media. Instead, in that scenario, use source files from the CD.Latest folder of an updated site.
Configuration Manager requires you to use source files that match the version of the existing site that your new site will
connect to.
A secondary site must be installed from the Configuration Manager console. This way, secondary sites are
always installed by using source files from the parent primary site.
Installation method : The method you use to install additional sites depends on the type of site you want to
install.
Add a central administration site : You can use the Configuration Manager Setup Wizard or a scripted
command line to install the new central administration site as a parent site to your existing stand-alone
primary site. For more information, see Expanding a stand-alone primary site.
Add a child primar y site : You can use the Configuration Manager Setup Wizard or a command-line
installation to add a child primary site below a central administration site.
Add a secondar y site : Use the Configuration Manager console to install a secondary site as a child site
below a primary site. Other methods are not supported for adding secondary sites.
NOTE
Configuration Manager Setup does not verify that a site code is not already in use.
To enter the site code for a site when you're running Configuration Manager Setup, you must enter three
alphanumeric characters. Only the letters A through Z and the numbers 0 through 9, in any combination, are
allowed in site codes. The sequence of letters or numbers has no effect on the communication between sites. For
example, it is not necessary to name a primary site ABC and a secondary site DEF.
The site name is a friendly name identifier for the site. You can only use the characters A through Z, a through z,
0 through 9, and the hyphen (-) in site names.
IMPORTANT
A change of the site code or site name after you install the site is not supported.
IMPORTANT
When Configuration Manager setup finishes, the site server computer account still needs sysadmin
permissions to SQL Server. Don't remove the SQL Server sysadmin permissions from this account.
For more information on the need for these permissions after setup is complete, see Accounts: Elevated
permissions.
If you're installing a primary site, you may also need Administrator permissions on additional servers.
For example, where you install the initial management point and distribution point, if not on the site
server.
If you're installing a new child primary site below a CAS, you need the following additional permissions:
Administrator on the site server that hosts the CAS
Administrator on the SQL Server that hosts the CAS site database
Role-based administration permissions within Configuration Manager that are equivalent to the
security role of Infrastructure Administrator or Full Administrator
Use the correct installation source files, and run setup from that location. For information about the
correct source files to use to install different types of sites, see Prepare to install site: Options for installing
different types of sites.
The site server needs access to the latest setup files from Microsoft. Use one of the following methods:
Before you start the install, download and store a copy of these files on your local network. For
more information, see Setup Downloader.
If a local copy of these files isn't available, the site server needs access to the internet. It downloads
these files from Microsoft during the installation. For more information, see Internet access
requirements.
The site server and site database server must meet all prerequisite configurations. Before starting
Configuration Manager setup, manually run Prerequisite Checker to identify and fix problems.
Prerequisites to expand a stand-alone primary site
A stand-alone primary site must meet the following prerequisites before you can expand it into a hierarchy with
a CAS:
Source file version matches site version
Install the new CAS using media from a CD.Latest folder that matches the version of the stand-alone primary
site. To make sure the versions match, use the source files found in the CD.Latest folder on the stand-alone
primary site.
For more information about the correct source files to use to install different sites, see Prepare to install sites:
Options for installing different types of sites.
Stop active migration from another hierarchy
You can't configure the stand-alone primary site to migrate data from another Configuration Manager hierarchy.
Stop active migration to the stand-alone primary site from other Configuration Manager hierarchies and
remove all configurations for migration. These configurations include:
Migration jobs that haven't completed
Data gathering
The configuration of the active source hierarchy
This configuration is necessary because Configuration Manager migrates data from the top-level site of the
hierarchy. When you expand a stand-alone primary site, the configurations for migration don't transfer to the
CAS.
After you expand the stand-alone primary site, if you reconfigure migration at the primary site, the CAS runs the
migration jobs.
For more information about how to configure migration, see Configure source hierarchies and source sites for
migration.
Computer account as Administrator
Add the computer account of the server that hosts the new CAS to the Administrators group on the stand-
alone primary site server.
To successfully expand the stand-alone primary site, the computer account of the new CAS needs
Administrator permissions on the stand-alone primary site. This account requires these permissions only
during site expansion. When site expansion finishes, you can remove the account from the user group on the
primary site.
Installation account permissions
The user account that runs Configuration Manager setup to install the new CAS needs role-based administration
permissions at the stand-alone primary site.
For the user account that installs a CAS as part of a site expansion, add them to the proper role at the stand-
alone primary site. Use the built-in Full Administrator or Infrastructure Administrator roles.
For more information including the complete list of required permissions, see Site installation account.
Top-level site roles
Before you expand the site, uninstall the following site system roles from the stand-alone primary site:
Asset Intelligence sync point
Endpoint protection point
Service connection point
Configuration Manager only supports these roles at the top-level site of the hierarchy. Uninstall these site
system roles before you expand the stand-alone primary site. After you expand the site, reinstall these site
system roles at the CAS.
All other site system roles can remain installed at the primary site.
Open the SQL Server Service Broker port
The network port must be open for the SQL Server Service Broker (SSB) between the stand-alone primary site
and the server for the CAS.
To successfully replicate data between a CAS and a primary site, Configuration Manager requires an open port
between the two sites for SSB to use. When you install a CAS and expand a stand-alone primary site, the
prerequisite check doesn't verify that the port you specify for the SSB is open on the primary site.
Known issues with Azure services
After you expand the site, you need to reconfigure the following Azure services with Configuration Manager:
Log Analytics
Microsoft Store for Business
Cloud management gateway
Tenant attach
The easiest method is to renew the Azure Active Directory tenant secret key. For more information, see Renew
secret key.
Instead of renewing the secret key, remove and then recreate the connection to that service.
Secondary sites
The following prerequisites are for installing secondary sites:
The necessary Windows Server roles, features, and Windows components must be installed. For more
information, see Site system prerequisites.
The administrator who configures the installation of the secondary site in the Configuration Manager
console needs role-based administration permissions that are equivalent to the security role of
Infrastructure Administrator or Full Administrator .
Add the computer account of the parent primary site to the Administrators group on the secondary site
server.
When the secondary site uses a previously installed instance of SQL Server to host the secondary site
database:
The computer account of the parent primary site needs sysadmin permissions on the instance of
SQL Server on the secondary site server.
The Local System account of the secondary site server computer needs sysadmin permissions
on the instance of SQL Server on the secondary site server.
IMPORTANT
When Configuration Manager setup finishes, both accounts still need sysadmin permissions to SQL
Server. Don't remove the sysadmin permissions from these accounts.
The secondary site server must meet all prerequisite configurations. These configurations include SQL
Server and the default site system roles of the management point and distribution point.
Next steps
After you've confirmed the prerequisites, you're ready to run setup. For more information, see Use the Setup
Wizard to install Configuration Manager sites.
Use the Setup Wizard to install Configuration
Manager sites
2/16/2022 • 20 minutes to read • Edit Online
TIP
If you need assistance with site installation, see the Support options and community resources. For example, the
Microsoft Q&A forum for Configuration Manager site and client deployment.
NOTE
When you install a CAS to expand on a stand-alone primary site, or install a new child primary site in an existing
hierarchy, use installation media (source files) that match the version of the existing site or sites. If you've installed
in-console updates that have changed the version of the previously installed sites, don't use the original
installation media. Instead, use source files from the CD.Latest folder of an updated site. Configuration Manager
requires you to use source files that match the version of the existing site that your new site will connect to.
TIP
Typically, you only select the option Use typical installation options for a stand-alone primar y
site when you want to install a stand-alone primary site in a test environment. When you select this
option, setup does the following actions:
Automatically configures the site as a stand-alone primary site.
Uses a default installation path.
Uses a local installation of the default instance of SQL Server for the site database.
Installs a management point and a distribution point on the site server computer.
Configures the site with English and the display language of the OS on the primary site server if it
matches one of the languages that Configuration Manager supports.
NOTE
Microsoft doesn't validate the expiration date that you entered and doesn't use this date for license
validation. You can use it as a reminder of your expiration date. This date is useful because Configuration
Manager periodically checks for new software updates offered online. Your software assurance license
status should be current so that you're eligible to use these additional updates.
TIP
If you use previously downloaded files, verify that the path to the download folder contains the most
recent version of the files.
8. On the Ser ver Language Selection page, select the languages that are available for the Configuration
Manager console and for reports. The wizard selects English by default and you can't remove it. For more
information, see Language packs.
9. On the Client Language Selection page, select the languages that are available to client computers.
Also specify whether to enable all client languages for mobile device clients. The wizard selects English by
default and you can't remove it.
IMPORTANT
When you use a CAS, make sure that client languages you configure at the CAS include all client languages that
you configure at each child primary site. Clients that install from a distribution point have access to the client
languages from the top-tier site, while clients that install from a management point have access to the client
languages from their assigned primary site.
10. On the Site and Installation Settings page, specify the following settings for the new site that you're
installing:
Site code : Each site code in a hierarchy must be unique. Use three alpha-numeric characters: A
through Z and 0 through 9 . Because the site code is used in folder names, don't use the
following Windows-reserved names:
AUX
CON
NUL
PRN
SMS
NOTE
Setup doesn't verify whether the site code that you specify is already in use, or if it's a reserved name.
Site name : Each site requires this friendly name, which can help you identify the site.
Installation folder : This folder is the path to the Configuration Manager installation. You can't
change the location after the site installs. The path can't contain Unicode characters or trailing
spaces.
NOTE
Consider whether you want to use the default installation folder. If you use the default OS partition in a
production environment, you may experience the following issues in the future:
If Configuration Manager uses the additional free disk space on the OS partition, neither Windows or
Configuration Manager will operate properly. If you install Configuration Manager on a separate
partition, its disk consumption won't impact the OS.
Configuration Manager performance is better with a fast disk. Some server designs don't optimize the
OS disk for speed.
You can service, restore, or reinstall the OS without impacting your Configuration Manager installation.
11. On the Site Installation page, use the following option that matches your scenario:
I'm installing a CAS:
On the Central Administration Site Installation page, select Install as the first site in a
new hierarchy , and then choose Next to continue.
I'm expanding a stand-alone primary into a hierarchy with a CAS:
On the Central Administration Site Installation page, select Expand an existing stand-
alone primar y into a hierarchy . Then specify the FQDN of the stand-alone primary site server,
and choose Next to continue.
The media that you use to install the new CAS must match the version of the primary site.
I'm installing a stand-alone primary site:
On the Primar y Site Installation page, select Install the primar y site as a stand-alone site ,
and then choose Next .
I'm installing a child primary site:
On the Primar y Site Installation page, select Join the primar y site to an existing
hierarchy . Then specify the FQDN for the CAS, and choose Next .
12. On the Database Information page, specify the following information:
SQL Ser ver name (FQDN) : By default, this value is set to the site server computer.
If you use a custom port, add that port to the FQDN of the SQL Server. Follow the FQDN of the
SQL Server with a comma and then the port number. For example, for server
SQLSer ver1.fabrikam.com , use the following string to specify custom port 1551 :
SQLServer1.fabrikam.com,1551
Instance name : By default, this value is blank. It uses the default instance of SQL Server on the
site server computer.
Database name : By default, this value is set to CM_<Sitecode> . You can customize this value.
Ser vice Broker Por t : By default, this value is set to use the default SQL Server Service Broker
(SSB) port of 4022. SQL Server uses it to communicate directly to the site database at other sites.
13. On the second Database Information page, you can specify custom locations for the SQL Server data
file and the SQL Server log file for the site database:
By default, it uses the default file locations for SQL Server.
When you use a SQL Server Always On failover cluster instance, the option to specify custom file
locations isn't available.
The prerequisite checker doesn't run a check for free disk space for custom file locations.
14. On the SMS Provider Settings page, specify the FQDN for the server where you want to install the
SMS Provider.
By default, it specifies the site server.
After the site installs, you can configure more SMS Providers. For more information, see Plan for
the SMS Provider.
15. On the Client Communication Settings page, choose how clients will communicate with site systems.
The more secure option is to require all site systems to use HTTPS. Otherwise, you individually configure
the communication method for each site system role.
When you select All site system roles accept only HTTPS communication from clients , the client
computer must have a valid PKI certificate for client authentication. For more information, see PKI
certificate requirements.
NOTE
This step only applies when you install a primary site. If you're installing a CAS, skip this step.
16. On the Site System Roles page, choose whether to install a management point or distribution point.
For each role that you choose to have installed by Setup:
NOTE
This step only applies when you install a primary site. If you're installing a CAS, skip this step.
Enter the FQDN for the server that will host the role. Then choose the client connection method
that the server will support: HTTP or HTTPS.
If you selected All site system roles accept only HTTPS communication from clients on
the previous page, the wizard automatically configures the client connection settings for HTTPS.
You can't change this setting unless you go back to the previous page.
NOTE
To install site system roles, Setup uses the site system installation account . By default, it uses the primary
site's computer account. This account must be a local administrator on the remote computer to install the role. If
this account lacks the required permissions, don't install the roles during Setup. After you configure additional
accounts to use as site system installation accounts, install the roles from the Configuration Manager console. For
more information, see Accounts.
17. On the Usage Data page, review the information about data that Microsoft collects, and then choose
Next . For more information, see Diagnostics and usage data.
18. The Ser vice Connection Point Setup page is only available when you're installing a stand-alone
primary site or a CAS.
NOTE
If you're installing a child primary site, skip this step.
If you're installing a CAS as part of a site expansion scenario, and the stand-alone primary site already
has this role, first uninstall it from the stand-alone primary site. Configuration Manager can only have
one instance of the service connection point in a hierarchy. It's only supported at the top-tier site of the
hierarchy.
After you select a configuration for the Ser vice Connection Point , choose Next . After Setup completes,
you can change this configuration from the Configuration Manager console. For more information, see
About the service connection point.
19. On the Settings Summar y page, review the setting that you've selected. When you're ready, choose
Next to start the Prerequisite Checker.
20. On the Prerequisite Installation Check page, it lists any problems that the checker can identify.
When the Prerequisite Checker finds a problem, choose an item in the list for details about how to
resolve the problem.
Before you can continue to install the site, resolve any Failed items. Try to resolve all Warning
items, but they don't block installation.
After you resolve any issues, choose Run Check to rerun the Prerequisite Checker.
When the Prerequisite Checker runs, and no checks receive a Failed status, you can choose Begin
Install to start the site installation.
TIP
In addition to the feedback that the wizard provides, you can find additional information about prerequisite issues
in the ConfigMgrPrereq.log file. It's in the root of the system drive on the server. For more information, see List
of prerequisite checks.
21. On the Installation page, Setup displays the installation status. When the core site server installation is
complete, you can Close the installation wizard. When you close the wizard, the installation and initial
site configurations continue in the background.
You can connect a Configuration Manager console to the site before Setup is complete. This
console connects as read-only, and lets you view objects and settings, but you can't modify
anything.
After Setup completes, you can connect a console to edit objects and settings.
Starting in Configuration Manager version 2010, if setup fails, you can Repor t update error to
Microsoft . For more information, see Report setup and upgrade failures to Microsoft.
NOTE
Setup doesn't verify whether the site code that you specify is already in use, or if it's a reserved name.
Site ser ver name : This value is the FQDN of the server for the new secondary site.
Site name : Each site requires this friendly name, which can help you identify the site in the
console.
Installation folder : This folder is the path to the Configuration Manager installation. You can't
change the location after the site installs. The path can't contain Unicode characters or trailing
spaces.
IMPORTANT
After you specify details on this page, you can choose Summar y to skip to the end of the wizard. This action uses
the default settings for the remainder of the secondary site options.
Only use this option when you're familiar with the default settings in this wizard, and they're the settings
you want to use.
When you use the default settings, boundary groups aren't associated with the distribution point. Until
you configure boundary groups that include the secondary site server, clients won't use the distribution
point that's installed on this secondary site as a content source location.
5. On the Installation Source Files page, choose how the secondary site server gets the source files to
install the site.
When you use CD.Latest source files that are shared on the network or copied locally to the target
secondary site server:
The CD.Latest source file location includes a folder named Redist . Move this Redist folder as a
subfolder under the SMSSETUP folder.
Copy the following files from the Redist folder to the SMSSETUP\BIN\X64 folder:
SharedManagementObjects.msi
SQLSysClrTypes.msi
sqlncli.msi
If any of the files from Redist aren't available, Setup fails to install the secondary site.
The computer account of the secondary site server needs Read permissions to the source file
folder and share.
6. On the SQL Ser ver Settings page, specify the version of SQL Server to use:
NOTE
Setup doesn't validate the information that you enter on this page until it starts the installation. Before you
continue, verify these settings.
Install and configure a local copy of SQL Express on the secondar y site computer
SQL Ser ver Ser vice por t : Specify the SQL Server service port for SQL Server Express to
use. The service port is typically configured to use TCP port 1433, but you can configure
another port.
SQL Ser ver Broker por t : Specify the SQL Server Service Broker (SSB) port for SQL
Server Express to use. The Service Broker is typically configured to use TCP port 4022, but
you can configure a different port. Specify a valid port that no other site or service is using,
and that the firewall doesn't block.
Use an existing SQL Ser ver instance
SQL Ser ver FQDN : Review the FQDN for the computer running SQL Server. Use a local
server running SQL Server to host the secondary site database, and you can't modify this
setting.
SQL Ser ver instance : Specify the instance of SQL Server to use as the secondary site
database. Leave this option blank to use the default instance.
ConfigMgr site database name : Specify the name to use for the secondary site
database.
SQL Ser ver Broker por t : Specify the SQL Server Service Broker (SSB) port for SQL
Server to use. Specify a valid port that no other site or service is using, and that the firewall
doesn't block.
TIP
For a list of the SQL Server versions that Configuration Manager supports, see Supported SQL Server versions.
7. On the Distribution Point page, configure settings for the distribution point that Setup will install on
the secondary site server.
Required settings:
Specify how client devices communicate with the distribution point : Choose
between HTTP and HTTPS.
Create a self-signed cer tificate or impor t a PKI client cer tificate : Choose between
using a self-signed certificate or importing a certificate from your PKI. A self-signed
certificate lets you also allow anonymous connections from Configuration Manager clients
to the content library. The certificate is used to authenticate the distribution point to a
management point before the distribution point sends status messages. For more
information, see PKI certificate requirements.
Optional settings:
Install and configure IIS if required by Configuration Manager : Select this setting to
let Configuration Manager install and configure Internet Information Services (IIS) on the
server. Configuration Manager only installs IIS if it's not already installed on the server. IIS is
required on all distribution points.
NOTE
Although this setting is optional, IIS is required to add the distribution point role.
TIP
When you install more than one secondary site at a time, the Prerequisite Checker runs against a single site at a
time. It finishes a site before it starts to check the next site.
Next steps
Configure sites and hierarchies
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
Install consoles
Release notes
Use a command line to install Configuration
Manager sites
2/16/2022 • 3 minutes to read • Edit Online
TIP
You can also install the Configuration Manager client and console from the command prompt. For more information, see
the following articles:
Install consoles
Deploy clients to Windows computers
NOTE
You can't use the unattended script file to upgrade an evaluation site to a licensed installation of Configuration Manager.
To use an answer file with setup, first configure the script file with required keys and values. For an unattended
installation of a CAS or primary site, the script file requires the following sections:
Identification
Options
SQLConfigOptions
HierarchyExpansionOption
CloudConnectorOptions
SABranchOptions
Then run setup with the command line-option /SCRIPT and specify a script file.
To recover a site, the script file also uses the RecoveryOptions section.
For a list of keys and values to use in an unattended installation script file, see Unattended setup script file keys.
NOTE
When you run setup from the CD.Latest folder for a scripted install or recovery, include the CDLatest key with a value
of 1 . This value isn't supported with installation media from the Microsoft Volume License site. For more information on
how to use this key name in the script file, see Command-line options.
TIP
You can also manually create the script file from a plain-text editor like Notepad.
For more information values to use in the language script file, see Manage languages.
For more information on languages in Configuration Manager, see Language packs.
Next steps
Command-line options for setup
Unattended setup script file keys
Install the Configuration Manager console
Command-line options for Configuration Manager
setup
2/16/2022 • 2 minutes to read • Edit Online
TIP
You can also use setupwpf.exe from the same folder, but it doesn't include basic prerequisite checks.
/DEINSTALL
Uninstall the site. Run setup from the site server computer.
/DONTSTARTSITECOMP
Install a site, but prevent the Site Component Manager service from starting. Until the Site Component Manager
service starts, the site isn't active. The Site Component Manager is responsible for installing and starting the
SMS_Executive service, and for other processes at the site. After the site install is finished, when you start the
Site Component Manager service, it installs the SMS_Executive service and other processes that are necessary
for the site to operate.
/HIDDEN
Hide the user interface during setup. Only use this option with the /SCRIPT option. The unattended script file
must provide all required options or setup fails.
/NOUSERINPUT
Disable user input during setup, but display the setup wizard. Only use this option with the /SCRIPT option. The
unattended script file must provide all required options or setup fails.
/RESETSITE
Run a site reset. This action resets the database and service accounts for the site. For more information, see Run
a site reset.
/TESTDBUPGRADE
Run a test on a backup of the site database to make sure that the database can upgrade.
IMPORTANT
The test upgrade is no longer a required or recommend step for most sites.
If your database is suspect, or is modified by customizations not explicitly supported by Configuration Manager, continue
to use this process.
Don't run this command-line option on your production site database. Running this command-line option on your
production site database upgrades the site database and could render your site inoperable.
Provide the instance name and database name for the site database. If you specify only the database name,
setup uses the default instance name.
/TESTDBUPGRADE <Instance name>\<Database name>
/TESTDBUPGRADE CM_ABC
/TESTDBUPGRADE Named\CM_ABC
For more information, see Test the database upgrade when installing an update.
/UPGRADE
Run an unattended upgrade of a site. Specify the product key including the dash ( - ) delimiters. Also specify the
path to the previously downloaded setup prerequisite files.
For example: /UPGRADE xxxxx-xxxxx-xxxxx-xxxxx-xxxxx C:\Setup\prereqs
For more information about setup prerequisite files, see Setup Downloader.
/SCRIPT
Run an unattended installation. Use a setup initialization file with this option. For more information about how
to run setup unattended, see Install sites using a command line. For more information on the script file keys and
values, see Unattended setup script file keys.
For example: /SCRIPT C:\Setup\setup.ini
/SDKINST
Install the SMS Provider on the specified server. Provide the fully qualified domain name (FQDN) for the SMS
Provider computer. For more information about the SMS Provider, see Plan for the SMS Provider.
For example: /SDKINST cm02.contoso.com
/SDKDEINST
Uninstall the SMS Provider on the specified computer. Provide the FQDN for the SMS Provider computer.
For example: /SDKDEINST cm01.contoso.com
/MANAGELANGS
Manage the languages that are installed at a previously installed site. Provide the location for the language
script file that contains the language settings. For more information, see the Keys to manage languages.
For example: /MANAGELANGS C:\Setup\langsetup.ini
Next steps
Unattended setup script file keys
Unattended setup script file keys
2/16/2022 • 12 minutes to read • Edit Online
Supported actions
A script is primarily defined by the Action key in the Identification section. The following list includes all of the
currently supported actions for running setup unattended:
InstallCAS : Install a central administration site (CAS)
InstallPrimarySite : Install a primary site
ManageLanguages : Add or remove client and server languages
RecoverPrimarySite : Recovery a primary site
RecoverCCAR : Recover a CAS
Install a site
Identification section for site install
Depending upon the type of site you're installing, include the following keys with the appropriate values in the
Identification section:
CDLatest Yes 2 1 : Setup runs from When you run setup from
CD.Latest the CD.Latest folder,
include this key and value.
This value tells setup that
you're using media from
CD.Latest .
When you install a site, you can also specify the keys to manage languages, such as AddSer verLanguages or
AddClientLanguages . For more information, see Options section for languages.
The following keys in the Options section are specific to a primary site:
Manage languages
Identification section for languages
Include the following key in the Identification section to manage languages:
English ( ENG ) is available by default. You don't have to add it, and you can't remove it.
Recover a site
Identification section for site recovery
Depending upon the type of site you're recovering, include the following keys with the appropriate values in the
Identification section:
CDLatest Yes 3 1 : Setup runs from When you run setup from
CD.Latest the CD.Latest folder, include
this key and value. This
value tells setup that you're
using media from CD.Latest.
K EY N A M E REQ UIRED C O M M EN T
ProductID Yes
SiteName No
SMSInstallDir Yes
PrerequisiteComp Yes
PrerequisitePath Yes
JoinCEIP Yes
K EY N A M E REQ UIRED C O M M EN T
SQLDataFilePath No
SQLLogFilePath No
K EY N A M E REQ UIRED C O M M EN T
CloudConnector Yes
K EY N A M E REQ UIRED C O M M EN T
CASRetryInterval No
WaitForCASTimeout No
Examples
Example script to install a primary site
[Identification]
Action=InstallPrimarySite
CDLatest=1
[Options]
ProductID=Eval
SiteCode=XYZ
SiteName=Contoso eval site
SMSInstallDir=D:\Program Files\Microsoft Configuration Manager
SDKServer=cmsite.contoso.com
PrerequisiteComp=0
PrerequisitePath=C:\Sources\Redist
AdminConsole=1
JoinCEIP=0
ManagementPoint=cmsite.contoso.com
ManagementPointProtocol=HTTP
DistributionPoint=cmsite.contoso.com
DistributionPointProtocol=HTTP
DistributionPointInstallIIS=1
RoleCommunicationProtocol=HTTPorHTTPS
ClientsUsePKICertificate=0
MobileDeviceLanguage=0
[SQLConfigOptions]
SQLServerName=cmsql.contoso.com
SQLServerPort=1433
DatabaseName=CM_XYZ
SQLSSBPort=4022
SQLDataFilePath=E:\Program Files\Microsoft SQL Server\MSSQL15.MSSQLSERVER\MSSQL\DATA\
SQLLogFilePath=E:\Program Files\Microsoft SQL Server\MSSQL15.MSSQLSERVER\MSSQL\DATA\
[CloudConnectorOptions]
CloudConnector=1
CloudConnectorServer=cmsite.contoso.com
UseProxy=0
[SABranchOptions]
SAActive=1
CurrentBranch=1
Install the Configuration Manager console
2/16/2022 • 3 minutes to read • Edit Online
Prerequisites
Supported OS versions for Configuration Manager consoles
You have local Administrator rights on the target computer for the console.
You have Read permissions to the location of the console installation files.
.NET version requirements
Starting in version 2107, the console requires Microsoft .NET Framework version 4.6.2, but version 4.8 is
recommended. If you install the console on other devices, make sure to update .NET. If the device doesn't already
have it, the console setup doesn't install this prerequisite.
Starting in version 2103, the ConfigurationManager PowerShell module requires Microsoft .NET version 4.7.2 or
later.
NOTE
.NET Framework version 4.6.2 is preinstalled with Windows Server 2016 and Windows 10 version 1607. Later versions of
Windows are preinstalled with a later version of the .NET Framework.
.NET Framework version 4.8 isn't supported on some OS versions, such as Windows 10 2015 LTSB.
For more information, see .NET Framework system requirements.
Source paths
Decide which source path to use:
ConsoleSetup folder in the installation path on the site server: \Tools\ConsoleSetup
When you install a site server, it copies the console installation files and supported language packs for the
site to the Tools\ConsoleSetup subfolder. Optionally, you can copy the ConsoleSetup folder to an
alternate location to start the installation. When you update the site, it always keeps its local version up to
date.
Configuration Manager installation media: \SMSSETUP\BIN\I386
Installing the Configuration Manager console from the installation media always installs the English
version. This behavior happens even if the site server supports different languages, or the target
computer's OS is set to a different language.
When possible, start the console installer from the ConsoleSetup folder rather than from the source media.
IMPORTANT
Don't install the console using the CD.Latest source files. It's an unsupported scenario, and may cause problems with
the console installation. For more information, see The CD.Latest folder.
If you create a package for installing the console on other computers, make sure the package includes the
following files:
ConsoleSetup.exe
AdminConsole.msi
ConfigMgr.AC_Extension.i386.cab
ConfigMgr.AC_Extension.amd64.cab
IMPORTANT
Always install the console by using ConsoleSetup.exe . Although you can install the Configuration Manager
console by running AdminConsole.msi, this method doesn't run prerequisites or dependency checks. The
installation might not install correctly.
Silent uninstall
ConsoleSetup.exe /uninstall /q
Next steps
An administrator sees objects in the console based on the permissions assigned to their user account. For more
information, see Fundamentals of role-based administration.
For more information on the fundamentals of navigating the Configuration Manager console, see How to use
the console.
Upgrade an evaluation installation of Configuration
Manager to a full installation
2/16/2022 • 2 minutes to read • Edit Online
NOTE
When you connect a Configuration Manager console to an evaluation installation of Configuration Manager, the window
title bar displays the number of days that remain until it expires. The number of days in the window title doesn't
automatically refresh. It only updates when you make a new connection to a site.
You can upgrade the following sites that run an evaluation installation:
Central administration site (CAS)
Primary site
Configuration Manager doesn't consider secondary sites as evaluation installations. So after you upgrade a
primary parent site to a full installation, you don't need to modify a secondary site.
Prerequisites
To upgrade an evaluation version to a licensed version, you need the following requirements:
A valid product license key to use during the upgrade.
Administrator rights on the site server.
Process
1. On the site server, run .\BIN\X64\Setup.exe from the Configuration Manager installation folder. Use
this copy of Setup because site maintenance options aren't available when you run Setup from source
media.
2. On the Before You Begin page, select Next .
3. On the Getting Star ted page, select Perform site maintenance or reset the Site , and then select
Next .
4. On the Site Maintenance page, select Upgrade the evaluation edition to a licensed edition . Then
enter a valid product key, and select Next .
5. On the Microsoft Software License Terms page, read and accept the license terms, and then select
Next .
6. On the Configuration page, select Close to complete the wizard.
NOTE
Until you reconnect the console to the site, the title bar might indicate that the site is still an evaluation version.
Next steps
Configure sites and hierarchies
Upgrade to Configuration Manager current branch
2/16/2022 • 18 minutes to read • Edit Online
TIP
When managing Configuration Manager site and hierarchy infrastructure, the terms upgrade, update, and install are used
to describe three separate concepts. To learn how each term is used, see About upgrade, update, and install.
TIP
When you upgrade from a System Center 2012 Configuration Manager version to current branch, you might be able to
streamline your upgrade process. For more information, see the following:
Baseline and update versions
The CD.Latest folder
If you previously installed Configuration Manager Evaluation version, you can use the upgrade process to
convert the site to the full version. For more information, see Upgrade an evaluation installation of
Configuration Manager to a full installation.
Unsupported paths
The following paths aren't supported:
It's not supported to upgrade a technical preview branch to a fully licensed installation. A technical
preview version can only upgrade to a later version of the technical preview.
Migration from a technical preview to a fully licensed version isn't supported.
Upgrade checklists
The following checklists can help you plan a successful upgrade to Configuration Manager.
Before you upgrade
Review these steps before you upgrade to Configuration Manager.
Review your System Center 2012 Configuration Manager environment
Resolve issues as detailed in the following Microsoft Support article: Configuration Manager clients reinstall
every five hours because of a recurring retry task and may cause an inadvertent client upgrade.
Make sure your environment meets the supported configurations
Review the server OS version in use to host site system roles:
Some older operating systems supported by System Center 2012 Configuration Manager aren't
supported by Configuration Manager current branch. Before the upgrade, remove site system
roles on those OS versions. For more information, see Supported operating systems for site
system servers.
The prerequisite checker for Configuration Manager doesn't verify the prerequisites for site system
roles on the site server or on remote site systems.
Review required prerequisites for each computer that hosts a site system role. For example, to deploy an
OS, Configuration Manager uses the Windows Assessment and Deployment Kit (ADK). Before you run
Setup, download and install the Windows ADK on the site server and on each computer that runs an
instance of the SMS Provider.
For more information about supported platforms and prerequisite configurations, see Supported
configurations.
For more information about using the Windows ADK with Configuration Manager, see Infrastructure
requirements for OS deployment.
Review the site and hierarchy status and verify that there are no unresolved issues
Before you upgrade a site, resolve all operational issues for the following components:
Site server
Site database server
Site system roles on remote computers
A site upgrade can fail because of existing operational problems.
Install all applicable critical updates for operating systems on computers that host the site, the site database server, and remote
site system roles
Before you upgrade a site, install any critical software updates for each applicable site system. If an update that
you install requires a restart, restart the applicable computers before you start the upgrade.
Uninstall the site system roles not supported by Configuration Manager
The following site system roles are no longer used in Configuration Manager. Uninstall them before you
upgrade from System Center 2012 Configuration Manager:
Out of Band Management point
System Health Validator point
Application catalog website point and web service point
Disable database replicas for management points at primary sites
Configuration Manager can't upgrade a primary site that has a database replica for management points. Disable
database replication before you:
Create a backup of the site database to test the database upgrade
Upgrade the production site to Configuration Manager current branch
For more information, see the following articles:
System Center 2012 Configuration Manager: Configure database replicas for management points
Configuration Manager, current branch: Database replicas for management points
Reconfigure software update points that use NLB
Configuration Manager can't upgrade a site that uses a Network Load Balancing (NLB) cluster to host software
update points.
If you use NLB clusters for software update points, use PowerShell to remove the NLB cluster. (Beginning with
System Center 2012 Configuration Manager SP1, there was no option in the Configuration Manager console to
configure an NLB cluster.)
Disable all site maintenance tasks at each site during its upgrade
Before you upgrade to Configuration Manager, disable any site maintenance tasks that might run during the
time the upgrade process is active. This list includes but isn't limited to the following tasks:
Backup Site Server
Delete Aged Client Operations
Delete Aged Discovery Data
If a site database maintenance task runs during the upgrade process, the site upgrade can fail.
Before you disable a task, record the schedule of the task so you can restore its configuration after the site
upgrade completes.
For more information about site maintenance tasks, see the following articles:
System Center 2012 Configuration Manager: Planning for site operations
Configuration Manager, current branch: Reference for maintenance tasks
Run setup prerequisite checker
Before you upgrade a site, run the Prerequisite Checker independently from setup to validate that your site
meets the prerequisites. Later, when you upgrade the site, prerequisite checker runs again.
The independent prerequisite check evaluates the site for upgrade to both the current branch and the long-term
servicing branch (LTSB) of Configuration Manager. Because some features aren't supported by the LTSB, you
might see entries in the ConfigMgrPrereq.log that are like the following examples:
INFO: The site is a LTSB edition.
Unsupported site system role 'Asset Intelligence synchronization point' for the LTSB edition; Error;
Configuration Manager has detected that the 'Asset Intelligence synchronization point' is installed.
Asset Intelligence is not supported on the LTSB edition. You must uninstall the Asset Intelligence
synchronization point site system role before you can continue.
If you plan to upgrade to the current branch, errors for the LTSB edition can be safely ignored. They only apply if
you plan to upgrade to the LTSB.
Later, when you run Configuration Manager setup to do the upgrade, the prerequisite check runs again. It
evaluates your site based on the branch of Configuration Manager you choose to install (current branch, or
LTSB). If you choose to upgrade to the current branch, it doesn't run the check for features that aren't supported
by the LTSB.
For more information, see the Prerequisite checker and List of prerequisite checks.
Download prerequisite files and redistributable files for Configuration Manager
Use Setup Downloader to download prerequisite redistributable files, language packs, and the latest product
updates for Configuration Manager.
For information, see Setup Downloader.
Plan to manage server and client languages
When you upgrade a site, the site upgrade installs only the language pack versions you select during the
upgrade.
Setup reviews the current language configuration of your site. It then identifies the language packs that
are available in the folder where you store previously downloaded prerequisite files.
You can affirm the selection of the current server and client language packs, or change the selections to
add or remove support for languages.
Only language packs that are available when you run Setup can be selected.
NOTE
You can't use the language packs from System Center 2012 Configuration Manager to enable languages for a
Configuration Manager current branch site.
TIP
Close each open console before you start the upgrade.
TIP
When you upgrade the top-level site of a hierarchy, the client installation package on each distribution point in the
hierarchy is also updated. When you upgrade a primary site, the client upgrade package that's available from that primary
site is updated.
For more information, see How to upgrade clients for Windows computers.
3. Read the information on the Before You Begin page, and then select Next .
4. On the Getting Star ted page, select Upgrade this Configuration Manager site , and then select
Next .
5. On the Product Key page:
If you previously installed Configuration Manager Evaluation version, you can select Install the
licensed edition of this product . Then enter your product key for the full installation of Configuration
Manager. This action converts the site to the full version. For more information, see Upgrade an
evaluation installation of Configuration Manager to a full installation.
You can specify the Software Assurance expiration date of your licensing agreement. This date is a
convenient reminder for you of that date. If you don't enter this value during setup, you can specify it
later in the console.
NOTE
Microsoft doesn't validate this expiration date, and doesn't use this date for license validation. It's a reminder to
you of your expiration date. Configuration Manager periodically checks for new software updates offered online.
To be eligible to install these updates, your license status should be current.
NOTE
When you use previously downloaded files, verify that the path to the download folder contains the most recent
version of the files.
9. On the Ser ver Language Selection page, view the list of languages that are currently installed for the
site. Select other languages that are available at this site for the Configuration Manager console and for
reports. You can also clear languages that you no longer want to support at this site. By default, English is
selected and can't be removed.
IMPORTANT
Each version of Configuration Manager can't use language packs from a prior version. To enable support for a
language at a site that you upgrade, use the version of the language pack for the new version. For example,
during upgrade from System Center 2012 Configuration Manager to Configuration Manager current branch, if
the current branch version of a language pack isn't available with the prerequisite files you download, you can't
install support for that language.
10. On the Client Language Selection page, view the list of languages that are currently installed for the
site. Select other languages that are available at this site for client computers, or clear languages that you
no longer want to support at this site. Specify whether to enable all client languages for mobile device
clients, and then select Next . By default, English is selected and can't be removed.
11. On the Settings Summar y page, review the configuration. When you're ready, select Next to start the
Prerequisite Checker. This tool verifies server readiness for the upgrade of the site. For more information,
see Prerequisite Checker.
12. On the Prerequisite Installation Check page, if there are no problems listed, select Next to upgrade
the site and site system roles.
If the Prerequisite Checker finds a problem, select the item on the list for details about how to resolve it.
Resolve all items in the list that have an Error status before you continue Setup. For items with a
Warning status, resolve as many as possible in your environment. After you resolve the issues, select
Run Check to restart prerequisite checking. For more detailed information, open the
ConfigMgrPrereq.log file in the root of the system drive. The log file can contain additional information
that's not displayed in the user interface. For a list of installation prerequisite rules and descriptions, see
Prerequisite checks.
On the Upgrade page, Setup displays the overall progress status. When Setup completes the core site server
and site system installation, you can close the wizard. Site configuration continues in the background.
Upgrade a secondary site
1. Verify that the administrative user that runs Setup has the following security rights:
Local Administrator rights on the secondary site server
Infrastructure Administrator or Full Administrator security role on the parent primary site
System administrator (SA ) rights on the site database of the secondary site
2. In the Configuration Manager console, go to the Administration workspace, expand Site
Configuration , and then select the Sites node.
3. Select the secondary site that you want to upgrade. On the Home tab of the ribbon, in the Site group,
select Upgrade .
4. Select Yes to confirm the decision, and to start the upgrade of the secondary site.
The secondary site upgrade runs in the background. After the upgrade is complete, confirm the status in the
Configuration Manager console. Select the secondary site server, then on the Home tab of the ribbon, in the
Site group, select Show Install Status .
Post-upgrade tasks
After you upgrade a site, you might have to complete other tasks to finish the upgrade or reconfigure the site.
These tasks can include the following items:
Upgrade Configuration Manager clients
Upgrade Configuration Manager consoles
Re-enable database replicas for management points
Restore settings for Configuration Manager functionality that you use and that doesn't persist after the
upgrade
Next steps
Scenarios to streamline your installation of Configuration Manager current branch
Scenarios to streamline your installation of
Configuration Manager
2/16/2022 • 4 minutes to read • Edit Online
A C T IO N DETA IL S
Publish site data to Active Directory Domain Services Make it easy for clients to find services and efficiently use
site resources.
Configure a service connection point Plan to install and configure the service connection point at
the top-level site of your hierarchy. For more information,
see About the service connection point.
Add site system roles Install one or more additional site system roles for individual
sites. For more information, see Add site system roles.
Configure site boundaries and boundary groups Specify boundaries that define network locations on your
intranet that can contain devices that you want to manage.
Then configure boundary groups so that clients at those
network locations can find Configuration Manager resources.
For more information, see Define site boundaries and
boundary groups.
Configure distribution point groups Configure logical groups of distribution points to make
managing deployments easier. For more information, see
Manage distribution point groups.
A C T IO N DETA IL S
Add redundancy and capacity for administrators Install additional SMS Providers and Configuration Manager
consoles to expand capacity for administrators to manage
your infrastructure:
Configure site components Configure site components at each site to modify the
behavior of site system roles and site status reporting. For
more information, see Site components.
Create custom collections Using information that the site discovers about devices and
users, create custom collections of objects to simplify future
management tasks. For more information, see How to create
collections.
Configure settings to manage high-risk deployments Configure settings at a site to warn administrators when
they create a high-risk deployment. For more information,
see Settings to manage high-risk deployments.
Configure database replicas for management points Configure a database replica to reduce the processor load
that's placed on the site database server by management
points as they service requests from clients. For more
information, see Database replicas for management points.
Configure a SQL Server Always On availability group Configure availability groups as high-availability and
disaster-recovery solutions for hosting the site database at
primary sites and the central administration site. For more
information, see Prepare to use a SQL Server Always On
availability group with Configuration Manager.
Modify replication between sites See Data transfers between sites to learn about the following
subjects:
Configure site servers in passive mode Starting in version 1806, configure a site server in passive
mode for each primary site and the central administration
site. This feature provides a highly available site server. For
more information, see Site server high availability.
Add site system roles for Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
TIP
If you're not familiar with the basics for site system roles or the difference between the site server, site system servers, and
site system roles, see Fundamentals of Configuration Manager.
The following articles detail procedures and related details for installing site system roles:
Install site system roles: Basic guidance about how to use the two in-console wizards to install new site
system roles.
Set up checklist for CMG: Set up a cloud management gateway (CMG) to manage clients on the internet.
Install site system roles for on-premises mobile device management (MDM): Set up your site system
roles to support managing modern devices by using Configuration Manager on-premises MDM.
Configuration options for site system roles: Some site system roles support configurations that require
more details than the user interface can explain.
Remove a site system role: Guidance and procedures to remove roles from site system servers.
Install site system roles for Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
TIP
When you install a role on a remote computer, Configuration Manager adds the computer account of the remote
computer to a local group on the site server.
When you install the site on a domain controller, the group on the site server is a domain group instead of a local group.
In this case, the remote site system role doesn't immediately work. The site system server needs to restart, or you refresh
the Kerberos ticket for the remote server's computer account. For more information, see Accounts used.
Before it installs the site system role, Configuration Manager checks the destination computer to make sure it
meets the prerequisites for the selected roles.
By default, when Configuration Manager installs a site system role, it installs files on the first available NTFS-
formatted disk drive that has the most available free disk space. To prevent Configuration Manager from
installing on specific drives, before you install the site system server, create an empty file named
NO_SMS_ON_DRIVE.SMS in the root of the drive.
Configuration Manager uses the site system installation account to install roles. You specify this account
when you install the role. By default, this account is the local system account of the site server computer. You can
specify a domain user account as the site system installation account. For more information, see Accounts - Site
system installation account.
TIP
To access the site system role from the internet, make sure that you specify an internet fully qualified domain
name (FQDN).
4. On the Proxy page, if roles on this server require an internet proxy, then specify settings for a proxy
server. For more information, see Proxy server support.
5. On the System Role Selection page, select the site system roles that you want to add.
6. Complete the wizard. Additional pages may appear for specific roles. For more information, see
Configuration options for site system roles.
TIP
The Windows PowerShell cmdlet, New-CMSiteSystemSer ver , performs the same function as this procedure. For more
information, see New-CMSiteSystemServer.
TIP
To access the new site system role from the internet, make sure that you specify an internet FQDN.
4. On the Proxy page, if roles on this server require an internet proxy, then specify settings for a proxy
server. For more information, see Proxy server support.
5. On the System Role Selection page, select the site system roles that you want to add.
6. Complete the wizard. Additional pages may appear for specific roles. For more information, see
Configuration options for site system roles.
TIP
The Windows PowerShell cmdlet, New-CMSiteSystemSer ver , performs the same function as this procedure. For more
information, see New-CMSiteSystemServer.
Next steps
Configuration options for site system roles
Remove role
About the service connection point in Configuration
Manager
2/16/2022 • 6 minutes to read • Edit Online
Modes of operation
The service connection point supports two modes of operation:
Online : The service connection point automatically checks every 24 hours for updates. It downloads new
updates that are available for your current infrastructure and product version to make them available in
the Configuration Manager console.
Offline : The service connection point doesn't connect to the Microsoft cloud service. To manually import
available updates, use the service connection tool.
Change mode
If you change between online or offline modes after you install the service connection point, restart the
SMS_DMP_DOWNLOADER thread of the SMS_Executive service. Restarting this thread makes the change
become effective. To restart this thread, use the Configuration Manager Service Manager.
TIP
You can also restart the SMS_Executive service for Configuration Manager, which restarts most site components.
Alternatively, wait for a scheduled task like a site backup, which stops and restarts the SMS_Executive service for you.
To use the Configuration Manager Service Manager to restart the SMS_DMP_DOWNLOADER thread:
1. In the Configuration Manager console go to the Monitoring workspace, expand System Status , and
select the Component Status node. In the ribbon, choose Star t , and then select Configuration
Manager Ser vice Manager .
2. In the service manager navigation pane, expand the site, expand Components , and then choose the
component that you want to restart: SMS_DMP_DOWNLOADER .
3. Go to the Component menu, and choose Quer y .
4. Confirm the current status of the component. Then go to the Component menu, and choose Stop .
5. Quer y the component again to confirm that it stopped. Then choose the Star t component action to
restart it.
TIP
The service connection point uses the Microsoft Intune service when it connects to go.microsoft.com or
manage.microsoft.com . There's a known issue in which the Intune connector experiences connectivity issues if the
Baltimore CyberTrust Root Certificate isn't installed, is expired, or is corrupted on the service connection point. For more
information, see Service connection point doesn't download updates.
598 Network read timeout error Not RFC compliant, but used by
some proxy servers to indicate a
network timeout
599 Network connection timeout error Not RFC compliant, but used by
some proxy servers to indicate a
network timeout
There are also the following status messages for the SMS_SERVICE_CONNECTOR component:
M ESSA GE ID SEVERIT Y N OT ES
Install
When you run Setup to install the top-tier site of a hierarchy, you can install the service connection point.
After setup runs, or if you're reinstalling the role, use the Add Site System Roles wizard or the Create Site
System Ser ver wizard. (Only install the service connection point on the top-tier site of your hierarchy.) For
more information, see Install site system roles.
Log files
To view information about uploads to Microsoft, view the Dmpuploader.log on the server that runs the service
connection point. For download progress of updates, view the Dmpdownloader.log . For the complete list of
logs related to the service connection point, see Log files - Service connection point.
Next steps
Use the following flowcharts to understand the process flow and key log entries. This process includes update
downloads and replication of updates to other sites.
Flowchart - Download updates
Flowchart - Update replication
Configuration options for site system roles in
Configuration Manager
2/16/2022 • 4 minutes to read • Edit Online
Distribution point
For more information about how to set up the distribution point for content deployment, see Manage content
and content infrastructure.
For more information about how to set up the distribution point for PXE deployments, see Use PXE to deploy
Windows over the network.
For more information about how to set up the distribution point for multicast deployments, see Use multicast to
deploy Windows over the network.
Install and configure IIS if required by Configuration Manager
Select this option to let Configuration Manager install and set up IIS on the site system if it's not already
installed. IIS must be installed on all distribution points, and you must select this setting to continue in the
wizard.
Site system installation account
For distribution points that are installed on a site server, only the computer account of the site server is
supported for use as the site system installation account. For more information, see Accounts.
Enrollment point
Enrollment points are used to install macOS computers and enroll devices that you manage with on-premises
mobile device management. For more information, see the following articles:
How to deploy clients to Macs
How users enroll devices with on-premises MDM
Allowed connections
The HTTPS setting is automatically selected and requires a PKI certificate on the server for server authentication
to the enrollment proxy point, and encryption of data over SSL. For more information, see PKI certificate
requirements.
For an example deployment of the server certificate and information about how to configure it in IIS, see
Deploying the web server certificate for site systems that run IIS.
Enrollment proxy point
For more information about how to set up an enrollment proxy point for mobile devices, see How users enroll
devices with on-premises MDM.
Client connections
The HTTPS setting is automatically selected. It requires the following PKI certificates on the server:
For server authentication to mobile devices and Mac computers that you enroll with Configuration Manager
For encryption of data over Secure Sockets Layer (SSL)
For more information about the certificate requirements, see PKI certificate requirements.
For an example deployment of the server certificate and information about how to configure it in IIS, see
Deploying the web server certificate for site systems that run IIS.
About
Replicas are a partial copy of the site database that replicates to a separate instance of SQL Server.
Primary sites support a dedicated database replica for each management point at the site.
Secondary sites don't support database replicas.
A single database replica can be used by more than a one management point from the same site.
A SQL Server can host multiple database replicas for use by different management points so long
as each runs in a separate instance of SQL Server.
Replicas synchronize a copy of the site database on a fixed schedule from data that the site's database
server publishes for this purpose.
You can configure management points to use a replica when you install it, or at a later time. For an
existing management point, reconfigure it to use the database replica.
Regularly monitor the site database server and each database replica server to make sure that replication
occurs between them. Make sure that the performance of the database replica server is sufficient for the
site and client performance that you require.
Prerequisites
SQL Server requirements
The SQL Server that hosts the database replica has the same requirements as the site database server.
The replica server doesn't need to run the same version or edition of SQL Server as the site database
server, as long as it runs a supported version and edition of SQL Server. For more information, see
Support for SQL Server versions.
The SQL Server service on the computer that hosts the replica database must run as the System account.
Both the SQL Server that hosts the site database and that hosts a database replica must have SQL
Ser ver replication installed.
The site database must publish the database replica, and each remote database replica server must
subscribe to the published data.
Configure both SQL Servers to support a max text repl size of 2 GB. For more information and how to
configure this setting for SQL Server, see Configure the max text repl size Server Configuration Option.
Self-signed certificate
To configure a database replica, create a self-signed certificate on the database replica server. Make this
certificate available to each management point that will use that database replica server.
The certificate is automatically available to a management point that's installed on the database replica
server.
To make this certificate available to remote management points, first export the certificate. Then add it to
the Trusted People certificate store on the remote management point.
Client notification
To support client notification with a database replica for a management point, configure communication
between the site database server and the database replica server for the SQL Ser ver Ser vice Broker :
Configure each database with information about the other database.
Exchange certificates between the two databases for secure communication.
Limitations
When you configure the site to publish database replicas, use the following procedures instead of the
normal guidance:
Uninstall a site server that publishes a database replica
Move a site server database that publishes a database replica
User deployments in Software Center won't work against a management point using a SQL Server
replica.
Upgrades to Configuration Manager current branch: Before you upgrade a site, either from System
Center 2012 Configuration Manager to Configuration Manager current branch or updating Configuration
Manager current branch to the latest release, disable database replicas for management points. After
your site upgrades, you can reconfigure the database replicas for management points.
Multiple replicas on a single SQL Server: If you configure separate instances of a database replica server
to host multiple database replicas for management points, use a modified configuration script. As noted
in step 4 of the process to Configure database replicas, this action prevents overwriting the self-signed
certificate in use by previously configured database replicas on that server.
Configure
To configure a database replica, the following steps are required:
Step 1 - Configure the site database server to Publish the database replica
Step 2 - Configuring the database replica server
Step 3 - Configure management points to use the database replica
Step 4 -Configure a self-signed certificate for the database replica server
Step 5 - Configure the SQL Server Service Broker for the database replica server
Step 1 - Configure the site database server to publish the database replica
Use the following procedure as an example of how to configure the site database server to publish the database
replica. The specific steps might vary depending upon the version of Windows Server.
Do the following steps on the site database server:
1. Set the SQL Server Agent to automatically start.
2. Create a local user group with the name ConfigMgr_MPReplicaAccess . For each database replica
server that you use at this site, add its computer account to this group. This action enables those database
replica servers to synchronize with the published database replica.
NOTE
You can also create a domain group for this purpose.
NOTE
If the SQL Server Agent uses an account other than the local system account, replace SYSTEM with that account
name in the following list.
Share permissions:
SYSTEM: Change
ConfigMgr_MPReplicaAccess: Read
NTFS permissions:
SYSTEM: Full Control
ConfigMgr_MPReplicaAccess: Read , Read & execute , and List folder contents
5. Use SQL Ser ver Management Studio to connect to the site database and run the following stored
procedure as a query: spCreateMPReplicaPublication
NOTE
If you're using a domain group instead of a local group, change this SQL statement to:
EXEC spCreateMPReplicaPublication N'<DomainName>\ConfigMgr_MPReplicaAccess'
When the stored procedure completes, the site database server is configured to publish the database replica.
Step 2 - Configure the database replica server
Use the following procedure as an example of how to configure a database replica server. The specific steps
might vary depending upon the version of Windows Server.
Do the following steps on the database replica server:
1. Set the SQL Server Agent to automatic startup.
2. Use SQL Ser ver Management Studio to connect to the local server. Browse to the Replication folder,
select Local Subscriptions , and then select New Subscriptions . This action starts the New
Subscription Wizard .
a. On the Publication page, select Find SQL Ser ver Publisher . Enter the name of the site
database server, and then select Connect .
b. Select ConfigMgr_MPReplica , and then select Next .
c. On the Distribution Agent Location page, select Run each agent at its Subscriber (pull
subscriptions) , and then select Next .
d. On the Subscribers page, do one of the following actions:
Select an existing database from the database replica server to use for the database replica,
and then select OK .
Select New database to create a new database for the database replica. On the New
Database page, specify a database name, and then select OK .
e. Select Next to continue.
f. On the Distribution Agent Security page, select the properties button (...) in the Subscriber
Connection row of the dialog box. Then configure the security settings for the connection.
TIP
The properties button, (...) , is in the fourth column of the display box.
Configure the account that runs the Distribution Agent process (process account):
If the SQL Server Agent runs as local system, select Run under the SQL Ser ver Agent
ser vice account (This is not a recommended security best practice.)
If the SQL Server Agent runs by using a different account, select Run under the
following Windows account , and then configure that account. You can specify a
Windows account or a SQL Server account.
IMPORTANT
Grant the account that runs the Distribution Agent permissions to the publisher as a pull subscription. For
more information about configuring these permissions, see Distribution agent security.
TIP
This step isn't necessary for a management point that runs on the database replica server.
IMPORTANT
If you're configuring more than one database replica on a single SQL Server, for each subsequent replica you
configure, use a modified version of this script for this procedure. For more information, see Supplemental script
for additional database replicas on a single SQL Server.
# Script for creating a self-signed certificate for the local machine and configuring SQL Server to
use it.
Param($SQLInstance)
$sqlServerName = [System.Net.Dns]::GetHostByName("localhost").HostName
$sqlInstanceName = "MSSQLSERVER"
$SQLServiceName = "MSSQLSERVER"
3. On the database replica server, run the following command that applies to the configuration of your SQL
Server:
For a default instance of SQL Server: Enter the following command in the PowerShell session:
.\CreateMPReplicaCert.ps1 . When the script runs, it creates the self-signed certificate and
configures SQL Server to use the certificate.
For a named instance of SQL Server: Use PowerShell to run the following command:
.\CreateMPReplicaCert.ps1 <SQL Server instance name>
After the script completes, verify that the SQL Server Agent is running. If not, restart the SQL Server
Agent.
Configure remote management points to use the self-signed certificate of the database replica server
Do the following steps on the database replica server to export the server's self-signed certificate:
1. Go to the Star t menu, select Run , and type mmc.exe . In the empty console, select File , and then select
Add/Remove Snap-in .
2. In the Add or Remove Snap-ins dialog box, select Cer tificates from the list of Available snap-ins ,
and then select Add .
3. In the Cer tificate snap-in dialog box, select Computer account , and then select Next .
4. In the Select Computer dialog box, make sure that Local computer : (the computer this console is
running on) is selected, and then select Finish .
5. In the Add or Remove Snap-ins dialog box, select OK .
6. In the console, expand Cer tificates (Local Computer) , expand Personal , and select Cer tificates .
7. Right-click the certificate with the friendly name of ConfigMgr SQL Ser ver Identification
Cer tificate , select All Tasks , and then select Expor t .
8. Complete the Cer tificate Expor t Wizard with the default options. Save the certificate with the .cer file
name extension.
Do the following steps on the management point server to add the self-signed certificate for the database
replica server to the Trusted People certificate store:
1. Repeat the preceding steps to open the Cer tificate snap-in MMC on the management point computer.
2. In the Certificates console, expand Cer tificates (Local Computer) , expand Trusted People , right-click
Cer tificates , select All Tasks , and then select Impor t . This action starts the Cer tificate Impor t
Wizard .
3. On the File to Impor t page, select the saved certificate, and then select Next .
4. On the Cer tificate Store page, select Place all cer tificates in the following store , with the
Cer tificate store set to Trusted People , and then select Next .
5. Select Finish to close the wizard and complete the certificate configuration on the management point.
Step 5 - Configure the SQL Server Service Broker for the database replica server
To support client notification with a database replica for a management point, configure communication
between the site database server and the database replica server for the SQL Server Service Broker. Configure
each database with information about the other database, and to exchange certificates between the two
databases for secure communication.
NOTE
Before you can use the following procedure, the database replica server must successfully complete the initial
synchronization with the site database server.
The following procedure doesn't modify the Service Broker port that's configured in SQL Server for the site
database server or the database replica server. This procedure configures each database to communicate with
the other database by using the correct Service Broker port.
Use the following procedure to configure the Service Broker for the site database server and the database
replica server:
1. Use SQL Ser ver Management Studio to connect to the replica server database. Then run the
following query to enable the Service Broker on the database replica server:
ALTER DATABASE <Replica Database Name> SET ENABLE_BROKER, HONOR_BROKER_PRIORITY ON WITH ROLLBACK
IMMEDIATE
2. On the database replica server, configure the Service Broker for client notification and export the Service
Broker certificate. Run a SQL Server stored procedure that configures the Service Broker and exports the
certificate as a single action. When you run the stored procedure, specify the FQDN of the database
replica server, the name of the database replicas database, and specify a location for the export of the
certificate file.
Run the following query to configure the required details on the database replica server, and to export
the certificate for the database replica server:
EXEC sp_BgbConfigSSBForReplicaDB '<Replica SQL Server FQDN>', '<Replica Database Name>', '<Certificate
Backup File Path>'
NOTE
When the database replica server isn't on the default instance of SQL Server, also specify the instance name with
the replica database name. In the example command, replace <Replica Database Name> with
<Instance name>\<Replica Database Name> .
After you export the certificate from the database replica server, place a copy of the certificate on the
primary site database server.
3. Use SQL Ser ver Management Studio to connect to the primary site database. After you connect to the
primary sites database, run a query to import the certificate and specify the Service Broker port that's in
use on the database replica server, the FQDN of the database replica server, and name of the database
replicas database. This action configures the primary sites database to use the Service Broker to
communicate to the database of the database replica server.
Run the following query to import the certificate from the database replica server and specify the
required details:
EXEC sp_BgbConfigSSBForRemoteService 'REPLICA', '<SQL Service Broker Port>', '<Certificate File
Path>', '<Replica SQL Server FQDN>', '<Replica Database Name>'
NOTE
When the database replica server isn't on the default instance of SQL Server, also specify the instance name with
the replica database name. In the example command, replace <Replica Database Name> with
<Instance name>\<Replica Database Name> .
4. On the site database server, run the following command to export the certificate for the site database
server: EXEC sp_BgbCreateAndBackupSQLCert '<Certificate Backup File Path>'
After you export the certificate from the site database server, place a copy of the certificate on the
database replica server.
5. Use SQL Ser ver Management Studio to connect to the replica server database. After you connect to
the replica server database, run a query to import the certificate and specify the site code of the primary
site and the Service Broker port that's in use on the site database server. This action configures the
database replica server to use the Service Broker to communicate to the database of the primary site.
Run the following query to import the certificate from the site database server:
EXEC sp_BgbConfigSSBForRemoteService '<Site Code>', '<SQL Service Broker Port>', '<Certificate File
Path>'
A few minutes after you complete the configuration of the site database and the database replica database, the
notification manager at the primary site sets up the Service Broker conversation for client notification from the
primary site database to the database replica.
Supplemental script for other database replicas on a single SQL Server
When you use the script from step 4 to configure a self-signed certificate for the database replica server on a
SQL Server that already has a database replica you plan to continue using, use a modified version of the original
script. The following modifications prevent the script from deleting an existing certificate on the server, and
create subsequent certificates with unique friendly names. Edit the original script as follows:
Comment out each line between the script entries # Delete existing cert if one exists and
# Create the new cert . Add a pound sign ( # ) as the first character of each applicable line.
For each subsequent database replica you use this script to configure, update the friendly name for the
certificate. Edit the line
$enrollment.CertificateFriendlyName = "ConfigMgr SQL Server Identification Certificate" and replace
ConfigMgr SQL Server Identification Certificate with a new name. For example,
ConfigMgr SQL Server Identification Certificate1 .
NOTE
The available options for some components vary whether you select the central administration site, a primary site, or a
secondary site. Some components are not available at all for certain types of sites.
Software distribution
Content distribution settings
On the General tab, specify settings that modify how the site server transfers content to its distribution points.
When you increase the values you use for concurrent distribution settings, content distribution can use more
network bandwidth.
Pull distribution point
For more information, see Use a pull-distribution point.
Network access account
For more information, see Network access account.
Automate software distribution site component with PowerShell
To programmatically view and configure the Software distribution site component, use the following
PowerShell cmdlets:
Get-CMSoftwareDistributionComponent
Set-CMSoftwareDistributionComponent
Software update point
For more information, see Install a software update point.
Automate software update point site component with PowerShell
To programmatically view and configure the Software update point site component, use the following
PowerShell cmdlets:
Get-CMSoftwareUpdatePointComponent
Set-CMSoftwareUpdatePointComponent
OS deployment
For more information, see Specify the drive for offline OS image servicing.
Management point
On the General tab, set up the site to publish information about its management points to Active Directory
Domain Services.
Configuration Manager clients use management points to locate services, and to find site information such as
boundary group membership and PKI certificate selection options. Clients also use management points to find
other management points in the site, and distribution points from which to download software. Management
points also help clients to complete site assignment, and to download client policy and upload client
information.
The most secure method for clients to find management points is to publish them in Active Directory Domain
Services. This service location method requires the following to be true:
The schema is extended for Configuration Manager.
There's a System Management container, with appropriate security permissions for the site server to
publish to this container.
The Configuration Manager site is set up to publish to Active Directory Domain Services.
Clients belong to the same Active Directory forest as the site server's forest.
When clients on the intranet can't use Active Directory Domain Services to find management points, use DNS
publishing. This article also describes the option to Publish selected intranet management points in DNS .
For general information about service location, see Understand how clients find site resources and services.
Automate management point site component with PowerShell
To programmatically view and configure the Management point site component, use the following PowerShell
cmdlets:
Get-CMManagementPointComponent
Set-CMManagementPointComponent
Status reporting
These settings directly set up the level of detail that's included in status reports from sites and clients.
Automate status reporting site component with PowerShell
To programmatically view and configure the Status repor ting site component, use the following PowerShell
cmdlets:
Get-CMStatusReportingComponent
Set-CMStatusReportingComponent
Email notification
Specify account and email server details to enable Configuration Manager to send email notifications for alerts.
For more information, see Configure alerts.
Automate email notification site component with PowerShell
To programmatically view and configure the Email notification site component, use the following PowerShell
cmdlets:
Get-CMEmailNotificationComponent
Set-CMEmailNotificationComponent
Collection membership evaluation
Use this component to set how often collection membership is incrementally evaluated. Incremental evaluation
updates a collection membership with only new or changed resources.
For more information, see Best practices for collections.
Automate collection membership evaluation site component with PowerShell
To programmatically view and configure the Collection membership evaluation site component, use the
following PowerShell cmdlets:
Get-CMCollectionMembershipEvaluationComponent
Set-CMCollectionMembershipEvaluationComponent
NOTE
Active Directory Forest Discovery requires a global account to discover and publish to untrusted forests. If you do
not use the computer account of the site server, you can only select a global account.
4. If you plan to allow sites to publish site data to this forest, on the Publishing tab, complete
configurations for publishing to this forest.
NOTE
If you enable sites to publish to a forest, you must extend the Active Directory schema of that forest for
Configuration Manager. The Active Directory Forest Account must have Full Control permissions to the System
container in that forest.
5. When you complete the configuration of this forest for use with Active Directory Forest Discovery, click
OK to save the configuration.
Manage content and content infrastructure for
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
IMPORTANT
The following settings are available only when you're installing a distribution point:
Allow Configuration Manager to install IIS on the distribution point computer
Configure drive space settings for the distribution point
For more information on the pages of the wizard specific to the distribution point role, see the Configure a
distribution point section. For example, if you want to install the distribution point as a pull-distribution point,
choose the option to Enable this distribution point to pull content from other distribution points .
Then make the other configurations that pull-distribution points require.
After you finish the Create Site System Server wizard, the site adds the distribution point role to the site system
server.
NOTE
You can use PowerShell to automate the installation of a distribution point. For more information, see Add-
CMDistributionPoint.
To help you troubleshoot, review the following log files on the site server:
distmgr.log
SMSdpmon.log
For more information, see Log file reference.
NOTE
After you distribute content to a collection, if you then associate the collection with a new distribution point
group, you must redistribute the content to the collection before the content is distributed to the new distribution
point group.
The next sections list the procedures for the following actions to manage distribution point groups:
Create and configure a new distribution point group
Modify an existing distribution point group
Add selected distribution points to existing distribution point groups
Procedure to create and configure a new distribution point group
1. In the Configuration Manager console, go to the Administration workspace, and select the
Distribution Point Groups node.
2. In the ribbon, select Create Group .
3. In the Create New Distribution Point Group window, enter the Name , and optionally a Description for
the group.
4. On the Members tab, select Add .
5. In the Add Distribution Points window, select one or more distribution points to add as members of the
group. Then choose OK .
6. If necessary, switch to the Collections tab of the Create New Distribution Point Group window, and
select Add .
7. In the Select Collections window, select the collections to associate with the distribution point group, and
then choose OK .
8. In the Create New Distribution Point Group window, choose OK to create the group.
NOTE
You can use PowerShell to automate this process. For more information, see New-CMDistributionPointGroup.
NOTE
You can use PowerShell to automate this process. For more information, see Set-CMDistributionPointGroup.
NOTE
You can use PowerShell to automate this process. For more information, see Add-CMDistributionPointToGroup.
Before reassigning a distribution point, add the computer account of the destination site server to the local
Administrator group on the target distribution point server.
Follow these steps to reassign a distribution point:
1. In the Configuration Manager console, connect to the central administration site.
2. Go to the Administration workspace, and select the Distribution Points node.
3. Right-click the target distribution point, and select Reassign Distribution Point .
4. Select the target site server and site code to which you want to reassign this distribution point.
Monitor the reassignment similarly as when you add a new role. The simplest method is to refresh the console
view after several minutes. Add the site code column to the view. This value changes when Configuration
Manager reassigns the server. If you try to do another action on the target server before you refresh the console
view, an "object not found" error occurs. Ensure the process is complete and refresh the console view before
starting any other actions on the server.
After reassigning a distribution point, refresh the server's certificate. The new site server needs to re-encrypt
this certificate using its public key and store it in the site database. For more information, see the Create a self-
signed cer tificate or impor t a public key infrastructure (PKI) client cer tificate for the distribution
point setting on the General tab of the distribution point properties.
For PKI certificates, you don't need to create a new certificate. Import the same .PFX and enter the
password.
For self-signed certificates, adjust the expiration date or time to update it.
If you don't refresh the certificate, the distribution point still serves content, but the following functions
fail:
Content validation messages (the distmgr.log shows that it can't decrypt the certificate)
PXE support for clients
Tips
Do this action from the central administration site. This practice helps with replication to the primary
sites.
Don't distribute content to the target server and then attempt to reassign it. Distribute content tasks that
are in progress may fail during the reassignment process, but it retries per normal.
If the server is also a Configuration Manager client, make sure to also reassign the client to the new
primary site. This step is especially critical for pull-distribution points, which use client components to
download content.
This process removes the distribution point from the old site's default boundary group. You need to
manually add it to the new site's default boundary group, if necessary. All other boundary group
assignments remain the same.
NOTE
You can use PowerShell to automate this process. For more information, see the ReassignSiteCode parameter of the
Set-CMDistributionPoint cmdlet.
Maintenance mode
You can set a distribution point in maintenance mode. Enable maintenance mode when you're installing
software updates, or making hardware changes to the server.
While the distribution point is in maintenance mode, it has the following behaviors:
The site doesn't distribute any content to it.
Management points don't return the location of this distribution point to clients.
When you update the site, a distribution point in maintenance mode still updates.
The distribution point properties are read-only. For example, you can't change the certificate or add
boundary groups.
Any scheduled task, like content validation, still runs on the same schedule.
Be careful about enabling maintenance mode on more than one distribution point. This action may cause a
performance impact to your other distribution points. Depending upon your boundary group configurations,
clients may have increased download times or be unable to download content.
Maintenance mode shouldn't be a long-term state for any distribution point. For any actions with a long
duration, consider first removing the distribution point role.
NOTE
While a distribution point is in maintenance mode, don't do the following actions:
Remove role
Reassign distribution point
NOTE
You can use PowerShell to automate this process. For more information, see Set-CMDistributionPoint.
General
The following settings are on the Distribution point page of the Create Site System Server wizard, and the
General tab of the distribution point properties window:
Description : An optional description for this distribution point role.
Install and configure IIS if required by Configuration Manager : If IIS isn't already installed on the
server, Configuration Manager installs and configures it. Configuration Manager requires IIS on all
distribution points. If you don't choose this setting, and IIS isn't installed on the server, first install IIS
before Configuration Manager can successfully install the distribution point.
NOTE
This option is only on the Distribution point page of the Create Site System Server wizard. It's available only
when you're installing a new distribution point.
Enable and configure BranchCache for this distribution point : Choose this setting to let
Configuration Manager configure Windows BranchCache on the distribution point server. For more
information, see BranchCache.
Adjust the download speed to use the unused network bandwidth (Windows LEDBAT) : Enable
distribution points to use network congestion control. For more information, see Windows LEDBAT.
Minimum requirements for LEDBAT support:
Windows Server, version 1709 or later
Windows Server 2016 with the following updates:
Cumulative update KB4132216, released June 21, 2018, or a later cumulative update.
Servicing stack update KB4284833, released May 18, 2018, or a later servicing stack update.
Windows Server 2019
Enable this distribution point for prestaged content : This setting enables you to add content to the
server before you distribute software. Because the content files are already in the content library, they
don't transfer over the network when you distribute the software. For more information, see Prestaged
content.
Enable this distribution point to be used as Microsoft Connected Cache ser ver : Use this option
to install a Microsoft Connected Cache server on your distribution point. By caching this content on-
premises, your clients can benefit from the Delivery Optimization feature, but you can help to protect
WAN links. For more information, including description of the other settings, see Microsoft Connected
Cache in Configuration Manager.
Communication
The following settings are on the Communication page of the Create Site System Server wizard and the
distribution point properties window:
Configure how client devices communicate with the distribution point : There are advantages
and disadvantages to using HTTP or HTTPS . For more information, see Security guidance for content
management.
Allow clients to connect anonymously : This setting specifies whether the distribution point allows
anonymous connections from Configuration Manager clients to the content library.
Create a self-signed cer tificate or impor t a PKI client cer tificate : Configuration Manager uses
this certificate for the following purposes:
It authenticates the distribution point to a management point before the distribution point sends
status messages.
When you Enable PXE suppor t for clients on the PXE Settings page, the distribution point
sends it to computers that PXE boot. These computers then use it to connect to a management
point during the OS deployment process.
When you configure all your management points in the site for HTTP, select the option to Create
self-signed cer tificate . When you configure the management points for HTTPS, use the option
to Impor t cer tificate from PKI.
To import the certificate, browse to a valid Public Key Cryptography Standard (PKCS #12) file. This
PFX or CER file has the PKI certificate with the following requirements for Configuration Manager:
The intended use includes client authentication
Enable the private key to be exported
TIP
There are no specific requirements for the certificate subject or subject alternative name (SAN). If
necessary, use the same certificate for multiple distribution points.
For more information about the certificate requirements, see PKI certificate requirements.
For an example deployment of this certificate, see Deploying the client certificate for distribution
points.
Drive settings
NOTE
These options are available only when you're installing a new distribution point.
Specify the drive settings for the distribution point. Configure up to two disk drives for the content library and
two disk drives for the package share. Configuration Manager can use other drives when the first two reach the
configured drive space reserve. The Drive Settings page configures the priority for the disk drives and the
amount of free disk space that remains on each disk drive.
Drive space reser ve (MB) : This value determines the amount of free space on a drive before
Configuration Manager chooses a different drive and continues the copy process to that drive. Content
files can span multiple drives.
Content locations : Specify the locations for the content library and package share on this distribution
point. By default, all content locations are set to Automatic . Configuration Manager copies content to the
primary content location until the amount of free space reaches the value specified for Drive space
reser ve (MB) . When you select Automatic , Configuration Manager sets the primary content locations
to the disk drive with the most disk space at installation. It sets the secondary locations to the disk drive
with the second-most free disk space. When the primary and secondary locations reach the drive space
reserve, Configuration Manager selects another available drive with the most free disk space to continue
the copy process.
TIP
To prevent Configuration Manager from installing on a specific drive, create an empty file named
NO_SMS_ON_DRIVE.SMS and copy it to the root folder of the drive before you install the distribution point.
NOTE
Select Yes in the Review Required Por ts for PXE dialog box to confirm that you want to enable PXE. Configuration
Manager automatically configures the default ports on Windows firewall. If you use a different firewall, manually configure
the ports.
If you install WDS and DHCP on the same server, configure WDS to listen on a different port. By default, DHCP listens on
the same port. For more information, see Considerations when you have WDS and DHCP on the same server.
Allow this distribution point to respond to incoming PXE requests : Specify whether to enable
WDS to respond to PXE service requests. Use this setting to enable and disable the service without
removing the PXE functionality from the distribution point.
Enable unknown computer suppor t : Specify whether to enable support for computers that
Configuration Manager doesn't manage. For more information, see Prepare for unknown computer
deployments.
Enable a PXE responder without Windows Deployment Ser vice : This option enables a PXE
responder on the distribution point, which doesn't require WDS. This PXE responder supports IPv6
networks. If you enable this option on a distribution point that's already PXE-enabled, Configuration
Manager suspends the WDS service. If you disable this option, but still Enable PXE suppor t for clients ,
then the distribution point enables WDS again.
NOTE
When you enable a PXE responder on a distribution point without Windows Deployment Service, it can be on the
same server as the DHCP service.
Require a password when computers use PXE : To provide more security for your PXE deployments,
specify a strong password.
User device affinity : Specify how you want the distribution point to associate users with the destination
computer for PXE deployments. Choose one of the following options:
Allow user device affinity with auto-approval : Choose this setting to automatically associate
users with the destination computer without waiting for approval.
Allow user device affinity pending administrator approval : Choose this setting to wait for
approval from an administrative user before users are associated with the destination computer.
Do not allow user device affinity : Choose this setting to specify that users aren't associated
with the destination computer. This setting is the default.
For more information about user device affinity, see Link users and devices with user device
affinity.
Network interfaces : Specify that the distribution point responds to PXE requests from all network
interfaces or from specific network interfaces. If the distribution point responds to specific network
interfaces, then provide the MAC address for each network interface.
NOTE
When changing the network interface, restart the WDS service to make sure it properly saves the configuration.
When using the PXE responder service, restart the ConfigMgr PXE Responder Ser vice (SccmPxe).
Specify the PXE ser ver response delay (seconds) : When you use multiple PXE servers, specify how
long this PXE-enabled distribution point should wait before it responds to computer requests. By default,
the Configuration Manager PXE-enabled distribution point responds immediately.
Multicast
Specify whether to enable multicast on the distribution point. Multicast deployments conserve network
bandwidth by simultaneously sending data to multiple Configuration Manager clients. Without multicast, the
server sends a copy of the data to each client over a separate connection. For more information about using
multicast for OS deployment, see Use multicast to deploy Windows over the network.
When you enable multicast, Configuration Manager installs Windows Deployment Services (WDS) on the server,
if necessary.
Select the option to Enable multicast to simultaneously send data to multiple clients , and then
configure the following settings:
Multicast Connection Account : Specify the account to use when you configure Configuration
Manager database connections for multicast. For more information, see the Multicast connection account.
Multicast address settings : Specify the IP addresses for sending data to the destination computers. By
default, it obtains the IP address from a DHCP server that's enabled to distribute multicast addresses.
Depending on the network environment, you can specify a range of IP addresses from 239.0.0.0 through
239.255.255.255.
IMPORTANT
The IP addresses that you configure must be accessible by the destination computers that request the OS image.
Verify that routers and firewalls allow for multicast traffic between the destination computer and the distribution
point.
UDP por t range for multicast : Specify the range of UDP ports that are used to send data to the
destination computers.
IMPORTANT
The UDP ports must be accessible by the destination computers that request the OS image. Verify that routers
and firewalls allow for multicast traffic between the destination computer and the site server.
Maximum clients : Specify the maximum number of destination computers that can download the OS
image from this distribution point.
Enable scheduled multicast : Specify how Configuration Manager controls when to start deploying
operating systems to destination computers. Configure the following options:
Session star t delay (minutes) : Specify the number of minutes that Configuration Manager
waits before it responds to the first deployment request.
Minimum session size (clients) : Specify how many requests must be received before
Configuration Manager starts to deploy the operating system.
IMPORTANT
To enable and configure multicast on the Multicast tab of the distribution point properties, the distribution point must
use Windows Deployment Service.
If you Enable PXE suppor t for clients and Enable multicast to simultaneously send data to multiple
clients , then you can't Enable a PXE responder without Windows Deployment Ser vice .
If you Enable PXE suppor t for clients and Enable a PXE responder without Windows Deployment
Ser vice , then you can't Enable multicast to simultaneously send data to multiple clients .
Group relationships
NOTE
These options are available only when you're editing the properties of a previously installed distribution point.
Manage the distribution point groups in which this distribution point is a member.
To add this distribution point as a member to an existing a distribution point group, choose Add . In the Add to
Distribution Point Groups window, select an existing group, and then choose OK .
To remove this distribution point from a distribution point group, select the group in the list, and then choose
Remove . Removing the distribution point from a distribution point group doesn't remove any content from the
distribution point.
Content
NOTE
These options are available only when you're editing the properties of a previously installed distribution point.
Manage the content that you distributed to the distribution point. Select from the list of deployment packages,
and then select one of the following actions:
Validate : Start the process to validate the integrity of the content files for the software. To view the
results of the content validation process, in the Monitoring workspace, expand Distribution Status ,
and then choose the Content Status node. For more information, see Validate content.
Redistribute : Copies all of the content files for the selected software to the distribution point, and
overwrites the existing files. You typically use this action to repair content files. For more information, see
Redistribute content.
Remove : Removes the content files for the software from the distribution point. For more information,
see Remove content.
Content validation
Set a schedule to validate the integrity of content files on the distribution point. When you enable content
validation on a schedule, Configuration Manager starts the process at the scheduled time. It verifies all content
on the distribution point based on the local SMS_PackagesInContLib SCCMDP class. You can also configure the
content validation priority. By default, the priority is set to Lowest . Increasing the priority might increase the
processor and disk utilization on the server during the validation process, but it should complete faster.
To view the results of the content validation process, in the Monitoring workspace, expand Distribution
Status , and then choose the Content Status node. It shows the content for each software type, for example,
application, software update package, and boot image.
WARNING
Although you specify the content validation schedule by using the local time for the computer, the Configuration
Manager console shows the schedule in UTC.
NOTE
These options are available only when you're editing the properties of a previously installed distribution point.
This tab is available only when you edit the properties for a distribution point that's remote from the site server.
Configure a schedule that restricts when Configuration Manager can transfer data to the distribution point.
Restrict data by priority or close the connection for selected time periods.
To restrict data, select the time period in the grid, and then choose one of the following settings for Availability :
Open for all priorities : Configuration Manager sends data to the distribution point with no restrictions.
This setting is the default for all time periods.
Allow medium and high priority : Configuration Manager sends only medium-priority and high-
priority data to the distribution point.
Allow high priority only : Configuration Manager sends only high-priority data to the distribution
point.
Closed : Configuration Manager doesn't send any data to the distribution point.
Configure the Distribution priority of software on the Distribution Settings tab of the software's
properties.
IMPORTANT
The schedule is based on the time zone from the sending site, not the distribution point.
Rate limits
NOTE
These options are available only when you're editing the properties of a previously installed distribution point.
This tab is available only when you edit the properties for a distribution point that's remote from the site server.
Configure rate limits to control the network bandwidth that Configuration Manager uses to transfer content to
the distribution point. Choose from the following options:
Unlimited when sending to this destination : Configuration Manager sends content to the
distribution point with no rate limit restrictions. This setting is the default.
Pulse mode : This option specifies the size of the data blocks that the site server sends to the distribution
point. You can also specify a time delay between sending each data block. Use this option when you must
send data across a very low-bandwidth network connection to the distribution point. For example, you
have constraints to send 1 KB of data every five seconds, whatever the speed of the link or its usage at a
given time.
Limited to specified maximum transfer rates by hour : Specify this setting to have a site send data
to a distribution point by using only the percentage of time that you configure. When you use this option,
Configuration Manager doesn't identify the network's available bandwidth. Instead it divides the time that
it can send data. The server sends data for a short period of time, which is followed by periods of time
when data isn't sent. For example, if you set Limit available bandwidth to 50% , Configuration
Manager transmits data for a time period followed by an equal period of time when no data is sent. The
actual size amount of data, or size of the data block, isn't managed. It only manages the amount of time
during which it sends data.
Deploy and manage content for Configuration
Manager
2/16/2022 • 19 minutes to read • Edit Online
There are many types of content. All of the actions in this article apply to the following objects in the Software
Librar y workspace in the Configuration Manager console:
Applications : Expand the Application Management node, select Applications , and then select the
specific applications.
Packages : Expand the Application Management node, select Packages , and then select the specific
packages.
Software update deployment packages : Expand the Software Updates node, select Deployment
Packages , and then select the specific deployment packages.
Driver packages : Expand the Operating Systems node, select Driver Packages , and then select the
specific driver packages.
OS images : Expand the Operating Systems node, select Operating System Images , and then select
the specific OS images.
OS upgrade packages : Expand the Operating Systems node, select Operating System Upgrade
Packages , and then select the specific OS upgrade packages.
Boot Images : Expand the Operating Systems node, select Boot Images , and then select the specific
boot images.
Task Sequences : Expand the Operating Systems node, select Task Sequences , and then select the
specific task sequence. Although task sequences don't contain content, they have associated content
references.
Distribute content
Typically, you distribute content to distribution points so that it's available to clients. The exception to this
behavior is when you use on-demand content distribution for a specific deployment. When you distribute
content, Configuration Manager stores content files in a package, and then distributes the package to the
distribution point. The content for the package is pulled from the site server's content library.
When you create a package that contains source files, the site on which you create it becomes the site owner for
the content source. Configuration Manager copies the source files from the source file path that you specify for
the object to the content library on the site server that owns it. Then Configuration Manager replicates the
information to additional sites. For more information, see The content library.
Use the following procedure to distribute content to distribution points.
1. In the Configuration Manager console, go to the Software Librar y workspace.
2. Select one of the content types that you want to distribute.
3. On the Home tab of the ribbon, in the Deployment group, select Distribute Content .
4. On the General page of the Distribute Content Wizard, verify that the content listed is the content that
you want to distribute. Then choose whether you want Configuration Manager to detect content
dependencies that are associated with the selected content and add the dependencies to the distribution.
NOTE
For applications, you can also configure the Detect associated content dependencies and add them to
this distribution setting. Configuration Manager automatically configures this setting for task sequences.
5. On the Content tab, if displayed, verify that the content listed is the content that you want to distribute.
NOTE
The Content page displays only when you select the Detect associated content dependencies and add
them to this distribution setting on the General page of the wizard.
6. On the Content Destination page, select Add , choose one of the following options:
Collections : Choose User Collections or Device Collections , and then select the collection
associated with one or more distribution point groups.
NOTE
It only displays the collections that are associated with a distribution point group. For more information,
see Manage distribution point groups.
Distribution Point : Choose an existing distribution point, and then select OK . It doesn't display
distribution points that have previously received the content.
Distribution Point Group : Choose an existing distribution point group, and then select OK . It
doesn't display distribution point groups that have previously received the content.
When you finish adding content destinations, select Next .
7. On the Summar y page, review the settings for the distribution before you continue. To distribute the
content to the selected destinations, select Next .
8. The Progress page displays the progress of the distribution.
9. The Confirmation page displays whether the content was successfully assigned to the servers. To
further monitor the content distribution, see Monitor content you've distributed with Configuration
Manager.
NOTE
When you use a prestaged content file to recover the content library on a site server, and don't have to prestage the
content files on a distribution point, you can skip this procedure.
Use the following procedure to assign the content in the prestaged content file to distribution points.
IMPORTANT
Verify that the distribution points that you want to prestage are configured as prestaged distribution points, or that the
content is distributed to the distribution points over the network.
NOTE
For applications, you can also configure the Detect associated content dependencies and add them to
this distribution setting. Configuration Manager automatically configures this setting for task sequences.
5. On the Content page, if displayed, verify that the content listed is the content that you want to distribute.
NOTE
The Content page displays only when the Detect associated content dependencies and add them to
this distribution setting is selected on the General page of the wizard.
6. On the Content Destination page, select Add , and choose one of the following options that includes
the distribution points to be prestaged:
Collections : Choose User Collections or Device Collections , then select the collection
associated with one or more distribution point groups.
NOTE
It only displays the collections that are associated with a distribution point group. For more information,
see Manage distribution point groups.
Distribution Point : Select an existing distribution point, and then select OK . It doesn't display
distribution points that already have the content.
Distribution Point Group : Select an existing distribution point group, and then select OK . It
doesn't display distribution point groups that already have the content.
When you finish adding content destinations, select Next .
7. On the Summar y page, review the settings for the distribution before you continue. To distribute the
content to the selected destinations, select Next .
8. The Progress page displays the progress of the distribution.
9. The Confirmation page displays whether the content was successfully assigned to the distribution
points. To monitor the content distribution, see Monitor content you've distributed.
Step 3: Extract the content from the prestaged content file
After you create the prestaged content file and assign the content to distribution points, extract the content files
to the content library on the target server.
First, manually copy the prestaged content file to the target server. Use a portable drive like a USB drive, or
media like a DVD. Have it available at the location of the server that requires the content.
Next, you use the Extract Content command-line tool to export the content files from the prestaged content file.
When you run the tool, it creates a temporary file as it creates the content files. Then it copies the file to
the destination folder, and deletes the temporary file. The server needs sufficient disk space for this
temporary file.
The tool creates the temporary file in the specified destination folder for the content files.
The user that runs the tool must have Administrator rights on the server where you extract the content.
To extract the content files from the prestaged content file
1. Copy the prestaged content file to the server where you want to extract the content.
2. Copy ExtractContent.exe from the \bin\x64 subfolder of the Configuration Manager site installation.
Copy it to the same folder on the target server as the prestaged content file.
3. On the target server, open the command prompt. Navigate to the folder location of the prestaged content
file and Extract Content tool.
NOTE
You can extract one or more prestaged content files on a site server, secondary site server, or distribution point.
For example, if D:\PrestagedFiles\ is the prestaged file location, and MyPrestagedFile.pkgx is the
prestaged file name:
extractcontent /P:D:\PrestagedFiles\MyPrestagedFile.pkgx /S
The /S parameter extracts only content files that are newer than what's currently in the content library.
When you extract the prestaged content file on a site server, the content files are added to its content
library. The site then registers the content in the site server database. When you export the prestaged
content file on a distribution point, it adds the content files to the content library on the distribution point.
The distribution point sends a status message to the parent primary site server, which then registers the
content in the site database.
IMPORTANT
When you update content on the site to a new version, make sure to also update content for prestaged content files. For
example:
1. You create a prestaged content file for version 1 of a package.
2. You update the source files for the package with version 2.
3. You extract the version 1 prestaged content file on a distribution point.
In this example, Configuration Manager doesn't automatically distribute package version 2 to the distribution point.
Create a new prestaged content file that contains the new file version. Then extract the content, update the distribution
point to distribute the files that have changed, or redistribute all files in the package.
NOTE
When the distribution point is on a secondary site, wait for at least 10 minutes. Then in the Configuration
Manager console, assign the content to the distribution point on the secondary site.
WARNING
The package version for applications is always 1 . When you update the content for an application deployment type,
Configuration Manager creates a new content ID for the deployment type, and the package references the new content
ID.
IMPORTANT
The site redistributes the content in the package to all of the distribution points in the group.
TIP
The Power BI sample reports for Configuration Manager includes a report called Content Status . This report can also
help with monitoring content.
NOTE
When a deployment is near completion, it's possible the action to cancel that distribution won't process before the
distribution to the distribution point completes. When this occurs, the action to cancel the deployment is ignored, and the
status for the deployment displays as successful.
Although you can select the option to cancel a distribution to a distribution point that is located on a site server, this has
no effect. This behavior is because the site server and the distribution point on a site server share the same single
instance content store. There's no actual distribution job to cancel.
When you redistribute content that previously failed to transfer to a distribution point, Configuration Manager
immediately begins redeploying that content to the distribution point. Configuration Manager updates the
status of the deployment to reflect the ongoing state of that redeployment.
Tasks to monitor content
1. In the Configuration Manager console, go to the Monitoring workspace, expand Distribution Status ,
and then select the Content Status node. This node displays the packages.
2. Select the package you want to manage.
3. On the Home tab of the ribbon, in the Content group, select View Status . The console displays detailed
status information for the package.
Continue to one of the following sections for additional actions:
Cancel a distribution that remains in progress
1. Switch to the In Progress tab.
2. In the Asset Details pane, right-click the entry for the distribution that you want to cancel, and select
Cancel .
3. Select Yes to confirm the action and cancel the distribution job to that distribution point.
Redistribute content that failed to distribute
1. Switch to the Error tab.
2. In the Asset Details pane, right-click the entry for the distribution that you want to redistribute, and
select Redistribute .
3. Select Yes to confirm the action and start the redistribution process to that distribution point.
WARNING
Distribution point configuration status is relative to the last 24 hours. If the distribution point has an error and recovers,
the error status might be displayed for up to 24 hours after the distribution point recovers.
1. In the Configuration Manager console, go to the Monitoring workspace, expand Distribution Status ,
and select the Client Data Sources node.
2. Repor t Period : Select a time period to apply to the dashboard.
3. Then select the single boundar y group for which you want to view information.
Starting in version 2010, you can also select additional filters for the dashboard:
All boundary groups
Internet clients
Clients not associated with a boundary group
NOTE
If there's no data available for the selected client group, the chart displays: "This data is not yet available."
You can hover your mouse over tiles to see more details about the different content or policy sources.
Also use the report, Client Data Sources - Summarization , to view a summary of the client data sources for
each boundary group.
Dashboard tiles
The dashboard includes the following tiles:
Data source usage
Starting in version 2010, this tile summarizes the types of sources in your environment and how many clients
use them.
This summary tile replaces the following four tiles in prior versions:
Distribution points
Clients that used a distribution point
Peer cache sources
Clients that used a peer
Client content sources
Displays the sources from which clients got content:
Distribution point
Cloud distribution point, which includes content-enabled cloud management gateways
BranchCache
Peer Cache
Delivery Optimization Note 1
Microsoft Update: Devices report this source when the Configuration Manager client downloads software
updates from Microsoft cloud services. These services include Microsoft Update and Microsoft 365 Apps for
enterprise.
NOTE
To include Delivery Optimization on this dashboard, do the following actions:
Configure the client setting, Enable installation of Express Updates on clients in the Software Updates
group
Deploy Windows express updates
For more information, see Manage Express installation files for Windows updates.
Content downloads using fallback source
Starting in version 2010, this information helps you understand how often clients download content from an
alternate source.
Top distributed content
The most distributed packages by source type
Distribution points
In version 2006 and earlier, this tile displays the number of distribution points that are part of the selected
boundary group. In version 2010, this tile is replaced by the Data source usage tile.
Clients that used a distribution point
In version 2006 and earlier, of the number of clients that are in the selected boundary group, this tile shows how
many used a distribution point to get content. In version 2010, this tile is replaced by the Data source usage tile.
Peer cache sources
In version 2006 and earlier, for the selected boundary group, this tile shows how many peer cache sources have
reported download history. In version 2010, this tile is replaced by the Data source usage tile.
Clients that used a peer
In version 2006 and earlier, of the number of clients that are in the selected boundary group, this tile shows how
many used a peer cache source to get content. In version 2010, this tile is replaced by the Data source usage tile.
Microsoft Connected Cache in Configuration
Manager
2/16/2022 • 9 minutes to read • Edit Online
NOTE
The Connected Cache server is an application installed on Windows Server. Starting in Configuration Manager version
2111, the Connected Cache is generally available for production use.
The version of Connected Cache that's available with Configuration Manager version 2107 and earlier is still considered in
development.
Supported scenarios
Connected Cache supports the following three primary scenarios:
Traditional Configuration Manager clients that communicate with on-premises distribution points.
Co-managed clients that get Win32 apps from Microsoft Intune. For more information, see Support for
Intune Win32 apps.
Cloud-only devices, such as Intune-enrolled devices without the Configuration Manager client. For more
information, see Support for cloud-managed devices.
How it works
When you configure clients to use the Connected Cache server, they no longer request Microsoft cloud-
managed content from the internet. Clients request this content from the cache server installed on the
distribution point. The on-premises server caches this content using the IIS feature for Application Request
Routing (ARR). Then the cache server can quickly respond to any future requests for the same content. If the
Connected Cache server is unavailable, clients download the content from the internet. Clients also use Delivery
Optimization to download portions of the content from peers in their network.
1. Client checks for updates and gets the address for the content delivery network (CDN).
2. Configuration Manager configures Delivery Optimization (DO) settings on the client, including the cache
server name.
3. Client A requests content from the Connected Cache server.
4. If the cache doesn't include the content, then the Connected Cache server gets it from the CDN.
5. If the cache server fails to respond, the client downloads the content from the CDN.
6. Clients will also use DO to get pieces of the content from peers, such as client B and client C.
Prerequisites and limitations
NOTE
Additional prerequisites apply to the scenario for co-managed clients and Intune Win32 apps. For more information, see
Support for Intune Win32 apps.
Supported clients
Connected Cache and Delivery Optimization only support clients running a supported version of Windows 10
or later.
Licensing
You need one of the following license subscriptions for each device that gets content from a Connected Cache-
enabled distribution point:
Windows Enterprise E3 or E5, included in Microsoft 365 F3, E3, or E5
Windows Education A3 or A5, included in Microsoft 365 A3 or A5
Windows Virtual Desktop Access (VDA) E3 or E5
Distribution point
Connected Cache in Configuration Manager requires an on-premises distribution point, with the following
configurations:
Running Windows Server 2012 or later
Microsoft .NET Framework version 4.7.2 or later. For more information, see .NET Framework system
requirements.
The default web site enabled on port 80
Don't preinstall the IIS Application Request Routing (ARR) feature. Connected Cache installs ARR and
configures its settings. Microsoft can't guarantee that the Connected Cache's ARR configuration won't
conflict with other applications on the server that also use this feature.
The Connected Cache application can use an unauthenticated proxy server for internet access. For more
information, see Configure the proxy for a site system server.
Don't use a distribution point that has other site roles, for example, a management point. Enable
Connected Cache on a site system server that only has the distribution point role.
Network access requirements
The distribution point requires internet access to the Microsoft cloud. The specific URLs can vary
depending upon the specific cloud-enabled content. Make sure to also allow the endpoints for delivery
optimization. For more information, see Internet access requirements.
For co-managed clients and Intune Win32 apps, allow the distribution point to access the endpoints for
that scenario. For more information, see Network requirements for PowerShell scripts and Win32 apps.
Clients technically only need access to the distribution point with the Connected Cache. Although it's best
to also give clients access to the internet endpoints for the content, in case they need to fall back to the
original source.
NOTE
You can change this drive later. Any cached content is lost, unless you copy it to the new drive.
c. Disk space : Select the amount of disk space to reserve in GB or a percentage of the total disk
space. By default, this value is 100 GB.
NOTE
The default cache size should be sufficient for most customers. You can adjust the cache size later.
If the cache size on disk exceeds the allocated space, ARR clears space by removing content based on its
built-in heuristics.
d. Retain cache when disabling the Connected Cache ser ver : If you remove the cache server,
and you enable this option, the server keeps the cache's content on the disk.
4. In client settings, in the Deliver y Optimization group, configure the setting to Enable devices
managed by Configuration Manager to use Microsoft Connected Cache ser vers for content
download .
Note 1: About drive selection
If you select Automatic , when Configuration Manager installs the Connected Cache component, it honors the
NO_SMS_ON_DRIVE.SMS file. For example, the distribution point has the file C:\NO_SMS_ON_DRIVE.SMS . Even if
the C: drive has the most free space, Configuration Manager configures Connected Cache to use another drive
for its cache.
If you select a specific drive that already has the NO_SMS_ON_DRIVE.SMS file, Configuration Manager
ignores the file. Configuring Connected Cache to use that drive is an explicit intent. For example, the distribution
point has the file F:\NO_SMS_ON_DRIVE.SMS . When you explicitly configure the distribution point properties to use
the F: drive, Configuration Manager configures Connected Cache to use the F: drive for its cache.
To change the drive after you install Connected Cache:
Manually configure the distribution point properties to use a specific drive letter.
If set to automatic, first create the NO_SMS_ON_DRIVE.SMS file. Then make some change to the
distribution point properties to trigger a configuration change.
Automation
Automation via Windows PowerShell
Starting in version 2010, use the following parameters of the Set-CMDistributionPoint cmdlet to configure
the Connected Cache:
EnableDoinc
DiskSpaceUnit
DiskSpaceDoinc
LocalDriveDoinc
RetainDoincCache
AgreeDoincLicense
For more information, see the 2010 release notes.
Automation via the Configuration Manager SDK
You can use the Configuration Manager SDK to automate the configuration of Microsoft Connected Cache
settings on a distribution point. As is the case for all site roles, use the SMS_SCI_SysResUse WMI class. For more
information, see Programming the site roles.
When you update the SMS_SCI_SysResUse instance for the distribution point, set the following properties:
AgreeDOINCLicense : Set to 1 to accept the license terms.
Flags : Enable |= 4 , disable &= ~4
DiskSpaceDOINC : Set to Percentage or GB
RetainDOINCCache : Set to 0 or 1
LocalDriveDOINC : Set to Automatic , or a specific drive letter, such as C: or D:
Verify
On supported versions of Windows 10 or later, verify this behavior with the Get-Deliver yOptimizationStatus
Windows PowerShell cmdlet. In the cmdlet output, review the BytesFromCacheSer ver value. For more
information, see Monitor Delivery Optimization.
If the cache server returns any HTTP failure, the Delivery Optimization client falls back to the original cloud
source.
For more detailed information, see Troubleshoot Microsoft Connected Cache in Configuration Manager.
TIP
All other content that Intune-managed devices download from Microsoft with Delivery Optimization can also be cached
on Microsoft Connected Cache. This content includes software updates for Windows, Microsoft 365 apps, and Microsoft
Edge.
Prerequisites
Client
Update the client to the latest version.
The client device needs to have at least 4 GB of memory.
TIP
Use the following group policy setting: Computer Configuration > Administrative Templates > Windows
Components > Delivery Optimization > Minimum RAM capacity (inclusive) required to enable use of
Peer Caching (in GB) .
Site
Enable Connected Cache on a distribution point.
The client and the Connected Cache-enabled distribution point need to be in the same boundary group. If
a client isn't in a boundary group with a Connected Cache-enabled distribution point, it won't download
content from a Connected Cache-enabled distribution point in a neighbor or site default boundary group.
Enable Allow peer downloads in this boundar y group option for the Boundary Group that
contains the client and the distribution point. For more information, see Boundary Group options.
Enable the following client settings in the Deliver y Optimization group:
Use Configuration Manager Boundar y Groups for Deliver y Optimization Group ID
Enable devices managed by Configuration Manger to use Microsoft Connected Cache
ser vers for content download
Enable co-management, and switch the Client apps workload to Pilot Intune or Intune . For more
information, see the following articles:
Workloads - Client apps
How to enable co-management
Switch workloads to Intune
If in pilot, add the client to the pilot collection for Client Apps.
Intune
This feature only supports the Intune Win32 app type.
Create and assign (deploy) a new app in Intune for this purpose. (Apps created before Intune version
1811 don't work.) For more information, see Win32 app management in Microsoft Intune.
Next steps
Optimize Windows updates with Delivery Optimization
Troubleshoot Microsoft Connected Cache in Configuration Manager
Troubleshoot Microsoft Connected Cache in
Configuration Manager
2/16/2022 • 6 minutes to read • Edit Online
This article provides technical details about Microsoft Connected Cache in Configuration Manager. Use it to help
troubleshoot issues that you may have in your environment. For more information on how it works and how to
use it, see Microsoft Connected Cache in Configuration Manager.
Verify
When you correctly install the Delivery Optimization cache server, and correctly configure clients, they
download from the cache server installed on your distribution point rather than the internet.
Verify this behavior on a client or on the server.
Verify on a client
1. On client running a supported version of Windows 10 or later, download cloud-managed content. For
more information on the types of content that Connected Cache supports, see Supported content types.
2. Open PowerShell and run the following command: Get-DeliveryOptimizationStatus
For example:
PS C:\> Get-DeliveryOptimizationStatus
FileId : ec523d49c4f7c3c4444f0d9b952286ce40fdcee4
FileSize : 549064
TotalBytesDownloaded : 549064
PercentPeerCaching : 0
BytesFromPeers : 0
BytesFromHttp : 0
Status : Caching
Priority : Background
BytesFromCacheServer : 549064
BytesFromLanPeers : 0
BytesFromGroupPeers : 0
BytesFromInternetPeers : 0
BytesToLanPeers : 0
BytesToGroupPeers : 0
BytesToInternetPeers : 0
DownloadDuration : 00:00:00.0780000
HttpConnectionCount : 2
LanConnectionCount : 0
GroupConnectionCount : 0
InternetConnectionCount : 0
DownloadMode : 99
SourceURL :
http://au.download.windowsupdate.com/c/msdownload/update/software/defu/2019/09/am_delta_p
atch_1.301.664.0_ec523d49c4f7c3c4444f0d9b952286ce40fdcee4.exe
NumPeers : 0
PredefinedCallerApplication : WU Client Download
ExpireOn : 9/6/2019 8:36:19 AM
IsPinned : False
StatusCode :
200
StatusDescription :
OK
Content :
{71, 73, 70, 56...}
RawContent :
HTTP/1.1 200 OK
X-HW:
1567797125.dop019.se2.t,1567797125.cds058.se2.s,1567797125.dop114.at2.r,1567797125.cds079.at2
.p,1567797125.cds058.se2.p
X-CCC: cdP+dRBgUCoZO1mezA9zhg2VwQ7P1JWTh9k+GhfQmu8=_SLwv...
Headers : {[X-HW,
1567797125.dop019.se2.t,1567797125.cds058.se2.s,1567797125.dop114.at2.r,1567797125.cds079.a
t2.p,1567797125.cds058.se2.p], [X-CCC,
cdP+dRBgUCoZO1mezA9zhg2VwQ7P1JWTh9k+GhfQmu8=_SLwvtSBQdT3uPQ5ikBe1ABMbdYIIncem+h5dtcLI6GY=],
[X-CID, 100], [Accept-Ranges, bytes]...}
RawContentLength : 969710
Log files
ARR setup log: %temp%\arr_setup.log
0x00000000 Success
0x00D00008 Failure: The number of cache drives specified must match the
number of cache drive size percentages specified
0x00D0000B Failure: A valid cache drive size percent set must be supplied
0x00D0000C Failure: A valid cache drive size percent set or cache drive size
in GB must be supplied
0x00D0000D Failure: A valid cache drive size percent set and cache drive
size in GB cannot both be supplied
ERRO R C O DE ERRO R DESC RIP T IO N
0x00D0000E Failure: The number of cache drives specified must match the
number of cache drives size in GB specified
0x00D00010 Failure: Couldn't back up the Default Web Site web.config file
from $WebsiteConfigFilePath to
$WebConfigDestinationName
0x00D0001E You can't install Connected Cache if the Default Web Site
isn't on port 80
IIS configurations
The Connected Cache server install makes several modifications to the IIS configuration on the distribution
point.
Application request routing
The Connected Cache server installs and configures IIS Application Request Routing (ARR). To avoid potential
conflicts, the distribution point can't already have this component installed.
Allowed server variables
After you install the Connected Cache server, the default web site has the following local server variables:
HTTP_HOST
QUERY_STRING
X-CCC
X-CID
X-DOINC-OUTBOUND
Rewrite rules
The Connected Cache server adds the following rewrite rules:
Inbound rewrite rules
Doinc_ForwardToFarm_shswda01.download.manage-selfhost.microsoft.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_swdc01.manage.microsoft.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_swdc02.manage.microsoft.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_dl.delivery.mp.microsoft.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_officecdn.microsoft.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_b1.download.windowsupdate.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_download.windowsupdate.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_officecdn.microsoft.com.edgesuite.net_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_au.b1.download.windowsupdate.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_assets1.xboxlive.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_au.download.windowsupdate.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_emdl.ws.microsoft.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_tlu.dl.delivery.mp.microsoft.com_E77D08D0-5FEA-4315-8C95-10D359D59294
Doinc_ForwardToFarm_assets2.xboxlive.com_E77D08D0-5FEA-4315-8C95-10D359D59294
See also
Microsoft Connected Cache in Configuration Manager
Run discovery for Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
Overview of discovery
Discovery is the process by which Configuration Manager learns about the things you can manage. The
following are the available discovery methods:
Active Directory Forest Discovery
Active Directory Group Discovery
Active Directory System Discovery
Active Directory User Discovery
Azure Active Directory User Discovery
Azure Active Directory User Group Discovery
Heartbeat Discovery
Network Discovery
Server Discovery
TIP
You can learn about the individual discovery methods in About discovery methods for Configuration Manager.
For assistance in selecting which methods to use, and at which sites in your hierarchy, see Select discovery methods to
use for Configuration Manager.
To use most discovery methods, you must enable the method at a site, and set it up to search specific network or
Active Directory locations. When it runs, it queries the specified location for information about devices or users
that Configuration Manager can manage. When a discovery method successfully finds information about a
resource, it puts that information into a file called a discovery data record (DDR). That file is then processed by a
primary or central administration site. Processing of a DDR creates a new record in the site database for newly
discovered resources, or updates existing records with new information.
Some discovery methods can generate a large volume of network traffic, and the DDRs they produce can result
in a significant use of CPU resources during processing. Therefore, plan to use only those discovery methods
that you require to meet your goals. You might start by using only one or two discovery methods, and then later
enable additional methods in a controlled manner to extend the level of discovery in your environment.
After discovery information is added to the site database, the information then replicates to each site in the
hierarchy, regardless of where it was discovered or processed. Therefore, while you can set up different
schedules and settings for discovery methods at different sites, you might run a specific discovery method at
only a single site. This reduces the use of network bandwidth through duplicate discovery actions, and reduces
the processing of redundant discovery data at multiple sites.
You can use discovery data to create custom collections and queries that logically group resources for
management tasks. For example:
Pushing client installations, or upgrading.
Deploying content to users or devices.
Deploying client settings and related configurations.
NOTE
Secondary sites always use the secondary site server computer account to publish to Active Directory. If you want
secondary sites to publish to Active Directory, ensure that the secondary site server computer account has permissions to
publish to Active Directory. A secondary site cannot publish data to an untrusted forest.
Cau t i on
When you uncheck the option to publish a site to an Active Directory forest, all previously published information
for that site, including available site system roles, is removed from Active Directory.
Actions for Active Directory Forest Discovery are recorded in the following logs:
All actions, except actions related to publishing, are recorded in the ADForestDisc.Log file in the
<InstallationPath>\Logs folder on the site server.
Active Directory Forest Discovery publishing actions are recorded in the hman.log and sitecomp.log
files in the <InstallationPath>\Logs folder on the site server.
For more information about how to configure this discovery method, see Configure discovery methods.
TIP
In addition to the information in this section, see Common features of Active Directory Group, System, and User
Discovery.
When you configure a discovery scope, choose only the groups that you must discover. This recommendation is
because Active Directory Group Discovery tries to discover each member of each group in the discovery scope.
Discovery of large groups can require extensive use of bandwidth and Active Directory resources.
NOTE
Before you can create collections that are based on extended Active Directory attributes, and to ensure accurate discovery
results for computers and users, run Active Directory System Discovery or Active Directory User Discovery, depending on
what you want to discover.
Actions for Active Directory Group Discovery are recorded in the file adsgdis.log in the
<InstallationPath>\LOGS folder on the site server.
For more information about how to configure this discovery method, see Configure discovery methods.
TIP
In addition to the information in this section, see Common features of Active Directory Group, System, and User
Discovery.
Use this discovery method to search the specified Active Directory Domain Services locations for computer
resources that can be used to create collections and queries. You can also install the Configuration Manager
client on a discovered device by using client push installation.
By default, this method discovers basic information about the computer, including the following attributes:
Computer name
Operating system and version
Active Directory container name
IP address
Active Directory site
Time stamp of last logon
To successfully create a DDR for a computer, Active Directory System Discovery must be able to identify the
computer account and then successfully resolve the computer name to an IP address.
In the Active Director y System Discover y Proper ties dialog box, on the Active Director y Attributes tab,
you can view the full list of default object attributes that it discovers. You can also configure the method to
discover additional (extended) attributes.
Actions for Active Directory System Discovery are recorded in the file adsysdis.log in the
<InstallationPath>\LOGS folder on the site server.
For more information about how to configure this discovery method, see Configure discovery methods.
TIP
In addition to the information in this section, see Common features of Active Directory Group, System, and User
Discovery.
Use this discovery method to search Active Directory Domain Services to identify user accounts and associated
attributes. By default, this method discovers basic information about the user account, including the following
attributes:
User name
Unique user name (includes domain name)
Domain
Active Directory container names
In the Active Director y User Discover y Proper ties dialog box, on the Active Director y Attributes tab,
you can view the full default list of object attributes that it discovers. You can also configure the method to
discover additional (extended) attributes.
Actions for Active Directory User Discovery are recorded in the file adusrdis.log in the
<InstallationPath>\LOGS folder on the site server.
For more information about how to configure this discovery method, see Configure discovery methods.
Heartbeat Discovery
Configurable: Yes
Enabled by default: Yes
Accounts you can use to run this method:
Computer account of the site server
Heartbeat Discovery differs from other Configuration Manager discovery methods. It is enabled by default and
runs on each computer client (instead of on a site server) to create a DDR. For mobile device clients, this DDR is
created by the management point that the mobile device client is using. To help maintain the database record of
Configuration Manager clients, do not disable Heartbeat Discovery. In addition to maintaining the database
record, this method can force discovery of a computer as a new resource record. It can also repopulate the
database record of a computer that was deleted from the database.
Heartbeat Discovery runs on a schedule configured for all clients in the hierarchy. The default schedule for
Heartbeat Discovery is set to every seven days. If you change the heartbeat discovery interval, ensure that it
runs more frequently than the site maintenance task Delete Aged Discover y Data . This task deletes inactive
client records from the site database. You can configure the Delete Aged Discover y Data task only for
primary sites.
You can also manually invoke Heartbeat Discovery on a specific client. Run the Discover y Data Collection
Cycle on the Action tab of a client's Configuration Manager control panel.
When Heartbeat Discovery runs, it creates a DDR that has the client's current information. The client then copies
this small file (about 1 KB in size) to a management point so that a primary site can process it. The file has the
following information:
Network location
NetBIOS name
Version of the client agent
Operational status details
Heartbeat Discovery is the only discovery method that provides details about the client installation status. It
does so by updating the system resource client attribute to set a value equal to Yes .
NOTE
Even when Heartbeat Discovery is disabled, DDRs are still created and submitted for active mobile device clients. This
behavior ensures that the task to Delete Aged Discover y Data doesn't affect active mobile devices. When the Delete
Aged Discover y Data task deletes a database record for a mobile device, it also revokes the device certificate. This
action blocks the mobile device from connecting to management points.
Network Discovery
Configurable: Yes
Enabled by default: No
Accounts you can use to run this method:
Computer account of the site server
Use this method to discover the topology of your network and to discover devices on your network that have an
IP address. Network Discovery searches your network for IP-enabled resources by querying the following
entities:
Servers that run a Microsoft implementation of DHCP
Address Resolution Protocol (ARP) caches in network routers
SNMP-enabled devices
Active Directory domains
Before you can use Network Discovery, you must specify the level of discovery to run. You also configure one or
more discovery mechanisms that enable Network Discovery to query for network segments or devices. You can
also configure settings that help control discovery actions on the network. Finally, you define one or more
schedules for when Network Discovery runs.
For this method to successfully discover a resource, Network Discovery must identify the IP address and the
subnet mask of the resource. The following methods are used to identify the subnet mask of an object:
Router ARP cache: Network Discovery queries the ARP cache of a router to find subnet information.
Typically, data in a router ARP cache has a short time-to-live. Therefore, when Network Discovery queries
the ARP cache, the ARP cache might no longer have information about the requested object.
DHCP: Network Discovery queries each DHCP server that you specify to discover the devices for which
the DHCP server has provided a lease. Network Discovery supports only DHCP servers that run the
Microsoft implementation of DHCP.
SNMP device: Network Discovery can directly query an SNMP device. For Network Discovery to query
a device, the device must have a local SNMP agent installed. Also configure Network Discovery to use the
community name that the SNMP agent is using.
When discovery identifies an IP-addressable object and can determine the object's subnet mask, it creates a
DDR for that object. Because different types of devices connect to the network, Network Discovery discovers
resources that don't support the Configuration Manager client. For example, devices that can be discovered but
not managed include printers and routers.
Network Discovery can return several attributes as part of the discovery record that it creates. These attributes
include:
NetBIOS name
IP addresses
Resource domain
System roles
SNMP community name
MAC addresses
Network Discovery activity is recorded in the Netdisc.log file in <InstallationPath>\Logs on the site server that
runs discovery.
For more information about how to configure this discovery method, see Configure discovery methods.
NOTE
Complex networks and low-bandwidth connections can cause Network Discovery to run slowly and generate significant
network traffic. As a best practice, run Network Discovery only when the other discovery methods cannot find the
resources that you have to discover. For example, use Network Discovery if you must discover workgroup computers.
Other discovery methods do not discover workgroup computers.
Levels of Network Discovery
When you configure Network Discovery, you specify one of three levels of discovery:
Topology This level discovers routers and subnets but does not
identify a subnet mask for objects.
Topology and client In addition to topology, this level discovers potential clients
like computers, and resources like printers and routers. This
level of discovery tries to identify the subnet mask of objects
that it finds.
Topology, client, and client operating system In addition to topology and potential clients, this level tries
to discover the computer operating system name and
version. This level uses Windows Browser and Windows
Networking calls.
With each incremental level, Network Discovery increases its activity and network bandwidth usage. Consider
the network traffic that can be generated before you enable all aspects of Network Discovery.
For example, when you first use Network Discovery, you might start with only the topology level to identify your
network infrastructure. Then, reconfigure Network Discovery to discover objects and their device operating
systems. You can also configure settings that limit Network Discovery to a specific range of network segments.
That way, you discover objects in network locations that you require and avoid unnecessary network traffic. This
process also allows you to discover objects from edge routers or from outside your network.
Network Discovery options
To enable Network Discovery to search for IP-addressable devices, configure one or more of these options.
NOTE
Network Discovery runs in the context of the computer account of the site server that runs discovery. If the computer
account does not have permissions to an untrusted domain, the domain and DHCP server configurations can fail to
discover resources.
DHCP
Specify each DHCP server that you want Network Discovery to query. (Network Discovery supports only DHCP
servers that run the Microsoft implementation of DHCP.)
Network Discovery retrieves information by using remote procedure calls to the database on the DHCP
server.
Network Discovery can query both 32-bit and 64-bit DHCP servers for a list of devices that are registered
with each server.
For Network Discovery to successfully query a DHCP server, the computer account of the server that runs
discovery must be a member of the DHCP Users group on the DHCP server. For example, this level of
access exists when one of the following statements is true:
The specified DHCP server is the DHCP server of the server that runs discovery.
The computer that runs discovery and the DHCP server are in the same domain.
A two-way trust exists between the computer that runs discovery and the DHCP server.
The site server is a member of the DHCP Users group.
When Network Discovery enumerates a DHCP server, it does not always discover static IP addresses.
Network Discovery does not find IP addresses that are part of an excluded range of IP addresses on the
DHCP server. It also does not discover IP addresses that are reserved for manual assignment.
Domains
Specify each domain that you want Network Discovery to query.
The computer account of the site server that runs discovery must have permissions to read the domain
controllers in each specified domain.
To discover computers from the local domain, you must enable the Computer Browser service on at least
one computer. This computer must be on the same subnet as the site server that runs Network Discovery.
Network Discovery can discover any computer that you can view from your site server when you browse
the network.
Network Discovery retrieves the IP address. It then uses an Internet Control Message Protocol (ICMP)
echo request to ping each device that it finds. The ping command helps determine which computers are
currently active.
SNMP Devices
Specify each SNMP device that you want Network Discovery to query.
Network Discovery retrieves the ipNetToMediaTable value from any SNMP device that responds to the
query. This value returns arrays of IP addresses that are client computers or other resources like printers,
routers, or other IP-addressable devices.
To query a device, you must specify the IP address or NetBIOS name of the device.
Configure Network Discovery to use the community name of the device, or the device rejects the SNMP-
based query.
Limiting Network Discovery
When Network Discovery queries an SNMP device on the edge of your network, it can identify information
about subnets and SNMP devices that are outside your immediate network. Use the following information to
limit Network Discovery by configuring the SNMP devices that discovery can communicate with, and by
specifying the network segments to query.
Subnets
Configure the subnets that Network Discovery queries when it uses the SNMP and DHCP options. These two
options search only the enabled subnets.
For example, a DHCP request can return devices from locations across your whole network. If you want to
discover only devices on a specific subnet, specify and enable that specific subnet on the Subnets tab in the
Network Discover y Proper ties dialog box. When you specify and enable subnets, you limit future DHCP and
SNMP discovery tasks to those subnets.
NOTE
Subnet configurations do not limit the objects that the Domains discovery option discovers.
The following diagram shows what a topology and client Network Discovery query finds when it runs on Server
1 with 0 router hops specified: subnet D and Router 1, and all potential clients on subnet D.
To get a better idea of how additional router hops can increase the amount of network resources that are
discovered, consider the following network:
Running a topology-only Network Discovery from Server 1 with one router hop discovers the following entities:
Router 1 and subnet 10.1.10.0 (found with zero hops)
Subnets 10.1.20.0 and 10.1.30.0, subnet A, and Router 2 (found on the first hop)
WARNING
Each increase to the number of router hops can significantly increase the number of discoverable resources and increase
the network bandwidth that Network Discovery uses.
Server Discovery
Configurable: No
In addition to the user-configurable discovery methods, Configuration Manager uses a process named Ser ver
Discover y (SMS_WINNT_SERVER_DISCOVERY_AGENT). This discovery method creates resource records for
computers that are site systems, like a computer that is configured as a management point.
NOTE
The information in this section does not apply to Active Directory Forest Discovery.
These three discovery methods are similar in configuration and operation. They can discover computers, users,
and information about group memberships of resources that are stored in Active Directory Domain Services.
The discovery process is managed by a discovery agent. The agent runs on the site server at each site where
discovery is configured to run. You can configure each of these discovery methods to search one or more Active
Directory locations as location instances in the local forest or remote forests.
When discovery searches an untrusted forest for resources, the discovery agent must be able to resolve the
following to be successful:
To discover a computer resource by using Active Directory System Discovery, the discovery agent must
be able to resolve the FQDN of the resource. If it cannot resolve the FQDN, it then tries to resolve the
resource by its NetBIOS name.
To discover a user or group resource by using Active Directory User Discovery or Active Directory Group
Discovery, the discovery agent must be able to resolve the FQDN of the domain controller name that you
specify for the Active Directory location.
For each location that you specify, you can configure individual search options, like enabling a recursive search
of the location's Active Directory child containers. You can also configure a unique account to use when it
searches that location. This account provides flexibility in configuring a discovery method at one site to search
multiple Active Directory locations across multiple forests. You don't have to configure a single account that has
permissions to all locations.
When each of these three discovery methods runs at a specific site, the Configuration Manager site server at
that site contacts the nearest domain controller in the specified Active Directory forest to locate Active Directory
resources. The domain and forest can be in any supported Active Directory mode. The account that you assign
to each location instance must have Read access permission to the specified Active Directory locations.
Discovery searches the specified locations for objects and then tries to collect information about those objects. A
DDR is created when sufficient information about a resource can be identified. The required information varies
depending on the discovery method that is being used.
If you configure the same discovery method to run at different Configuration Manager sites to take advantage
of querying local Active Directory servers, you can configure each site with a unique set of discovery options.
Because discovery data is shared with each site in the hierarchy, avoid overlap between these configurations to
efficiently discover each resource a single time.
For smaller environments, consider running each discovery method at only one site in your hierarchy. This
configuration reduces administrative overhead and the potential for multiple discovery actions to rediscover the
same resources. When you minimize the number of sites that run discovery, you reduce the overall network
bandwidth that discovery uses. You can also reduce the overall number of DDRs that are created and must be
processed by your site servers.
Many of the discovery method configurations are self-explanatory. Use the following sections for more
information about the discovery options that might require additional information before you configure them.
The following options are available for use with multiple Active Directory discovery methods:
Delta Discovery
Filter stale computer records by domain logon
Filter stale records by computer password
Search customized Active Directory attributes
Delta Discovery
Available for:
Active Directory Group Discovery
Active Directory System Discovery
Active Directory User Discovery
Delta Discovery is not an independent discovery method but an option available for the applicable discovery
methods. Delta Discovery searches specific Active Directory attributes for changes that were made since the last
full discovery cycle of the applicable discovery method. The attribute changes are submitted to the
Configuration Manager database to update the discovery record of the resource.
By default, Delta Discovery runs on a five-minute cycle. This schedule is much more frequent than the typical
schedule for a full discovery cycle. This frequent cycle is possible because Delta Discovery uses fewer site server
and network resources than a full discovery cycle does. When you use Delta Discovery, you can reduce the
frequency of the full discovery cycle for that discovery method.
The following are the most common changes that Delta Discovery detects:
New computers or users added to Active Directory
Changes to basic computer and user information
New computers or users that are added to a group
Computers or users that are removed from a group
Changes to system group objects
Although Delta Discovery can detect new resources and changes to group membership, it cannot detect when a
resource has been deleted from Active Directory. DDRs created by Delta Discovery are processed similarly to the
DDRs that are created by a full discovery cycle.
You configure Delta Discovery on the Polling Schedule tab in the properties for each discovery method.
Filter stale computer records by domain logon
Available for:
Active Directory Group Discovery
Active Directory System Discovery
You can configure discovery to exclude computers with a stale computer record. This exclusion is based on the
last domain logon of the computer. When this option is enabled, Active Directory System Discovery evaluates
each computer that it identifies. Active Directory Group Discovery evaluates each computer that is a member of
a group that is discovered.
To use this option:
Computers must be configured to update the lastLogonTimeStamp attribute in Active Directory
Domain Services.
The Active Directory domain functional level must be set to Windows Server 2003 or later.
When you're configuring the time after the last logon that you want to use for this setting, consider the interval
for replication between domain controllers.
You configure filtering on the Option tab in the Active Director y System Discover y Proper ties and Active
Director y Group Discover y Proper ties dialog boxes. Choose to Only discover computers that have
logged on to a domain in a given period of time .
WARNING
When you configure this filter and Filter stale records by computer password , discovery excludes computers that
meet the criteria of either filter.
WARNING
When you configure this filter and Filter stale records by domain logon , discovery excludes computers that meet the
criteria of either filter.
Primary site
Secondary site
1 Secondary sites cannot configure Heartbeat Discovery, but can receive the Heartbeat DDR from a client.
When secondary sites run Network Discovery, or receive Heartbeat Discovery DDRs, they transfer the DDR by
file-based replication to their parent primary site. This is because only primary sites and central administration
sites can process DDRs. For more information about how DDRs are processed, see About discovery data
records.
NOTE
Active Directory Forest Discovery requires a global account to discover and publish to untrusted forests. If you
don't use the computer account of the site server, you can only select a global account.
3. If you plan to let sites publish site data to this forest, on the Publishing tab, finish configurations for
publishing to this forest.
NOTE
If you let sites publish to a forest, extend the Active Directory schema of that forest for Configuration Manager.
The Active Directory Forest Account must have Full Control permissions to the System container in that forest.
NOTE
The information in this section doesn't apply to Active Directory Forest Discovery.
Although each of these discovery methods is independent of the others, they share similar options. For more
information about these configuration options, see Shared options for group, system, and user discovery.
WARNING
The Active Directory polling by each of these discovery methods can generate significant network traffic. Consider
scheduling each discovery method to run at a time when this network traffic doesn't adversely affect business uses of
your network.
NOTE
By default, Active Directory Group Discovery discovers only the membership of security groups.
TIP
The list of Active Directory containers in the Active Directory System Discovery Properties window
includes a column Has Exclusions . When you select containers to exclude, this value is Yes .
c. For each location, specify the account to use as the Active Director y Discover y Account . For
more information, see Accounts.
TIP
For each specified location, you can configure a set of discovery options and a unique Active Directory
Discovery Account.
TIP
For example, your organization uses the Description attribute on the computer account in Active Directory.
Select Custom , and add Description as a custom attribute. After this discovery method runs, this attribute
shows on the device Properties tab in the Configuration Manager console.
4. On the Options tab, configure settings to filter out or exclude stale computer records from discovery.
5. Select OK to save the configuration.
Configure Active Directory User Discovery
1. On the General tab of the Active Directory User Discovery Properties window, select the New icon to
specify a new Active Directory container. In the Active Director y Container dialog box, finish the
following configurations:
a. Specify one or more locations to search.
b. For each location, specify options that change the search behavior.
c. For each location, specify the account to use as the Active Director y Discover y Account . For
more information, see Accounts.
NOTE
For each specified location, you can configure a unique set of discovery options and a unique Active
Directory Discovery Account.
NOTE
If the user is a federated or synchronized identity, you must use Configuration Manager Active Directory user discovery
as well as Azure AD user discovery. For more information about hybrid identities, see Define a hybrid identity adoption
strategy.
Heartbeat Discovery
Configuration Manager enables the Heartbeat Discovery method when you install a primary site. If you want to
use the default schedule of every seven days, there's nothing else to configure. Otherwise, you only have to
configure the schedule for how often clients send the Heartbeat Discovery data record to a management point.
NOTE
If you enable both client push installation and the site maintenance task for Clear Install Flag at the same site, set the
schedule of Heartbeat Discovery to be less than the Client Rediscover y period of the Clear Install Flag site
maintenance task. By default, this task runs every 21 days. Heartbeat discovery should run more frequently than the
task, or clients will unnecessarily reinstall. For more information about site maintenance tasks, see Maintenance tasks.
Network Discovery
Before you configure Network Discovery, understand the following topics:
Available levels of Network Discovery
Available Network Discovery options
Limiting Network Discovery on the network
For more information, see About Network Discovery.
The following sections provide information about common configurations for Network Discovery. You can
configure one or more of these configurations for use during the same discovery run. If you use multiple
configurations, plan for the interactions that can affect the discovery results.
For example, you discover all Simple Network Management Protocol (SNMP) devices that use a specific SNMP
community name. For the same discovery run, you disable discovery on a specific subnet. When discovery runs,
Network Discovery doesn't discover the SNMP devices with the specified community name on the subnet that
you've disabled.
Determine your network topology
You can use a topology-only discovery to map your network. This kind of discovery doesn't discover potential
clients. The topology-only Network Discovery relies on SNMP.
When you're mapping your network topology, configure the Maximum hops on the SNMP tab in the
Network Discover y Proper ties dialog box. Just a few hops can help control the network bandwidth that's
used when discovery runs. As you discover more of your network, increase the number of hops to gain a better
understanding of your network topology.
After you understand your network topology, configure the properties for Network Discovery. These properties
help to discover potential clients and their operating systems. Also configure Network Discovery to limit the
network segments that it can search.
For more information, see How to determine your network topology
Network Discovery search options
Configuration Manager supports the following methods to search the network:
Limit searches by using subnets
Search a specific domain
Limit searches by using SNMP community names
Search a specific DHCP server
Limit searches by using subnets
You can configure Network Discovery to search specific subnets during a discovery run. By default, Network
Discovery searches the subnet of the server that runs discovery. Any other subnets that you configure and
enable apply only to SNMP and DHCP search options. When Network Discovery searches domains, it isn't
limited by configurations for subnets.
If you specify one or more subnets on the Subnets tab in the Network Discover y Proper ties dialog box, it
only searches the subnets that you mark as Enabled .
When you disable a subnet, the site excludes it from discovery, and the following conditions apply:
SNMP-based queries don't run on the subnet.
DHCP servers don't reply with a list of resources located on the subnet.
Domain-based queries can discover resources that are located on the subnet.
Search a specific domain
You can configure Network Discovery to search a specific domain or set of domains during a discovery run. By
default, Network Discovery searches the local domain of the server that runs discovery.
If you specify one or more domains on the Domains tab in the Network Discover y Proper ties dialog box, it
only searches the domains that you mark as Enabled .
When you disable a domain, the site excludes it from discovery, and the following conditions apply:
Network Discovery doesn't query domain controllers in that domain.
SNMP-based queries can still run on subnets in the domain.
DHCP servers can still reply with a list of resources located in the domain.
Limit searches by using SNMP community names
You configure Network Discovery to search a specific SNMP community or set of communities during a
discovery run. By default, the method configures the public community name.
Network Discovery uses community names to gain access to routers that are SNMP devices. A router can supply
Network Discovery with information about other routers and subnets that are linked to the first router.
NOTE
SNMP community names resemble passwords. Network Discovery can get information only from an SNMP device for
which you've specified a community name. Each SNMP device can have its own community name, but often the same
community name is shared among several devices. Additionally, most SNMP devices have a default community name of
public. But some organizations delete the public community name from their devices as a security precaution.
If you include more than one SNMP community on the SNMP tab in the Network Discover y Proper ties
dialog box, it searches them in the order in which they're shown. Make sure that the most frequently used
names are at the top of the list. This configuration helps to minimize network traffic that the site generates when
it tries to contact a device by using different names.
NOTE
Along with using the SNMP community name, you can specify the IP address or resolvable name of a specific SNMP
device. You do this action on the SNMP Devices tab in the Network Discover y Proper ties dialog box.
NOTE
To successfully configure a DHCP server in Network Discovery, your environment must support IPv4. You can't configure
Network Discovery to use a DHCP server in a native IPv6 environment.
TIP
If you know the specific subnets that constitute your network, deselect the Search local subnets
checkbox. Then select the New icon , and add the specific subnets that you want to search. For large
networks, search only one or two subnets at a time to minimize the use of network bandwidth.
On the Domains tab, select the option to Search local domain .
On the SNMP tab, select an option from the Maximum hops drop-down list. This option
specifies how many router hops Network Discovery can take in mapping your topology.
TIP
When you first map your network topology, configure just a few router hops to minimize the use of
network bandwidth.
4. On the Schedule tab, select the New icon , and set a schedule for running discovery. The Duration is
the period of time that Network Discovery has to complete the search for resources. On smaller subnets,
an hour may be enough, but searching across an enterprise network with multiple router hops will take
longer. If Network Discovery runs out of time, a message is logged in Netdisc.log .
NOTE
You can't assign a different discovery configuration to separate Network Discovery schedules. Each time Network
Discovery runs, it uses the current discovery configuration.
5. Select OK to accept the configurations. Network Discovery runs at the scheduled time.
How to configure Network Discovery
1. In the Configuration Manager console, go to the Administration workspace, expand Hierarchy
Configuration , and select the Discover y Methods node.
2. Select the Network Discover y method for the site where you want to discover network resources.
3. On the Home tab of the ribbon, select Proper ties .
4. On the General tab, select the option to Enable network discover y .
Select from the Type of discover y options the type of discovery that you want to run.
Enable the Slow network option for Configuration Manager to make automatic adjustments for
low-bandwidth networks.
5. To configure discovery to search subnets, switch to the Subnets tab. Then configure one or more of the
following options:
To run discovery on subnets that are local to the computer that runs discovery, enable the option
to Search local subnets .
To search a specific subnet, make sure that the subnet is listed in Subnets to search and has a
Search value of Enabled :
a. If the subnet isn't listed, select the New icon . In the New Subnet Assignment dialog
box, enter the Subnet and Mask information, and then select OK . By default, a new subnet
is enabled for search.
b. To change the Search value for a listed subnet, select it in the list. Then select the Toggle
icon to switch the value between Disabled and Enabled .
6. To configure discovery to search domains, switch to the Domains tab. Then configure one or more of the
following options:
To run discovery on the domain of the computer that runs discovery, enable the option to Search
local domain .
To search a specific domain, make sure that the domain is listed in Domains and has a Search
value of Enabled :
a. If the domain isn't listed, select the New icon . In the Domain Proper ties dialog box,
enter the Domain information, and then select OK . By default, a new domain is enabled for
search.
b. To change the Search value for a listed domain, select it in the list. Then select the Toggle
icon to switch the value between Disabled and Enabled .
7. To configure discovery to search specific SNMP community names for SNMP devices, switch to the
SNMP tab. Then configure one or more of the following options:
To add an SNMP community name to the list of SNMP Community names , select the New icon
. In the New SNMP Community Name dialog box, specify the Name of the SNMP
community, and then select OK .
To remove an SNMP community name, select the community name, and then select the Delete
icon .
To adjust the search order of SNMP community names, select a community name from the list.
Then select the Move Item Up icon or the Move Item Down icon . When discovery runs,
community names are searched in a top-to-bottom order.
To configure the maximum number of router hops for use by SNMP searches, select the number of
hops from the Maximum hops drop-down list.
8. To configure an SNMP device, switch to the SNMP Devices tab. If the device isn't listed, select the New
icon . In the New SNMP Device dialog box, specify the IP address or device name of the SNMP
device, and then select OK .
NOTE
If you specify a device name, Configuration Manager must be able to resolve the NetBIOS name to an IP address.
9. To configure discovery to query specific DHCP servers, switch to the DHCP tab. Then configure one or
more of the following options:
To query the DHCP server on the computer that is running discovery, enable the option to Always
use the site ser ver's DHCP ser ver .
NOTE
To use this option, the server must lease its IP address from a DHCP server and can't use a static IP
address.
To query a specific DHCP server, select the New icon . In the New DHCP Ser ver dialog box,
specify the IP address or server name of the DHCP server, and then select OK .
NOTE
If you specify a server name, Configuration Manager must be able to resolve the NetBIOS name to an IP
address.
10. To configure when discovery runs, switch to the Schedule tab. Then select the New icon to set a
schedule for running Network Discovery. You can configure multiple recurring schedules, and multiple
schedules that have no recurrence.
NOTE
If the Schedule tab shows more than one schedule at the same time, Network Discovery runs for all schedules as
it's configured at the time indicated in the schedule. This behavior is also true for recurring schedules.
TIP
You can also use the Specify date and time option to select a given date and time that you ran discovery. This
option is useful when you ran Network Discovery on a given date and want to retrieve messages from only that
date.
5. To validate that Network Discovery has finished, search for a status message that has the following
details:
Message ID: 502
Component: SMS_NETWORK_DISCOVERY
Description: This component stopped
If this status message isn't present, Network Discovery hasn't finished.
6. To validate when Network Discovery started, search for a status message that has the following details:
Message ID: 500
Component: SMS_NETWORK_DISCOVERY
Description: This component star ted
This information verifies that Network Discovery started. If this information isn't present, reschedule
Network Discovery.
Overview of boundaries and boundary groups
2/16/2022 • 3 minutes to read • Edit Online
Overlapping boundaries
Configuration Manager supports overlapping boundary and boundary group configurations for content and
service location requests. Overlapping occurs when a client's location maps to multiple boundary groups. This
behavior happens for one of two reasons:
You add the same boundary to multiple boundary groups.
You add separate boundaries that include the client's location to different boundary groups.
When overlapping occurs, Configuration Manager creates a list of all site systems referenced by all boundary
groups that include a client's location. Configuration Manager sends this list to a client in response to a content
or service location request. Configuration Manager doesn't apply any precedence or deterministic ordering to
this list based on overlapping boundaries and boundary groups. Instead, the client chooses at random from this
list.
For client content requests, Configuration Manager includes only distribution points that have the requested
content in the list of site systems returned. For other service location requests, Configuration Manager includes
only site systems that host the type of role requested which may be one of the following roles:
State migration point
Software update point
Management point
This behavior enables the client to select the nearest server to communicate with for each request type.
Recommendations
Use a mix of the fewest boundaries that meet your needs
Use whichever boundary type or types you choose that work for your environment. To simplify your
management tasks, use boundary types that let you use the fewest number of boundaries you can.
Avoid overlapping boundaries for automatic site assignment
Although each boundary group supports both site assignment and site system reference, create a separate set
of boundary groups to use only for site assignment. Make sure that each boundary in a boundary group isn't a
member of another boundary group with a different site assignment.
A single boundary can be included in multiple boundary groups.
Each boundary group can be associated with a different primary site for site assignment.
For a boundary that's a member of two different boundary groups with different site assignments, clients
randomly select a site to join. This behavior might not be for the site you want the client to join. This
configuration is called overlapping boundaries.
Overlapping boundaries aren't a problem for content location. It can be a useful configuration that
provides clients more resources or content locations they can use.
For more information on boundary groups and site assignment, see Site assignment.
Next steps
Define network locations as boundaries
About boundary groups
Define network locations as boundaries for
Configuration Manager
2/16/2022 • 6 minutes to read • Edit Online
Boundary types
IP subnet
The IP subnet boundary type requires a Subnet ID . For example, 169.254.0.0 . If you provide the Network
(default gateway) and Subnet mask values, Configuration Manager automatically calculates the Subnet ID .
When you save the boundary, Configuration Manager only saves the Subnet ID value.
NOTE
Configuration Manager doesn't support the direct entry of a supernet as a boundary. Instead, use the IP address range
boundary type.
TIP
Use the following Windows command to see a device's current Active Directory site: nltest /dsgetsite .
To determine if a client is cloud domain-joined, use the following Windows command: dsregcmd /status . For more
information, see dsregcmd command - device state.
IPv6 prefix
For the IPv6 prefix boundary type, you specify a Prefix . For example, 2001:1111:2222:3333 .
IP address range
For the IP address range boundary type, specify the Star ting IP address and Ending IP address for the
range. The range can include part of an IP subnet or multiple IP subnets. Use an IP address range boundary type
to support a supernet.
You can also use this type to define a boundary for a single IP address. Set both the starting and ending IP
addresses as the same value. This configuration may be useful for unique devices or test environments.
VPN
Starting in version 2006, to simplify managing remote clients, create a boundary type for VPNs. When a client
sends a location request, it includes additional information about its network configuration. Based upon this
information, the server determines whether the client is on a VPN. For Configuration Manager to associate the
client in the boundary, connect the device to the VPN.
You can configure a VPN boundary in several ways:
Auto detect VPN : Configuration Manager detects any VPN solution that uses the point-to-point
tunneling protocol (PPTP). If it doesn't detect your VPN, use one of the other options. The boundary value
in the console list will be Auto:On .
Connection name : Specify the name of the VPN connection on the device. It's the name of the network
adapter in Windows for the VPN connection. Configuration Manager matches the first 250 characters of
the string, but doesn't support wildcard characters or partial strings. The boundary value in the console
list will be Name:<name> , where <name> is the connection name that you specify.
For example, you run the ipconfigcommand on the device, and one of the sections starts with:
PPP adapter ContosoVPN: . Use the string ContosoVPN as the Connection name . It displays in the list as
Name:CONTOSOVPN .
Connection description : Specify the description of the VPN connection. Configuration Manager
matches the first 243 characters of the string, but doesn't support wildcard characters or partial strings.
The boundary value in the console list will be Description:<description> , where <description> is the
connection description that you specify.
For example, you run the ipconfig /all command on the device, and one of the connections includes
the following line: Description . . . . . . . . . . . : ContosoMainVPN . Use the string ContosoMainVPN as
the Connection description . It displays in the list as Description:CONTOSOMAINVPN .
IMPORTANT
To take full advantage of this feature, after you update the site, also update clients to the latest version. New functionality
appears in the Configuration Manager console when you update the site and console. The complete scenario isn't
functional until the client version is also the latest.
To use this VPN boundary during an OS deployment, make sure to also update the boot image to include the latest client
binaries.
Starting in version 2111, you can now match the start of a connection name or description instead of the whole
string. Some third-party VPN drivers dynamically create the connection, which starts with a consistent string but
also has a unique connection identifier. For example, Virtual network adapter #19 . When you use the
Connection name or Connection description options, also use the new Star ts with option.
Create a boundary
1. In the Configuration Manager console, go to the Administration workspace, expand Hierarchy
Configuration , and select the Boundaries node.
2. On the Home tab of the ribbon, in the Create group, select Create Boundar y .
3. On the General tab of the Create Boundar y window, specify the following information:
Description : Identify the boundary by a friendly name or reference.
NOTE
Configuration Manager automatically names the boundary based on its type and scope. You can't modify
the name.
Type : Select the type of boundary to create. Then specify the additional information that the type
requires. For more information, see Boundary types.
4. Switch to the Boundar y Groups tab. If you already have boundary groups in the site, you can
immediately add this new boundary to one or more groups.
5. Select OK to save the new boundary.
Configure a boundary
TIP
When you create a boundary, Configuration Manager automatically names it based on the type and scope of the
boundary. You can't modify this name. To help identify the boundary in the Configuration Manager console, specify a
description.
TIP
For a server to be listed as a site system for a boundary, associate it as a site system server for at least one
boundary group that includes this boundary. Make this configuration on the References tab of a boundary
group. For more information, see Configure site assignment and select site system servers.
5. To modify the boundary group membership for this boundary, select the Boundar y Groups tab:
To add this boundary to one or more boundary groups, select Add . Select one or more boundary
groups, and then select OK .
To remove this boundary from a boundary group, choose the boundary group, and then select
Remove .
6. Select OK to close the boundary properties and save the configuration.
Next steps
Each boundary is available for use by every site in your hierarchy. After you create a boundary, add the
boundary to one or more boundary groups.
About boundary groups in Configuration Manager
2/16/2022 • 6 minutes to read • Edit Online
NOTE
The state migration point doesn't use fallback relationships. For more information, see Fallback.
Management points
Preferred management points
NOTE
If you use preferred management points, enable this option for the hierarchy, not from within the
boundary group configuration. For more information, see Enable use of preferred management points.
Fallback
To prevent problems when clients can't find an available site system in their current boundary group, define the
relationship between boundary groups for fallback behavior. Fallback lets a client expand its search to other
boundary groups to find an available site system.
Relationships are configured on a boundary group properties Relationships tab. When you configure a
relationship, you define a link to a neighbor boundary group. For each type of supported site system role,
configure independent settings for fallback to the neighbor boundary group. For more information, see
Configure fallback behavior.
For example, when you configure a relationship to a specific boundary group, set fallback for distribution points
to occur after 20 minutes. The default is 120 minutes For a more detailed example, see Example of using
boundary groups.
If a client fails to find an available site system role in its current boundary group, the client uses the fallback time
in minutes. This fallback time determines when the client begins to search for an available site system associated
with the neighbor boundary group.
When a client can't find an available site system, it begins to search locations from neighbor boundary groups.
This behavior increases the pool of available site systems. The configuration of boundary groups and their
relationships defines the client's use of this pool of available site systems.
A boundary group can have more than one relationship. With this configuration, you can configure
fallback for each type of site system to different neighbors to occur after different periods of time.
Clients only fall back to a boundary group that's a direct neighbor of their current boundary group.
When a client is a member of more than one boundary group, it defines its current boundary group as a
union of all its boundary groups. The client falls back to neighbors of any of those original boundary
groups.
NOTE
The state migration point role doesn't use fallback relationships. If you add both the state migration point and distribution
point roles to the same site system server, don't configure fallback on its boundary group. If you need to use boundary
group fallback for the distribution point, add the state migration point role on a different site system server.
Site assignment
You can configure each boundary group with an assigned site for clients.
A newly installed client that uses automatic site assignment joins the assigned site of a boundary group
that contains the client's current network location.
After assigning to a site, a client doesn't change its site assignment when it changes its network location.
For example, a client roams to a new network location. This location is a boundary in a boundary group
with a different site assignment. The client's assigned site doesn't change.
When Active Directory System Discovery discovers a new resource, the site evaluates network
information for the resource against the boundaries in boundary groups. This process associates the new
resource with an assigned site for use by the client push installation method.
When a boundary is a member of more than one boundary groups that have different assigned sites,
clients randomly select one of the sites.
Changes to a boundary groups assigned site only apply to new site assignment actions. Clients that
previously assigned to a site don't reevaluate their site assignment based on changes to the configuration
of a boundary group (or to their own network location).
For more information about client site assignment, see Using automatic site assignment for computers.
For more information on how to configure site assignment, see the following procedures:
Configure site assignment and select site system servers
Configure a fallback site for automatic site assignment
Next steps
Boundary group options
Procedures for boundary groups
NOTE
Some sections that were previously in this article have moved:
Show boundary groups for devices
Distribution points
Boundary group options
Software update points
Management points
Preferred management points
Overlapping boundaries
Example of using boundary groups
Boundary group options
2/16/2022 • 4 minutes to read • Edit Online
IMPORTANT
If a device is in more than one boundary group, make sure to enable this setting on all boundary groups for the device.
Otherwise the client won't use delivery optimization. For example, it doesn't set the DOGroupID registry key.
During peer downloads, only use peers within the same subnet
This setting is dependent upon the preceding option. If you enable this option, the management point only
includes in the content location list peer sources that are in the same subnet as the client.
Common scenarios for enabling this option:
Your boundary group design for content distribution includes one large boundary group that overlaps
other smaller boundary groups. With this new setting, the list of content sources that the management
point provides to clients only includes peer sources from the same subnet.
You have a single large boundary group for all remote office locations. Enable this option and clients only
share content within the subnet at the remote office location, instead of risking sharing content between
locations.
Depending on the configuration of your network, you can exclude certain subnets for matching. For example,
you want to include a boundary but exclude a specific VPN subnet. By default, Configuration Manager excludes
the default Teredo subnet ( 2001:0000:% ).
NOTE
When you expand a stand-alone primary site to add a central administration site (CAS), the subnet exclusion list reverts
to the default. To work around this issue, after site expansion, run the PowerShell script to customize the subnet exclusion
list on the CAS.
Import your subnet exclusion list as a comma-separated subnet string. Use the percent sign ( % ) as a wildcard
character. On the top-level site server, set or read the SubnetExclusionList embedded property for the
SMS_HIERARCHY_MANAGER component in the SMS_SCI_Component class. For more information, see
SMS_SCI_Component server WMI class.
Sample PowerShell script to update the subnet exclusion list
The following script is a sample way of changing this value. Append your subnets to the Proper tyValue
variable after 2001:0000:%,172.16.16.0 . It's a comma-separated string. Run this script on the top-level site server
in your hierarchy.
$PropertyValue = "2001:0000:%,172.16.16.0"
$PropertyName = "SubnetExclusionList"
$SiteCode = $providerMachine.SiteCode
$component = Get-WmiObject -Query 'select comp.* from sms_sci_component comp join SMS_SCI_SiteDefinition
sdef on sdef.SiteCode=comp.SiteCode where sdef.ParentSiteCode="" and
comp.componentname="SMS_HIERARCHY_MANAGER"' -ComputerName $providerMachine.Machine -Namespace
root\sms\site_$SiteCode
$properties = $component.props
$component.props = $properties
$component.put()
NOTE
By default, Configuration Manager includes the Teredo subnet in this list. When you change the list, always read the
existing value first. Append additional subnets to the list, and then set the new value.
TIP
This behavior applies to the Configuration Manager client. It doesn't apply when the task sequence downloads content.
When the task sequence runs, it prefers peer cache sources over distribution points.
NOTE
You can only use Microsoft Update as a source when you enable the following option in the software update
deployment download settings: If software updates are not available on distribution point in current,
neighbor or site boundar y groups, download content from Microsoft Updates .
Next steps
Boundary groups and distribution points
Procedures for boundary groups
Boundary groups and distribution points
2/16/2022 • 4 minutes to read • Edit Online
Client installation
The Configuration Manager client installer, ccmsetup, can get installation content from a local source or via a
management point. Its initial behavior depends upon the command-line parameters you use to install the client:
If you don't use either /mp or /source parameters, ccmsetup tries to get a list of management points
from Active Directory or DNS.
If you only specify /source , it forces the installation from the specified path. It doesn't discover
management points. If it can't find ccmsetup.cab at the specified path, ccmsetup fails.
If you specify both /mp and /source , it checks the specified management points, and any it discovers. If
it can't locate a valid management point, it falls back to the specified source path.
For more information on these ccmsetup parameters, see Client installation parameters and properties.
When ccmsetup contacts the management point to locate the necessary content, the management point returns
distribution points based on boundary group configuration. If you define relationships on the boundary group,
the management point returns distribution points in the following order:
1. Current boundary group
2. Neighbor boundary groups
3. The site default boundary group
NOTE
The client setup process doesn't use the fallback time. To locate content as quickly as possible, it immediately falls back to
the next boundary group.
In previous versions of Configuration Manager, during this process the management point only returned distribution
points in the client's current boundary group. If no content was available, the setup process fell back to download content
from the management point. There was no option to fall back to distribution points in other boundary groups that might
have the necessary content.
IMPORTANT
Due to the real-time nature of task sequence processing, it doesn't wait for the failover time on a neighbor
boundary group. It uses the failover times for prioritizing the neighbor boundary groups. For example, if the task
sequence fails to acquire content from a distribution point in its current boundary group, it immediately tries a
distribution point in a neighbor boundary group with the shortest failover time. If that process fails, it then fails
over to a distribution point in a neighbor boundary group with a larger failover time.
For content like applications and software updates, which are downloaded by the client and not the task sequence
engine, the client behaves as normal. In other words, if you install applications or software updates from a task
sequence, when the client tries to download the content it will wait for boundary group failover.
Next steps
Boundary groups and software update points
Procedures for boundary groups
Boundary groups and software update points
2/16/2022 • 4 minutes to read • Edit Online
Fallback
Configure software update point fallback like other site system roles, but with the following caveats.
New clients use boundary groups to select software update points
When you install new clients, they select a software update point from those servers associated with the
boundary groups you configure. This behavior replaces the previous behavior where clients select a software
update point randomly from a list of the servers that share the client's forest.
Clients continue to use a last known-good software update point until they fall back to find a new one
Clients that already have a software update point continue to use it until it can't be reached. This behavior
includes continued use of a software update point that isn't associated with the client's current boundary group.
This behavior is intentional. The client continues to use an existing software update point, even when it isn't in
the client's current boundary group. When the software update point changes, the client synchronizes data with
the new server, which causes significant network usage. If all clients switch to a new server at the same time, the
delay in transition helps to avoid saturating your network.
A client always tries to reach its last known-good software update point for 120 minutes before starting
fallback
After 120 minutes, if the client hasn't established contact, it then begins fallback. When fallback starts, the client
receives a list of all software update points in its current boundary group. Other software update points in
neighbor and site default boundary groups are available based on fallback configurations.
Fallback configurations
You can configure Fallback times (in minutes) for software update points to be less than 120 minutes.
However, the client still tries to reach its original software update point for 120 minutes. Then it expands its
search to other servers. Boundary group fallback times start when the client first fails to reach its original server.
When the client expands its search, the site provides any boundary groups configured for less than 120 minutes.
To block fallback for a software update point to a neighbor boundary group, configure the setting to Never
fallback .
After failing to reach its original server for two hours, the client then uses a shorter cycle to establish a
connection to a new software update point. This behavior enables the client to rapidly search through the
expanding list of potential software update points.
Example
You configure software update points in boundary group A to fall back after 10 minutes. You configure the same
setting for boundary group B to 130 minutes. A client in boundary group Z fails to reach its last known-good
software update point.
For the next 120 minutes, the client tries to reach only its original server in boundary group Z. After 10
minutes, Configuration Manager adds the software update points from boundary group A to the pool of
available servers. However, the client doesn't try to contact them or any other server until the initial 120-
minute period elapses.
After trying to contact the original software update point for 120 minutes, the client expands its search. It
adds servers to the available pool of software update points that are in it's current and any neighbor
boundary groups configured for 120 minutes or less. This pool includes the servers in boundary group
A, which were previously added to the pool of available servers.
After 10 more minutes, the client expands the search to include software update points from boundary
group B. This period is 130 minutes of total time after the client first failed to reach its last known-good
software update point.
Next steps
Boundary groups and management points
Procedures for boundary groups
Boundary groups and management points
2/16/2022 • 4 minutes to read • Edit Online
NOTE
If you enable distribution points in the site default boundary group to fallback, and a management point is collocated on
a distribution point, the site also adds that management point to the site default boundary group.
If a client is in a boundary group that with no assigned management point, the site gives the client the entire list
of management points. This behavior makes sure that a client always receives a list of management points.
TIP
If you enable the option to Prefer cloud-based sources over on-premises sources then clients will prefer a cloud
management gateway (CMG) for both policy and content.
Management point boundary group fallback doesn't change the behavior during client installation
(ccmsetup.exe). If the command line doesn't specify the initial management point using the /MP parameter, the
new client receives the full list of available management points. For its initial bootstrap process, the client uses
the first management point it can access. Once the client registers with the site, it receives the management
point list properly sorted with this new behavior.
For more information on the client's behavior to acquire content during installation, see Client installation.
During client upgrade, if you don't specify the /MP command-line parameter, the client queries sources such as
Active Directory and WMI for any available management point. Client upgrade doesn't honor the boundary
group configuration.
For clients to use this capability, enable the following setting: Clients prefer to use management points
specified in boundar y groups in Hierarchy Settings .
NOTE
OS deployment processes aren't aware of boundary groups for management points.
Troubleshoot
New entries appear in the LocationSer vices.log . The Locality attribute identifies one of the following states:
0 : Unknown
1 : The specified management point is only in the site default boundary group for fallback.
2 : The specified management point is in a remote or neighbor boundary group. When the management
point is in both a neighbor and the site default boundary groups, the locality is 2.
3 : The specified management point is in the local or current boundary group. When the management
point is in the current boundary group and either a neighbor or the site default boundary group, the
locality is 3. If you don't enable the preferred management points setting in Hierarchy Settings, the
locality is always 3 no matter which boundary group the management point is in.
Clients use local management points first (locality 3), remote second (locality 2), then fallback (locality 1).
When a client receives five errors in 10 minutes and fails to communicate with a management point in its
current boundary group, it tries to contact a management point in a neighbor or the site default boundary
group. If the management point in the current boundary group later comes back online, the client returns to the
local management point on the next refresh cycle. The refresh cycle is 24 hours, or when the Configuration
Manager agent service restarts.
Preferred management points enable a client to identify a management point that's associated with its current
network location (boundary).
A client tries to use a preferred management point from its assigned site before using one not configured
as preferred from its assigned site.
To use this option, enable Clients prefer to use management points specified in boundar y
groups in Hierarchy Settings . Then configure boundary groups at individual primary sites. Include the
management points that should be associated with that boundary group's associated boundaries. For
more information, see Enable use of preferred management points.
When you configure preferred management points, and a client organizes its list of management points,
the client places the preferred management points at the top of its list. This list includes all management
points from the client's assigned site.
NOTE
Client roaming means it changes its network locations. For example, when a laptop travels to a remote office location.
When a client roams, it might use a management point from the local site before attempting to use a server from its
assigned site. This list of servers from its assigned site includes the preferred management points. For more information,
see Understand how clients find site resources and services.
Next steps
Example of using boundary groups
Procedures for boundary groups
Example of using boundary groups
2/16/2022 • 2 minutes to read • Edit Online
NOTE
This information is site data and only available on primary sites. You won't see a value for this column when you connect
the Configuration Manager to a central administration site (CAS). For more information, see Types of data.
NOTE
You can select any combination of available site systems from any site in the hierarchy. Selected site systems are
listed on the Site Systems tab in the properties of each boundary that's a member of this boundary group.
To remove a server from this boundary group, select the server and then select Remove .
NOTE
To stop use of this boundary group for associating site systems, remove all servers listed as associated site system
servers.
To prevent fallback to a specific boundary group, select the boundary group, and then select
Never fallback for the type of site system role. This action can include the default site boundary
group.
To modify the configuration of an existing relationship, select the boundary group in the list, and select
Change . This action opens the Fallback Boundary Groups window for just this boundary group.
To remove a relationship, select the boundary group in the list, and select Remove .
For more information, see Fallback.
Configure boundary group options
To configure options for clients in this boundary group, switch to the Options tab. For more information, see
Boundary group options.
Allow peer downloads in this boundar y group : This option is enabled by default. The management
point provides clients a list of content locations that includes peer sources.
During peer downloads, only use peers within the same subnet : This setting is dependent
upon the one above. If you enable this option, the management point only includes in the content
location list peer sources that are in the same subnet as the client.
Prefer distribution points over peers within the same subnet : By default, the management
point prioritizes peer cache sources at the top of the list of content locations. This setting reverses
that priority for clients in the same subnet as a peer cache source.
Prefer cloud based sources over on-premises sources : A common scenario is if you have a branch
office with a faster internet link, you can prioritize cloud content and policy. This behavior includes cloud
management gateways (CMG) or Microsoft Update.
NOTE
Devices managed by on-premises mobile device management connect to only one management point at a primary site.
The management point is assigned by Configuration Manager to the mobile device during enrollment and then doesn't
change. When you install multiple management points and enable more than one for mobile devices, the management
point that's assigned to a mobile device client is non-deterministic.
If the management point that a mobile device client uses becomes unavailable, you must resolve the problem with that
management point or wipe the mobile device and re-enroll the mobile device so that it can be assigned to an operational
management point that is enabled for mobile devices.
Distribution point
Install multiple distribution points, and deploy content to multiple distribution points. Add more than one
distribution point per boundary group to make sure clients get several options in their content request.
Configure boundary group relationships so that they have a predicable fallback behavior to another boundary
group or content-enabled cloud management gateway. For more information, see Configure boundary groups.
Options for sites and site system roles that aren't highly available
Several site systems don't support multiple instances at a site or in the hierarchy. This information can help you
prepare for these site systems going offline.
Asset intelligence synchronization point (hierarchy)
IMPORTANT
Starting in November 2021, this feature of Configuration Manager is deprecated. For more information, see Introduction
to asset intelligence in Configuration Manager.
This site system role isn't considered mission critical and provides optional functionality in Configuration
Manager. If this site system goes offline, use one of the following options:
Resolve the reason for the site system to be offline.
Uninstall the role from the current server, and install the role on a new server.
Endpoint protection point (hierarchy)
This site system role isn't considered mission critical and provides optional functionality in Configuration
Manager. If this site system goes offline, use one of the following options:
Resolve the reason for the site system to be offline.
Uninstall the role from the current server, and install the role on a new server.
Enrollment point (site )
This site system role isn't considered mission critical and provides optional functionality in Configuration
Manager. If this site system goes offline, use one of the following options:
Resolve the reason for the site system to be offline.
Uninstall the role from the current server, and install the role on a new server.
Enrollment proxy point (site )
This site system role isn't considered mission critical and provides optional functionality in Configuration
Manager. However, you can install multiple instances of this site system role at a site, and at multiple sites in the
hierarchy. If this site system goes offline, use one of the following options:
Resolve the reason for the site system to be offline.
Uninstall the role from the current server, and install the role on a new server.
When you have more than one enrollment proxy server in a site, use a DNS alias for the server name. When you
use this configuration, DNS round robin provides some fault tolerance and load balancing for when users enroll
their mobile devices.
Fallback status point (site or hierarchy)
This site system role isn't considered mission critical and provides optional functionality in Configuration
Manager. If this site system goes offline, use one of the following options:
Resolve the reason for the site system to be offline.
Uninstall the role from the current server, and install the role on a new server. Because clients are
assigned the fallback status point during client installation, you need to modify existing clients to use the
new site system server.
Service connection point (hierarchy)
While this site system role is critical for keeping Configuration Manager current branch up to date, it's generally
not used frequently. If this system goes offline, use one of the following options:
Resolve the reason for the site system to be offline.
Uninstall the role from the current server, and install the role on a new server.
See also
Supported configurations
Recommended hardware
Supported operating systems for site system servers
Site and site system prerequisites
Site failure impacts
Site server high availability in Configuration
Manager
2/16/2022 • 15 minutes to read • Edit Online
Supported configurations
Configuration Manager supports site servers in passive mode in a hierarchy. The CAS and child primary
sites can have another site server in passive mode.
The site server in passive mode can be on-premises or cloud-based in Azure.
NOTE
A cloud-based site server in passive mode uses Azure infrastructure as a service (IaaS). For more information, see
the following articles:
Azure virtual machines (for cloud-based infrastructure)
FAQ for Configuration Manager on Azure
Prerequisites
Active Directory
Both site servers must be joined to the same Active Directory domain.
If you've extended the Active Directory schema for Configuration Manager, both site servers need Full
Control permissions to Active Directory's System - System Management container and all
descendant objects.
General configurations for both site servers
Both site servers can run different OS or service pack versions, as long as both are supported by
Configuration Manager.
Don't host the service connection point role on either site server configured for high availability. If it's
currently on the original site server, remove it, and install it on another site system server. For more
information, see About the service connection point.
Configurations for the site server in passive mode
Must meet the prerequisites for installing a primary site.
This requirement includes components like .NET Framework, Remote Differential Compression, and
the Windows ADK. For the complete list, see Site and site system prerequisites.
NOTE
Make sure to install the SQL Server Native Client. If you don't install it, the prerequisite checker during
Configuration Manager setup will report an error about missing SQL Server permissions.
Must have its computer account in the local Administrators group on the site server in active mode.
Must install using source files that match the version of the site server in active mode.
Can't have a site system role from any site installed on it before you install the site server in passive
mode role.
Make sure the computer account for the site server in passive mode has the same permissions as the site
server in active mode. For example, it may need permission to content source files, such as boot image
source directories.
Permissions for the site system installation account
By default, many customers use the site server's computer account to install new site systems. The requirement
is then to add the site server's computer account to the local Administrators group on the remote site system.
If your environment uses this configuration, make sure to add the computer account of the new site server to
this local group on all remote site systems. For example, all remote distribution points.
The more secure and recommended configuration is to use a service account for installing the site system. The
most secure configuration is to use a local service account. If your environment uses this configuration, no
change is needed.
For more information, see Site system installation account and Elevated permissions.
Content library
The site content library must be on a remote network share. Both site servers need Full Control permissions to
the share and its contents. For more information, see Configure a remote content library for the site server.
The site server computer account needs Full control permissions to the network path to which you're
moving the content library. This permission applies to both the share and the file system. No components
are installed on the remote system.
The site server can't have the distribution point role. The distribution point also uses the content library,
and this role doesn't support a remote content library. After moving the content library, you can't add the
distribution point role to the site server.
Site database
Both site servers must use the same site database.
The database can be remote from each site server. The Configuration Manager setup process doesn't
block installation of the site server role on a computer with the Windows role for Failover Clustering. SQL
Server Always On availability groups require this role, so previously you couldn't colocate the site
database on the site server. With this change, you can create a highly available site with fewer servers by
using an availability group and a site server in passive mode.
The SQL Server that hosts the site database can use a default instance, named instance, failover cluster
instance, or an availability group.
Both site servers need the sysadmin security role on the instance of SQL Server that hosts the site
database. The original site server should already have these roles, so add them for the new site server.
For example, the following SQL script adds these roles for the new site server VM2 in the Contoso
domain:
USE [master]
GO
CREATE LOGIN [contoso\vm2$] FROM WINDOWS WITH DEFAULT_DATABASE=[master], DEFAULT_LANGUAGE=
[us_english]
GO
ALTER SERVER ROLE [sysadmin] ADD MEMBER [contoso\vm2$]
GO
Both site servers need access to the site database on the instance of SQL Server. The original site server
should already have this access, so add it for the new site server. For example, the following SQL script
adds a login to the CM_ABC database for the new site server VM2 in the Contoso domain:
USE [CM_ABC]
GO
CREATE USER [contoso\vm2$] FOR LOGIN [contoso\vm2$] WITH DEFAULT_SCHEMA=[dbo]
GO
The site server in passive mode is configured to use the same site database as the site server in active
mode. The site server in passive mode only reads from the database. It doesn't write to the database until
after it's promoted to active mode.
Limitations
Only a single site server in passive mode is supported at each site.
A site server in passive mode isn't supported at a secondary site.
NOTE
Secondary sites are still supported under a primary site with highly available site servers.
Promotion of the site server in passive mode to active mode is manual. There's no automatic failover.
Site system roles can't be installed on the new server before you add the site server in passive mode.
NOTE
After it installs the site server in passive mode, you can add additional roles as necessary. For example, a
management point at a primary site.
For roles like the reporting point that use a database, host the database on a server that's remote from
both site servers.
The Configuration Manager console doesn't automatically install on the site server in passive mode.
NOTE
The wizard performs the following initial prerequisite checks on this page:
The selected server isn't a secondary site server
The selected server isn't already a site server in passive mode
The site's content library is in a remote location
If these initial prerequisite checks fails, you can't continue past this page of the wizard.
4. On the Site Ser ver In Passive Mode page, provide the following information that's used to run setup
and install the site server role on the specified server:
Choose one of the following options:
Copy installation source files over the network from the site ser ver in active
mode : This option creates a compressed package and sends it to the new site server.
Use the source files at the following location on the site ser ver in passive mode :
For example, a local path to which you already copied the source files. Make sure this
content is the same version as the site server in active mode.
(Recommended) Use the source files at the following network location : Specify the
path directly to the contents of the CD.Latest folder from the site server in active mode.
For example, \\Server\SMS_ABC\CD.Latest where "Server" is the name of the site server in
active mode, and "ABC" is the site code.
Specify the local path at which to install Configuration Manager on the new site server. For
example: C:\Program Files\Configuration Manager
5. Complete the wizard. Configuration Manager then installs the site server in passive mode on the
specified server.
For detailed installation status, in the console go to the Monitoring workspace, and select the Site Ser ver
Status node. The state for the site server in passive mode displays as Installing . For more detailed information,
select the server and select Show Status . This action opens the Site Server Installation Status window. When
the process is complete, the state shows OK for both servers.
For more information on the setup process, see Flowchart - Set up a site server in passive mode.
After you add a site server in passive mode, see both site servers on the Nodes tab in the Sites node of the
console.
All Configuration Manager site server components are in standby on the site server in passive mode. The
Windows services are still running.
NOTE
If file or database replication between sites is in progress during failover, the new site server may not
receive the replicated content. If this happens, redistribute the software content after the new site server is
active. For database replication, you may need to reinitialize a secondary site after failover.
Reduce or remove other scheduled activities at the same time. For example, don't plan to promote
a site server immediately after updating the site to a new version. Site update includes other tasks
that can potentially conflict with the site server promotion.
TIP
Here's an example of how other activities can conflict with site server promotion:
Monday: Update the site to the latest version. Enable automatic client upgrade with client piloting.
Tuesday: Promote the site server in passive mode to be the active site server.
By Wednesday or Thursday, this action may cause all clients to upgrade, not just the pilot collection. This
behavior can cause significant network usage and unexpected load on the distribution points.
IMPORTANT
If all instances of the SMS Provider are offline, you can't connect to the site as no provider is available. When you add the
site server in passive mode, setup installs an instance of the SMS Provider on this server.
The Configuration Manager console requests the list of available SMS Providers from WMI on the site server. When you
install multiple SMS Providers at a site, the site randomly assigns each new connection request to use an installed SMS
Provider. You can't specify the SMS Provider location to use with a specific connection session. If your console is unable to
connect to the site because the current site server is offline, specify the other site server in the Site Connection window.
Daily monitoring
When you have a site server in passive mode, monitor it daily. Make sure its Status remains OK and is ready for
use. In the Configuration Manager console, go to the Monitoring workspace, and select the Site Ser ver
Status node. View both site servers and their current status. Also view status in the Administration workspace.
Expand Site Configuration , and select the Sites node. Select the site, and then switch to the Nodes tab.
NOTE
When you update the site to a new version of Configuration Manager, it also updates the site server in passive mode.
Next steps
Flowchart - Set up a site server in passive mode Flowchart - Promote site server (planned) Flowchart - Promote
site server (unplanned)
Flowchart - Set up a site server in passive mode
2/16/2022 • 2 minutes to read • Edit Online
IMPORTANT
Before you continue, be comfortable with configuring SQL Server and availability groups. This article references the SQL
Server documentation library with more information and procedures.
Supported scenarios
The following scenarios are supported for using availability groups with Configuration Manager. For more
information and procedures for each scenario, see Configure availability groups for Configuration Manager.
Create an availability group for use with Configuration Manager
Configure a site to use the availability group
Add or remove synchronous replica members from an availability group that hosts a site database
Configure or recover a site from an asynchronous commit replicas
Move a site database out of an availability group to a default or named instance of a standalone SQL Server
Prerequisites
The following prerequisites apply to all scenarios. If additional prerequisites apply to a specific scenario, they're
detailed with that scenario.
Configuration Manager accounts and permissions
Installation account
The account you use to run Configuration Manager setup must be:
A member of the local Administrators group on each computer that's a member of the availability group.
A sysadmin on each instance of SQL Server that hosts the site database.
Site server to replica member access
The computer account of the site server must be a member of the local Administrators group on each
computer that's a member of the availability group.
SQL Server
Version
Each replica in the availability group must run a version of SQL Server that's supported by your version of
Configuration Manager. When supported by SQL Server, different nodes of an availability group can run
different versions of SQL Server. For more information, see Supported SQL Server versions for Configuration
Manager.
Edition
Use an Enterprise edition of SQL Server.
Account
Each instance of SQL Server can run under a domain user account (ser vice account ) or a non-domain account.
Each replica in a group can have a different configuration.
Use an account with the lowest possible permissions. For more information, see Security considerations
for a SQL Server installation.
For more information on configuring service accounts and permissions for SQL Server, see Configure
Windows service accounts and permissions.
To use a non-domain account, you must use certificates. For more information, see Use certificates for a
database mirroring endpoint (Transact-SQL).
For more general information, see Create a database mirroring endpoint for availability groups.
Database
Configure the database on a new replica
Only make these configurations on a primary replica. To configure a secondary replica, first fail over the primary
to the secondary. This action makes the secondary the new primary replica.
Configure the database of each replica with the following settings:
Enable CLR Integration :
Set the database owner to the SA account. You don't need to enable this account.
Turn ON the TRUSTWORTHY setting:
NOTE
You can't enable the Service Broker option on a database that's already part of an availability group. You have to
enable that option before adding it to the availability group.
IF NOT EXISTS (SELECT * FROM sys.configurations c WHERE c.name = 'clr enabled' AND c.value_in_use = 1)
PRINT N'ERROR: CLR is not enabled!'
ELSE
PRINT N'PASS: CLR is enabled.'
IF NOT EXISTS(SELECT * from @repltable where config_value = 2147483647 and run_value = 2147483647 )
PRINT N'ERROR: Max text repl size is not correct!'
ELSE
PRINT N'PASS: Max text repl size is correct.'
IF NOT EXISTS (SELECT db.owner_sid FROM sys.databases db WHERE db.database_id = DB_ID() AND db.owner_sid
= 0x01)
PRINT N'ERROR: Database owner is not sa account!'
ELSE
PRINT N'PASS: Database owner is sa account.'
IF NOT EXISTS( SELECT * FROM sys.databases db WHERE db.database_id = DB_ID() AND db.is_trustworthy_on =
1 )
PRINT N'ERROR: Trustworthy bit is not on!'
ELSE
PRINT N'PASS: Trustworthy bit is on.'
IF NOT EXISTS( SELECT * FROM sys.databases db WHERE db.database_id = DB_ID() AND db.is_broker_enabled =
1 )
PRINT N'ERROR: Service broker is not enabled!'
ELSE
PRINT N'PASS: Service broker is enabled.'
PRINT N'Done!'
Branch_Exit:
WARNING
Configuration Manager doesn't support failover to use the asynchronous commit replica as your site database.
For more information, see Failover and failover modes (Always On availability groups).
Configuration Manager doesn't validate the state of the asynchronous commit replica to confirm it's current. Use
of an asynchronous commit replica as the site database can put the integrity of your site and data at risk. This
replica can be out of sync by design. For more information, see Overview of SQL Server Always On availability
groups.
Each replica member must have the following configuration:
Use the default instance or a named instance.
NOTE
Don't have a file share on the server that's the same name as the SQL Server instance name.
NOTE
Configuration Manager supports using the availability group synchronous replicas when set to Automatic
Failover . Set Manual Failover when:
You run Configuration Manager setup to specify use of the site database in the availability group.
You install any update to Configuration Manager. (Not just updates that apply to the site database).
All members need the same seeding mode. Configuration Manager setup includes a prerequisite check to
verify this configuration when creating a database through install or recovery.
NOTE
When setup creates the database, and you configure automatic seeding, the availability group must have
permissions to create the database. This requirement applies to both a new database or recovery. For more
information, see Automatic seeding for secondary replica.
Configuration Manager setup needs to connect to each replica. When you set up an availability group in Azure,
and the group is behind an internal or external load balancer, open the following default ports:
RPC Endpoint Mapper: TCP 135
SQL Server Service Broker: TCP 4022
SQL over TCP: TCP 1433
After setup completes, these ports must stay open for Configuration Manager and replication link analyzer.
You can use custom ports for these configurations. Use the same custom ports by the endpoint and on all
replicas in the availability group.
For SQL Server to replicate data between sites, create a load-balancing rule for each port in the Azure load
balancer. For more information, see Configure High Availability Ports for an internal load balancer.
Listener
The availability group must have at least one availability group listener. When you configure Configuration
Manager to use the site database in the availability group, it uses the virtual name of this listener. Although an
availability group can contain multiple listeners, Configuration Manager can only make use of one. For more
information, see Create or configure a SQL Server availability group listener.
File paths
When you run Configuration Manager setup to configure a site to use the database in an availability group, each
secondary replica server must have a SQL Server file path that's identical to the file path for the site database
files on the current primary replica. If an identical path doesn't exist, setup fails to add the instance for the
availability group as the new location of the site database.
The local SQL Server service account must have Full Control permission to this folder.
The secondary replica servers only require this file path while you're using Configuration Manager setup to
specify the database instance in the availability group. After it completes configuration of the site database in the
availability group, you can delete the unused path from secondary replica severs.
For example, consider the following scenario:
You create an availability group that uses three SQL Servers.
Your primary replica server is a new installation of SQL Server 2014. By default, it stores the database
MDF and LDF files in C:\Program Files\Microsoft SQL Server\MSSQL12.MSSQLSERVER\MSSQL\DATA .
You upgraded both of your secondary replica servers to SQL Server 2014 from previous versions. With
the upgrade, these servers keep the original file path to store database files:
C:\Program Files\Microsoft SQL Server\MSSQL10.MSSQLSERVER\MSSQL\DATA .
Before moving the site database to this availability group, on each secondary replica server, create the
following file path: C:\Program Files\Microsoft SQL Server\MSSQL12.MSSQLSERVER\MSSQL\DATA . This path is a
duplicate of the path in use on the primary replica, even if the secondary replicas won't use this file
location.
You then grant the SQL Server service account on each secondary replica full control access to the newly
created file location on that server.
You can now successfully run Configuration Manager setup to configure the site to use the site database
in the availability group.
Multi-subnet failover
You can enable the MultiSubnetFailover connection string keyword in SQL Server. You also need to manually
add the following values to the Windows Registry on the site server:
HKLM:\SOFTWARE\Microsoft\SMS\Identification
HKLM:\SOFTWARE\Microsoft\SMS\SQL Server
WARNING
Use of site server high availability and SQL Server Always On availability groups with multi-subnet failover doesn't provide
the full capabilities of automatic failover for disaster recovery scenarios.
If you need to create an availability group with a member in a remote location, prioritize based on the lowest
network latency. High network latency can cause replication failures.
NOTE
Configuration Manager supports using the availability group synchronous replicas when set to Automatic Failover . Set
Manual Failover when:
You run Configuration Manager setup to specify use of the site database in the availability group.
You install any update to Configuration Manager. (Not just updates that apply to the site database).
TIP
When you run the setup/recovery wizard, the New Availability Group Database page only applies to manual seeding
configurations. With automatic seeding, there's no shared database backup, so that page of the wizard isn't shown.
Next steps
This article describes the prerequisites, limitations, and changes to common tasks that Configuration Manager
requires when you use availability groups. For procedures to set up and configure your site to use availability
groups, see Configure availability groups.
Configure a SQL Server Always On availability
group for Configuration Manager
2/16/2022 • 7 minutes to read • Edit Online
Availability groups only support the FULL backup model. For more information, see View or change the
recovery model of a database.
3. Use SQL Server to create a full backup of your site database. Choose one of the following options:
Will be member of your availability group : If you use this server as the initial primary replica
member of the availability group, you don't need to restore a copy of the site database to this
server or another in the group. The database is already in place on the primary replica. SQL Server
replicates the database to the secondary replicas during a later step.
Will not be a member of the availability group : Restore a copy of the site database to the
server that will host the primary replica of the group.
For more information, see the following articles in the SQL Server documentation:
Create a full database backup
Restore a database backup using SSMS
NOTE
If you plan to move from an availability group to standalone on an existing replica, first remove the database from
the availability group.
4. On the server that will host the initial primary replica of the group, use the New availability group wizard
to create the availability group. In the wizard:
On the Select Database page, select the database for your Configuration Manager site.
On the Specify Replicas page, configure:
Replicas: Specify the servers that will host secondary replicas.
Listener : Specify the Listener DNS Name as a full DNS name, for example
<listener_server>.fabrikam.com . When you configure Configuration Manager to use the
database in the availability group, it uses this name.
On the Select Initial Data Synchronization page, select Full . After the wizard creates the
availability group, the wizard backs up the primary database and transaction log. Then the wizard
restores them on each server that hosts a secondary replica.
NOTE
If you don't use this step, restore a copy of the site database to each server that hosts a secondary replica.
Then manually join that database to the group.
If you moved an existing site database to an availability group you created and configured, use Configuration
Manager site maintenance to change the configuration with the below instructions:
1. Run Configuration Manager Setup : \BIN\X64\setup.exe from the Configuration Manager site
installation folder.
2. On the Getting Star ted page, select Perform site maintenance or reset this site , and then select
Next .
3. Select Modify SQL Ser ver configuration , and then select Next .
4. Reconfigure the following settings for the site database:
SQL Ser ver name : Enter the virtual name for the availability group listener. You configured the
listener when you created the availability group. The virtual name should be a full DNS name, like
<Listener_Server>.fabrikam.com .
Instance: To specify the default instance for the listener of the availability group, this value must
be blank. If the current site database runs on a named instance, clear the current named instance.
Database: Leave the name as it appears. This name is the current site database.
5. After you provide the information for the new database location, complete setup with your normal
process and configurations.
Asynchronous replicas
You can use an asynchronous replica in the availability group that you use with Configuration Manager. You
don't need to run the configuration scripts required to configure a synchronous replica, because an
asynchronous replica isn't supported for the site database.
Configure an asynchronous commit replica
For more information, see Add a secondary replica to an availability group.
Use the asynchronous replica to recover your site
Use the asynchronous replica to recover your site database.
1. Stop the active primary site to prevent additional writes to the site database. To stop the site, use the
Hierarchy maintenance tool: preinst.exe /stopsite
2. After you stop the site, use the asynchronous replica instead of a manually recovered database.
NOTE
If the primary replica server for the availability group will host the single instance of the site database, skip this
step.
4. On the server that will host the site database, change the backup model for the site database from FULL
to SIMPLE . For more information, see View or change the recovery model of a database.
5. Run Configuration Manager Setup : \BIN\X64\setup.exe from the Configuration Manager site
installation folder.
6. On the Getting Star ted page, select Perform site maintenance or reset this site , and then select
Next .
7. Select Modify SQL Ser ver configuration , and then select Next .
8. Reconfigure the following settings for the site database:
SQL Ser ver name: Enter the name of the server that now hosts the site database.
Instance: Specify the named instance that hosts the site database. If the database is on the default
instance, leave this field blank.
Database: Leave the name as it appears. This name is the current site database.
9. After you provide the information for the new database location, complete setup with your normal
process and configurations. When setup completes, the site restarts, and begins to use the new database
location.
10. To clean up the servers that were members of the availability group, follow the guidance in Remove an
availability group.
Use a SQL Server Always On failover cluster
instance for the site database
2/16/2022 • 4 minutes to read • Edit Online
IMPORTANT
To successfully set up of a failover cluster instance, use the documentation and procedures for SQL Server. For more
information, see Always On Failover Cluster Instances (SQL Server).
Before you install Configuration Manager, prepare the failover cluster instance to support Configuration
Manager. For more information, see Prepare a clustered SQL Server instance.
During Configuration Manager setup, the Windows Volume Shadow Copy Service writer installs on each
physical computer node of the Windows Server failover cluster. This service supports the Backup Site Ser ver
maintenance task.
After the site installs, Configuration Manager checks for changes to the cluster node each hour. Configuration
Manager automatically manages any changes it finds that affect its component installs. For example, a node
failover or the addition of a new node to the failover cluster instance.
Supported options
Configuration Manager supports the following options for failover cluster instances used for the site database:
A single instance cluster
Multiple instance configurations
Multiple active nodes
Both a named or a default instance
Prerequisites
The site database server must be remote from the site server. The cluster can't include the site server.
NOTE
The Configuration Manager setup process doesn't block installation of the site server role on a computer with the
Windows role for Failover Clustering. SQL Server Always On availability groups require this role, so previously you
couldn't colocate the site database on the site server. With this change, you can create a highly available site with
fewer servers by using an availability group and a site server in passive mode. For more information, see High
availability options.
Add the computer account of the site server to the local Administrators group of each server in the
cluster.
To support Kerberos authentication, enable the TCP/IP network communication protocol for the network
connection of each cluster node. The Named pipes protocol isn't required, but can be used to
troubleshoot Kerberos authentication issues. The network protocol settings are configured in SQL
Ser ver Configuration Manager , under SQL Ser ver Network Configuration .
There are specific certificate requirements when you use a failover cluster instance for the site database.
For more information, see the following articles:
Install a certificate in an Always On failover cluster instance configuration
PKI certificate requirements for Configuration Manager
NOTE
If you don't pre-provision a certificate in SQL Server, Configuration Manager creates and provisions a self-signed
certificate for SQL Server.
Limitations
Installation and configuration
Secondary sites can't use a failover cluster instance.
When you specify a failover cluster instance, you can't set a custom file location for the site database.
SMS Provider
You can't install the SMS Provider on a failover cluster instance. It's also not supported on a computer that runs
as a node participating in the failover cluster instance.
Data replication options
If you use Distributed Views , you can't use a failover cluster instance to host the site database.
Backup and recovery
Configuration Manager doesn't support System Center Data Protection Manager (DPM) backup for failover
cluster instances that use a named instance. It does support DPM backup on failover cluster instances that use
the SQL Server default instance.
IMPORTANT
Make sure to use the name of the SQL Server Always On failover cluster instance, not the Windows Server failover cluster.
If you use the Windows Server failover cluster name, the site database installs on the local hard drive of the active
Windows Server failover cluster node. This configuration prevents successful failover if that node fails.
Custom locations for Configuration Manager site
database files
2/16/2022 • 2 minutes to read • Edit Online
NOTE
The option to specify non-default file locations isn't available when you use a SQL Server Always On failover cluster
instance.
During setup of a new primary site or central administration site, you can:
Specify non-default file locations for the site database : Configuration Manager setup then creates
the site database using these locations.
Specify the use of a pre-created SQL Ser ver database that uses custom file locations :
Configuration Manager setup then uses that pre-created database and its pre-configured file locations.
After setup, you can change the location of the site database files. This requires you to stop the site and edit the
file location in SQL Server:
1. On the Configuration Manager site server, stop the SMS_Executive service.
2. Move the database in SQL Server. For more information, see Move User Databases.
3. After you complete the database file move, restart the SMS_Executive service on the Configuration
Manager site server.
Configure role-based administration for
Configuration Manager
2/16/2022 • 16 minutes to read • Edit Online
NOTE
The procedures in this article assume that your administrative user is in a security role with the required permissions. For
example, the Full Administrator or Security administrator roles.
TIP
Use the Role-based administration and auditing tool to help with the following actions:
Model permissions for a new role that you want to create.
Audit all existing administrative users, collections, and security scopes.
Audit a specific user
When you configure a custom security role, only grant permissions that are required by the users
assigned to this role. For example, the Modify permission for the Security Roles object allows assigned
users to edit any accessible security role, even if they aren't assigned to that security role.
7. After you configure the permissions, select OK to save the new security role.
Import a security role that was exported from another Configuration Manager hierarchy
IMPORTANT
Only import custom security role configuration files from a trusted source. When you export a custom security role, save
it in a secure location. The XML files aren't digitally signed.
1. On the Home tab of the ribbon, in the Create group, choose Impor t Security Role .
2. Specify the XML file that contains the exported security role configuration. Select Open to complete the
procedure and create the security role.
3. After you import a custom security role, open its Proper ties . View the permissions to confirm they
include the least required permissions for this role. Change any permissions that aren't required in this
environment.
NOTE
You can't export built-in security roles.
When you configure a custom security role, only grant permissions that are required by the users
assigned to this role. For example, the Modify permission for the Security Roles object allows assigned
users to edit any accessible security role, even if they aren't assigned to that security role.
8. When you're done, select OK to save the custom security role.
Configure security scopes for an object
Manage security scopes from the securable object, not from the security scope. The only properties you can
change on a custom security scope is the name and description. You can't modify the two built-in scopes. To
change the name and description of a custom scope, you need the Modify permission for the Security Scopes
object.
When you create a new object in Configuration Manager, it's associated with each security scope that's
associated with the security roles of the account used to create the object. This behavior occurs when those
security roles provide the Create permission or Set Security Scope permission. After you create an object,
you can change the security scopes and assign it to multiple scopes.
For example, you're assigned a security role that grants you permission to create a new boundary group. That
role is associated with the Admins security scope. When you create a new boundary group, you've no option to
assign specific security scopes. The Admins security scope is automatically assigned to the new boundary
group. After you save the new boundary group, you can edit the security scopes for the boundary group.
For more information on how to add a scope for a user, see Modify the administrative scope of an
administrative user.
How to create a custom security scope
1. In the Configuration Manager console, go to the Administration workspace, expand Security , and then
select the Security Scopes node.
2. On the Home tab of the ribbon, in the Create group, select Create Security Scope .
3. In the Create Security Scope window, specify a Security scope name . The maximum length is 256
characters.
4. Optional but recommended, specify a Description to summarize the purpose of this custom security
scope. The maximum length is 512 characters.
5. Select or remove administrative user assignments. You can change these after you create the security
scope.
6. To save the custom security scope, select OK .
How to configure security scopes for an object
1. In the Configuration Manager console, select an object that supports being assigned to a security scope.
For the list of supported objects, see Fundamentals of role-based administration - Security scopes.
2. On the Home tab of the ribbon, in the Classify group, select Set Security Scopes .
For a folder, go to the Folder tab of the ribbon. In the Actions group, select Set Security Scopes .
NOTE
An item is searchable in folders outside of a user's security scope if that user shares a security scope with the
person who created the object.
3. In the Set Security Scopes window, select or clear the security scopes for this object. Select at least one
security scope.
4. Select OK to save the assigned security scopes.
NOTE
For console-based administration, you can only specify domain users or domain security groups as an
administrative user.
4. For the Associated security roles , select Add to open a list of the available security roles. Select one or
more security roles, and then select OK .
5. Choose one of the following options to define the securable object behavior for the new user:
All instances of the objects that are related to the assigned security roles : This option
has the following behaviors:
Security scope: All
Collections: All Systems and All Users and User Groups
The security roles that you assign to the user define their access to objects.
New objects that this user creates are assigned to the Default security scope.
Only the instances of objects that are assigned to the specified security scopes and
collections : This option has the following behaviors:
Security scope: Default
Collections: All Systems and All Users and User Groups
These defaults maybe different, as the actual security scopes and collections are limited to
those that are associated with the account that you use to create the administrative user.
Add or Remove security scopes and collections to customize the administrative scope of this
user.
IMPORTANT
After you create the user, view its properties to select a third option, Associate assigned security roles with
specific security scopes and collections . For more information, see Modify the administrative scope of an
administrative user.
NOTE
This option is available only when you modify the properties of an administrative user.
The current configuration for the securable object behavior changes the process that you use to assign
additional security roles. Use the following procedures that are based on the different options for securable
objects to help you manage an administrative user.
Use the following procedure to view and manage the configuration for securable objects for an administrative
user.
To view and manage the securable object behavior for an administrative user
1. In the Configuration Manager console, choose Administration .
2. In the Administration workspace, expand Security , and then choose Administrative Users .
3. Select the administrative user that you want to modify.
4. On the Home tab, in the Proper ties group, choose Proper ties .
5. Choose the Security Scopes tab to view the current configuration for securable objects for this
administrative user.
6. To modify the securable object behavior, select a new option for securable object behavior. After you change
this configuration, see the appropriate procedure for further guidance to configure security scopes and
collections, and security roles for this administrative user.
7. Choose OK to complete the procedure.
Use the following procedure to modify an administrative user that has the securable object behavior set to All
instances of the objects that are related to the assigned security roles .
For option: All instances of the objects that are related to the assigned security roles
1. In the Configuration Manager console, choose Administration .
2. In the Administration workspace, expand Security , and then choose Administrative Users .
3. Select the administrative user that you want to modify.
4. On the Home tab, in the Proper ties group, choose Proper ties .
5. Choose the Security Scopes tab to confirm that the administrative user is configured for All instances
of the objects that are related to the assigned security roles .
6. To modify the assigned security roles, choose the Security Roles tab.
To assign additional security roles to this administrative user, choose Add , check the box for each
additional security role that you want to assign, and then choose OK .
To remove security roles, select one or more security roles from the list, and then choose Remove .
7. To modify the securable object behavior, choose the Security Scopes tab and choose a new option for
the securable object behavior. After you change this configuration, see the appropriate procedure for
further guidance to configure security scopes and collections, and security roles for this administrative
user.
NOTE
When the securable object behavior is set to All instances of the objects that are related to the assigned
security roles , you can't add or remove specific security scopes and collections.
NOTE
You must configure at least one security scope before the selected security roles can be assigned to the
administrative user. When you select multiple security roles, each security scope and collection that you
configure is associated with each of the selected security roles.
To remove security roles, select one or more security roles from the list, and then choose Remove .
7. To modify the security scopes and collections that are associated with a specific security role, choose the
Security Scopes tab, select the security role, and then choose Edit .
To associate new objects with this security role, choose Add , and select an object type to associate
with the selected security roles. If you select Security Scope or Collection , check the box for one
or more objects to complete that selection, and then choose OK .
NOTE
You must configure at least one security scope.
To remove a security scope or collection that is associated with this security role, select the object,
and then choose Remove .
When you have finished modifying the associated objects, choose OK .
8. Choose OK to complete this procedure.
Cau t i on
When a security role grants administrative users the collection deployment permission, those
administrative users can distribute objects from any security scope for which they have object read
permissions, even if that security scope is associated with a different security role.
Next steps
Role-based administration and auditing tool
Accounts used in Configuration Manager
Configure Azure services for use with Configuration
Manager
2/16/2022 • 15 minutes to read • Edit Online
Available services
Configure the following Azure services using this wizard:
Cloud Management : This service enables the site and clients to authenticate by using Azure AD. This
authentication enables other scenarios, such as:
Install and assign Configuration Manager clients using Azure AD for authentication
Configure Azure AD User Discovery
Configure Azure AD User Group Discovery
Support certain cloud management gateway scenarios
TIP
For more information specific to cloud management, see Configure Azure Active Directory for cloud
management gateway.
IMPORTANT
This article refers to the Log Analytics Connector, which was formerly called the OMS Connector. This feature was
deprecated in November 2020. It's removed from Configuration Manager in version 2107. For more information,
see Removed and deprecated features.
Microsoft Store for Business : Connect to the Microsoft Store for Business. Get store apps for your
organization that you can deploy with Configuration Manager.
Service details
The following table lists details about each of the services.
Tenants : The number of service instances you can configure. Each instance must be a distinct Azure AD
tenant.
Clouds : All services support the global Azure cloud, but not all services support private clouds, such as
the Azure US Government cloud.
Web app : Whether the service uses an Azure AD app of type Web app / API, also referred to as a server
app in Configuration Manager.
Native app : Whether the service uses an Azure AD app of type Native, also referred to as a client app in
Configuration Manager.
Actions : Whether you can import or create these apps in the Configuration Manager Azure Services
Wizard.
Use Configuration Manager to directly create the apps in Azure AD. To collect the necessary data from
Azure AD, review the information in the other sections of this article.
Some services require the Azure AD apps to have specific permissions. Review the information for each service
to determine any required permissions. For example, before you can import a web app, an Azure administrator
must first create it in the Azure portal.
When configuring the Log Analytics Connector, give your newly registered web app contributor permission on
the resource group that contains the relevant workspace. This permission allows Configuration Manager to
access that workspace. When assigning the permission, search for the name of the app registration in the Add
users area of the Azure portal. This process is the same as when providing Configuration Manager with
permissions to Log Analytics. An Azure administrator must assign these permissions before you import the app
into Configuration Manager.
IMPORTANT
When you use an imported Azure AD app, you aren't notified of an upcoming expiration date from console notifications.
NOTE
You may see an option for Never , but Azure AD no longer supports it. If you previously selected this option, the
expiration date is now set for 99 years from the date you created it.
Select Sign in to authenticate to Azure as an administrative user. These credentials aren't saved by
Configuration Manager. This persona doesn't require permissions in Configuration Manager, and doesn't need to
be the same account that runs the Azure Services Wizard. After successfully authenticating to Azure, the page
shows the Azure AD Tenant Name for reference.
Select OK to create the web app in Azure AD and close the Create Server Application dialog. This action returns
to the Server app dialog.
NOTE
If you have an Azure AD Conditional Access policy defined and applies to All Cloud apps - you must exclude the created
Server Application from this policy. For more information on how to exclude specific apps, see Azure AD Conditional
Access Documentation.
Select Sign in to authenticate to Azure as an administrative user. These credentials aren't saved by
Configuration Manager. This persona doesn't require permissions in Configuration Manager, and doesn't need to
be the same account that runs the Azure Services Wizard. After successfully authenticating to Azure, the page
shows the Azure AD Tenant Name for reference.
Select OK to create the native app in Azure AD and close the Create Client Application dialog. This action returns
to the Client App dialog.
Configuration or Discovery
After specifying the web and native apps on the Apps page, the Azure Services Wizard proceeds to either a
Configuration or Discover y page, depending upon the service to which you're connecting. The details of this
page vary from service to service. For more information, see one of the following articles:
Cloud Management service, Discover y page: Configure Azure AD User Discovery
Log Analytics Connector service, Configuration page: Configure the connection to Log Analytics
Microsoft Store for Business service, Configurations page: Configure Microsoft Store for Business
synchronization
Finally, complete the Azure Services Wizard through the Summary, Progress, and Completion pages. You've
completed the configuration of an Azure service in Configuration Manager. Repeat this process to configure
other Azure services.
NOTE
You need to have at least the "Cloud Application Administrator" Azure AD role assigned to be able to renew the key.
NOTE
Save the secret key before closing the Azure application properties Key page. This information is removed when you close
the page.
Disable authentication
Starting in version 2010, you can disable Azure AD authentication for tenants not associated with users and
devices. When you onboard Configuration Manager to Azure AD, it allows the site and clients to use modern
authentication. Currently, Azure AD device authentication is enabled for all onboarded tenants, whether or not it
has devices. For example, you have a separate tenant with a subscription that you use for compute resources to
support a cloud management gateway. If there aren't users or devices associated with the tenant, disable Azure
AD authentication.
1. In the Configuration Manager console, go to the Administration workspace.
2. Expand Cloud Ser vices and select the Azure Ser vices node.
3. Select the target connection of type Cloud Management . In the ribbon, select Proper ties .
4. Switch to the Applications tab.
5. Select the option to Disable Azure Active Director y authentication for this tenant .
6. Select OK to save and close the connection properties.
TIP
It can take up to 25 hours for this change to take effect on clients. For purposes of testing to speed up this change in
behavior, use the following steps:
1. Restart the sms_executive service on the site server.
2. Restart the ccmexec service on the client.
3. Trigger the client schedule to refresh the default management point. For example, use the send schedule tool:
SendSchedule {00000000-0000-0000-0000-000000000023}
Secondary site
Other than when you're decommissioning a hierarchy, the main reason to remove a secondary site is because of
a broader infrastructure change, such as network or physical locations. Also review the reasons to choose a
secondary site.
When you decide you need to remove a secondary site, first consider your answers to the following questions:
Did you remove all site system roles from the site server?
Are any boundaries or boundary groups associated with the secondary site? Reconfigure boundaries
before removing the site.
Are any clients still at the location?
Have you configured other content management options like peer caching?
Options to delete secondary sites
You can't move or reassign a secondary site to another primary site. When you remove a secondary site from its
direct parent site, choose whether to uninstall or delete it.
Uninstall the secondary site
Use this option to remove a functional secondary site that's accessible from the network. This option uninstalls
Configuration Manager from the secondary site server. It then deletes all information about the site and its
resources from the Configuration Manager site.
If Configuration Manager installed SQL Server Express for the secondary site, Configuration Manager uninstalls
SQL Server Express as well. If you installed SQL Server Express before you installed the secondary site,
Configuration Manager doesn't uninstall SQL Server Express.
Delete the secondary site
Use this option in the following situations:
It failed to install
After you uninstall it, the Configuration Manager console still shows the secondary site
This option deletes all information about the site and its resources from the Configuration Manager
hierarchy, but doesn't make any changes on the site server.
TIP
You also can use the Hierarchy Maintenance Tool with the /DELSITE option to delete a secondary site. For more
information, see Hierarchy Maintenance Tool (Preinst.exe).
Primary site
You might want to uninstall a primary site from your hierarchy for the following reasons:
Consolidate sites to reduce costs and complexity
Reconfigure or redesign the sites of the hierarchy
Before you uninstall a child primary site that uses distributed views for its replication link to the CAS, first turn
off distributed views in your hierarchy. For more information, see Uninstall a primary site that is configured with
distributed views.
Plan to uninstall a primary site
Before you uninstall a primary site, review the following tasks:
Review boundaries, boundary groups, and fallback relationships. If you assign clients to a new site, but
don't change the boundaries, they may be considered roaming. For more information, see Define site
boundaries and boundary groups.
Make sure all active clients are reassigned to another primary site in the hierarchy. Otherwise clients will
be unmanaged after you uninstall the site. For more information, see How to assign clients to a site.
Review the list of site roles to make sure the new site provides the same level of service.
Make sure that you've properly sized the other site systems with this role in the other site. They
will need to support your business requirements for performance and availability with the
additional clients.
If this site has lots of clients, reassign them in stages. Monitor database replication as clients
refresh full inventory and other site-specific data. If you manage software updates, clients will
assign to a new software update point. This behavior causes a full scan for update compliance.
Client reassignment may impact reports and queries that rely on inventory data, and state-based
compliance. Consider temporarily adjusting any client cycles during the transition.
Review all client assignment methods to make sure that none refer to this primary site.
Check if any actively used objects in the hierarchy have static references to the site code. For example,
collection queries, task sequences, or administrative scripts.
If the hierarchy uses a fallback site for automatic site assignment, make sure it doesn't reference this
primary site.
Reconfigure any client installation methods that may reference a static site code.
If this primary site has any site-specific cloud-attached services, make sure to remove them. If you still
need the cloud resources, move them to another primary site in the hierarchy. Remove them from the
primary site that you're going to uninstall, and add them to another primary site.
If this primary site has any discovery methods for the hierarchy, move them to another site.
Retire any site-based OS deployment media.
Uninstall all site system roles from the site and the site server. For more information, see Uninstall site
system roles. While this preparation step isn't required, it helps identify any additional dependencies
before uninstalling the site.
Uninstall any secondary sites under this primary site. For more information, see the Secondary site
section.
Prerequisites to uninstall a primary site
The administrative user that runs Configuration Manager setup needs the following security rights:
Local Administrator rights on the CAS server
If the CAS database server is remote from the site server, local Administrator rights on the remote site
database server for the CAS.
Sysadmin rights on the CAS site database
Local Administrator rights on the primary site server
If the primary site database server is remote from the primary site server, local Administrator rights on
the remote site database server for the primary site.
Infrastructure Administrator or Full Administrator security role on the CAS
Procedure to uninstall a primary site
You run Configuration Manager setup to uninstall a primary site that doesn't have an associated secondary site.
Use the following procedure to uninstall a primary site:
TIP
If the primary site server is no longer available, use the Hierarchy Maintenance Tool at the CAS to delete the primary site
from the site database. For more information, see Hierarchy Maintenance Tool (Preinst.exe).
1. Start Configuration Manager setup on the primary site server by using one of the following methods:
On the Star t menu, select Configuration Manager Setup .
In the directory for the Configuration Manager installation media, open
\SMSSETUP\BIN\X64\setup.exe . Make sure this version is the same as the site version.
IMPORTANT
When a secondary site is attached to the primary site, you must remove the secondary site before you can
uninstall the primary site.
4. On the Uninstall the Configuration Manager Site page, both of the following options are enabled by
default:
Remove the site database from the primary site server
Remove the Configuration Manager console
5. Select Yes to confirm the uninstallation of the Configuration Manager primary site.
Uninstall a primary site that uses distributed views
1. Before you uninstall a child primary site, turn off distributed views on each link in the hierarchy between
the CAS and a primary site.
2. After you turn off distributed views on each link, confirm that the data from the primary site finishes
reinitializing at the CAS. To monitor the initialization of data, see Monitor replication.
3. After the data successfully reinitializes with the CAS, you can uninstall the primary site.
4. When the primary site is uninstalled, you can reconfigure distributed views on links from the CAS to
other primary sites.
IMPORTANT
If you uninstall the primary site before you turn off distributed views at each site, or before the data from the
primary site successfully reinitializes at the CAS, data replication might fail.
Decommission a hierarchy
Some organizations have multiple hierarchies because of mergers, acquisitions, test environments, or other
business requirements. If you consolidate management to a single hierarchy, this action can help reduce costs
and complexity. Another reason to decommission the hierarchy is that you're migrating to a cloud-only
management service such as Microsoft Intune, and are ready to remove your on-premises infrastructure.
To decommission a hierarchy with multiple sites, the sequence of removal is important. Start by uninstalling the
sites at the bottom of the hierarchy and then move upward:
1. Remove secondary sites attached to primary sites.
2. Uninstall primary sites.
3. After you uninstall all primary sites, you can uninstall the CAS.
For more information, see the following sections:
Remove a secondary site
Uninstall a primary site
Uninstall the CAS
Uninstall the CAS
The final step to decommission a hierarchy is to uninstall the CAS. Run Configuration Manager setup to uninstall
the CAS that doesn't have child primary sites.
Prerequisites to uninstall the CAS
The administrative user who runs Configuration Manager setup needs the following security rights:
Local Administrator rights on the CAS server
If the CAS database server is remote from the site server, local Administrator rights on the remote site
database server for the CAS.
Procedure to uninstall the CAS
1. Start Configuration Manager setup on the CAS server by using one of the following methods:
On the Star t menu, select Configuration Manager Setup .
In the directory for the Configuration Manager installation media, open
\SMSSETUP\BIN\X64\setup.exe . Make sure this version is the same as the site version.
IMPORTANT
Remove all child primary sites before you can uninstall the CAS.
4. On the Uninstall the Configuration Manager Site page, both of the following options are enabled by
default:
Remove the site database from the CAS server
Remove the Configuration Manager console
5. Select Yes to confirm the uninstallation of the Configuration Manager central administration site (CAS).
NOTE
This feature was first introduced in version 2002 as a pre-release feature. Starting in version 2103, it's no longer a pre-
release feature.
Configuration Manager doesn't enable this optional feature by default. You must enable this feature before using it. For
more information, see Enable optional features from updates.
Plan
The hierarchy needs to consist of the CAS and a single child primary site. The primary site can have
secondary sites. To remove other child primary sites from the hierarchy, review the planning steps and
prerequisites to Uninstall a primary site.
Make sure your child primary site meets the size and scale requirements for a stand-alone primary site.
Make sure to upgrade all sites to the latest released version of Configuration Manager current branch.
Move or retire any site roles at the CAS, except the service connection point and the software update
point. Configuration Manager setup handles these two roles when you remove the CAS.
The following roles are most common at the CAS, which you need to retire or move to the primary site:
Asset Intelligence sync point
Endpoint Protection point
Reporting services point
Data warehouse service point
Cloud management gateway (CMG)
Turn off distributed views
Configuration Manager automatically handles package source locations for built-in packages, like the
Configuration Manager client. Review all other content source locations to make sure they aren't using a
share on the CAS.
Stop any active migration jobs and remove all configurations for migration. For more information, see
Stop active migration from another hierarchy.
If you have any custom status filter rules or alerts and subscriptions, recreate them on the child primary
site. Starting in version 2107, also recreate any subscriptions for external notifications.
If you use automatic deployment rules for software updates, recreate them on the child primary site.
If you use Configuration Manager or System Center Updates Publisher to manage third-party software
updates, export the WSUS signing certificate from the software update point on the CAS.
Before you remove the CAS, wait for the deadlines of any required deployments of third-party
software updates. Clients pre-download content for required deployments, and when you change the
software update point, the content hash changes with local publishing of software updates. (This
behavior doesn't impact other content types, only local publishing of third-party software updates.) If
you remove the CAS with these required deployments still in-progress, they'll fail on clients with a
hash mismatch error.
Review any third-party software that might have a dependency on the CAS.
Prerequisites
Configuration Manager version 2103 or later.
The administrative user that runs Configuration Manager setup needs the following security rights:
Local Administrator rights on the CAS server
If the CAS database server is remote from the site server, local Administrator rights on the
remote site database server for the CAS.
Sysadmin rights on the CAS site database
Local Administrator rights on the primary site server
If the primary site database server is remote from the primary site server, local Administrator
rights on the remote site database server for the primary site.
Sysadmin rights on the primary site database
Infrastructure Administrator or Full Administrator security role on the CAS and primary site
Only one child primary site in the hierarchy. For more information, see Uninstall a primary site.
Process
1. Start Configuration Manager setup on the CAS server by using one of the following methods:
On the Star t menu, select Configuration Manager Setup .
In the directory for the Configuration Manager installation media, open
\SMSSETUP\BIN\X64\setup.exe . Make sure this version is the same as the site version.
B EF O RE A F T ER
Post-setup tasks
After you remove the CAS, review the following steps as they apply to your environment.
Manually remove the CAS server computer account from the primary site local groups.
The trusted root key changed, which can require additional actions:
Update OS deployment boot images to include the latest Configuration Manager binaries.
Recreate OS deployment media.
If you enable Endpoint Analytics for devices uploaded to Microsoft Endpoint Manager, in version 2107,
re-enable this option.
If you connect Configuration Manager with Azure Monitor, you need to reset the connection. The first
step to resolve any issues is to renew the secret key. If that doesn't resolve the issue, recreate the
connection.
IMPORTANT
The Log Analytics Connector was deprecated in November 2020. It's removed from Configuration Manager in
version 2107. For more information, see Removed and deprecated features.
If you enable synchronization of Surface drivers, reconfigure this feature after you remove the CAS. For
more information, see Microsoft Surface drivers and firmware updates.
If you manage third-party software updates:
1. Export the WSUS signing certificate from the software update point on the CAS, if you haven't
already.
2. Before you create any new deployments, remove the update from any existing deployments and
software update packages.
3. To recover software update metadata into a usable state, resynchronize subscribed catalogs. You
can also wait for Configuration Manager to automatically resynchronize.
4. Start or wait for a normal software update sync process to update Configuration Manager with the
current status from WSUS. Optionally, use SCUP or WSUS PowerShell cmdlets to delete and readd
updates.
5. Republish content for updates that you need to deploy.
Accounts used in Configuration Manager
2/16/2022 • 31 minutes to read • Edit Online
NOTE
When Configuration Manager creates a group on a computer that's a domain member, the group is a local security
group. If the computer is a domain controller, the group is a domain local group. This type of group is shared among all
domain controllers in the domain.
Configuration Manager_CollectedFilesAccess
Configuration Manager uses this group to grant access to view files collected by software inventory.
For more information, see Introduction to software inventory.
Type and location for CollectedFilesAccess
This group is a local security group created on the primary site server.
When you uninstall a site, this group isn't automatically removed. Manually delete it after uninstalling a site.
Membership for CollectedFilesAccess
Configuration Manager automatically manages the group membership. Membership includes administrative
users that are granted the View Collected Files permission to the Collection securable object from an
assigned security role.
Permissions for CollectedFilesAccess
By default, this group has Read permission to the following folder on the site server:
C:\Program Files\Microsoft Configuration Manager\sinv.box\FileCol
Configuration Manager_DViewAccess
This group is a local security group that Configuration Manager creates on the site database server or database
replica server for a child primary site. The site creates it when you use distributed views for database replication
between sites in a hierarchy. It contains the site server and SQL Server computer accounts of the central
administration site.
For more information, see Data transfers between sites.
Configuration Manager Remote Control Users
Configuration Manager remote tools use this group to store the accounts and groups that you set up in the
Permitted Viewers list. The site assigns this list to each client.
For more information, see Introduction to remote control.
Type and location for remote control users
This group is a local security group created on the Configuration Manager client when the client receives a
policy that enables remote tools.
After you disable remote tools for a client, this group isn't automatically removed. Manually delete it after
disabling remote tools.
Membership for remote control users
By default, there are no members in this group. When you add users to the Permitted Viewers list, they're
automatically added to this group.
Use the Permitted Viewers list to manage the membership of this group instead of adding users or groups
directly to this group.
In addition to being a permitted viewer, an administrative user must have the Remote Control permission to
the Collection object. Assign this permission by using the Remote Tools Operator security role.
Permissions for remote control users
By default, this group doesn't have permissions to any locations on the computer. It's used only to hold the
Permitted Viewers list.
SMS Admins
Configuration Manager uses this group to grant access to the SMS Provider through WMI. Access to the SMS
Provider is required to view and change objects in the Configuration Manager console.
NOTE
The role-based administration configuration of an administrative user determines which objects they can view and
manage when using the Configuration Manager console.
Read
Read & execute
List folder contents
Write
Modify
SMS_SiteSystemToSiteServerConnection_Stat_<sitecode>
The file dispatch manager component on Configuration Manager remote site system computers uses this group
to connect to the site server.
Type and location for SMS_SiteSystemToSiteServerConnection_Stat
This group is a local security group created on the site server.
When you uninstall a site, this group isn't automatically removed. Manually delete it after uninstalling a site.
Membership for SMS_SiteSystemToSiteServerConnection_Stat
Configuration Manager automatically manages the group membership. By default, membership includes the
computer account or the domain user account. It uses this account to connect to the site server from each
remote site system that runs the file dispatch manager.
Permissions for SMS_SiteSystemToSiteServerConnection_Stat
By default, this group has Read , Read & execute , and List folder contents permission to the following folder
and its subfolders on the site server: C:\Program Files\Microsoft Configuration Manager\inboxes .
This group also has the Write and Modify permissions to the following folder on the site server:
C:\Program Files\Microsoft Configuration Manager\inboxes\statmgr.box .
SMS_SiteToSiteConnection_<sitecode>
Configuration Manager uses this group to enable file-based replication between sites in a hierarchy. For each
remote site that directly transfers files to this site, this group has accounts set up as a File Replication
Account .
Type and location for SMS_SiteToSiteConnection
This group is a local security group created on the site server.
Membership for SMS_SiteToSiteConnection
When you install a new site as a child of another site, Configuration Manager automatically adds the computer
account of the new site server to this group on the parent site server. Configuration Manager also adds the
parent site's computer account to the group on the new site server. If you specify another account for file-based
transfers, add that account to this group on the destination site server.
When you uninstall a site, this group isn't automatically removed. Manually delete it after uninstalling a site.
Permissions for SMS_SiteToSiteConnection
By default, this group has Full control to the following folder:
C:\Program Files\Microsoft Configuration Manager\inboxes\despoolr.box\receive .
TIP
Don't use the percentage character ( % ) in the password for accounts that you specify in the Configuration Manager
console. The account will fail to authenticate.
NOTE
Secondary sites always use the secondary site server computer account to publish to Active Directory.
To discover and publish to untrusted forests, the Active Directory forest account must be a global account. If you
don't use the computer account of the site server, you can select only a global account.
This account must have Read permissions to each Active Directory forest where you want to discover network
infrastructure.
This account must have Full Control permissions to the System Management container and all its child
objects in each Active Directory forest where you want to publish site data. For more information, see Prepare
Active Directory for site publishing.
For more information, see Active Directory forest discovery.
Certificate registration point account
The certificate registration point uses the Cer tificate registration point account to connect to the
Configuration Manager database. It uses its computer account by default, but you can configure a user account
instead. When the certificate registration point is in an untrusted domain from the site server, you must specify a
user account. This account requires only Read access to the site database, because the state message system
handles write tasks.
For more information, see Introduction to certificate profiles.
Capture OS image account
When you capture an OS image, Configuration Manager uses the Capture OS image account to access the
folder where you store captured images. If you add the Capture OS Image step to a task sequence, this
account is required.
The account must have Read and Write permissions on the network share where you store captured images.
If you change the password for the account in Windows, update the task sequence with the new password. The
Configuration Manager client receives the new password when it next downloads the client policy.
If you need to use this account, create one domain user account. Grant it minimal permissions to access the
required network resources, and use it for all capture task sequences.
IMPORTANT
Don't assign interactive sign-in permissions to this account.
Don't use the network access account for this account.
TIP
If you have a large Active Directory environment and need to change this account, use the following process to more
effectively coordinate this account update:
1. Create a new account with a different name
2. Add the new account to the list of client push installation accounts in Configuration Manager
3. Allow sufficient time for Active Directory Domain Services to replicate the new account
4. Then remove the old account from Configuration Manager and Active Directory Domain Services
IMPORTANT
Use domain or local group policy to assign the Windows user right to Deny log on locally . As a member of the
Administrators group, this account will have the right to sign in locally, which isn't needed. For better security, explicitly
deny the right for this account. The deny right supersedes the allow right.
IMPORTANT
Don't grant interactive sign-in rights to this account.
IMPORTANT
Don't grant interactive sign-in rights to this account.
For more information, see Use multicast to deploy Windows over the network.
Network access account
Client computers use the network access account when they can't use their local computer account to access
content on distribution points. It mostly applies to workgroup clients and computers from untrusted domains.
This account is also used during OS deployment, when the computer that's installing the OS doesn't yet have a
computer account on the domain.
IMPORTANT
The network access account is never used as the security context to run programs, install software updates, or run task
sequences. It's used only for accessing resources on the network.
A Configuration Manager client first tries to use its computer account to download the content. If it fails, it then
automatically tries the network access account.
If you configure the site for HTTPS or Enhanced HTTP, a workgroup or Azure AD-joined client can securely
access content from distribution points without the need for a network access account. This behavior includes
OS deployment scenarios with a task sequence running from boot media, PXE, or Software Center. For more
information, see Client to management point communication.
NOTE
If you enable Enhanced HTTP to not require the network access account, the distribution point needs to be running
Windows Server 2012 or later.
TIP
To avoid account lockouts, don't change the password on an existing network access account. Instead, create a new
account and set up the new account in Configuration Manager. When sufficient time has passed for all clients to have
received the new account details, remove the old account from the network shared folders and delete the account.
IMPORTANT
Don't grant interactive sign-in rights to this account.
Don't grant this account the right to join computers to the domain. If you must join computers to the domain during a
task sequence, use the Task sequence domain join account.
NOTE
The account you specify must have Log on locally permissions on the computer hosting the SQL Server Reporting
Services database.
The account is automatically granted all necessary rights by being added to the smsschm_users SQL Server Database Role
on the Configuration Manager database.
TIP
If you have many domain controllers and these accounts are used across domains, before you set up the site system,
check that Active Directory has replicated these accounts.
When you specify a local account on each site system to be managed, this configuration is more secure than using
domain accounts. It limits the damage that attackers can do if the account is compromised. However, domain accounts
are easier to manage. Consider the trade-off between security and effective administration.
IMPORTANT
Specify an account that has the least possible permissions for the required proxy server or firewall.
IMPORTANT
Specify an account that has the least possible permissions to send emails.
NOTE
Both the source site account and the source site database account are identified as Migration Manager in the
Accounts node of the Administration workspace in the Configuration Manager console.
NOTE
Both the source site account and the source site database account are identified as Migration Manager in the
Accounts node of the Administration workspace in the Configuration Manager console.
TIP
Create one domain user account with the minimal permissions to join the domain, and use it for all task sequences.
IMPORTANT
Don't assign interactive sign-in permissions to this account.
Don't use the network access account for this account.
Task sequence network folder connection account
The task sequence engine uses the Task sequence network folder connection account to connect to a
shared folder on the network. This account is required by the Connect to Network Folder task sequence step.
This account requires permissions to access the specified shared folder. It must be a domain user account.
TIP
Create one domain user account with minimal permissions to access the required network resources, and use it for all task
sequences.
IMPORTANT
Don't assign interactive sign-in permissions to this account.
Don't use the network access account for this account.
IMPORTANT
Don't use the network access account for this account.
Never make the account a domain admin.
Never set up roaming profiles for this account. When the task sequence runs, it downloads the roaming profile for the
account. This leaves the profile vulnerable to access on the local computer.
Limit the scope of the account. For example, create different task sequence run as accounts for each task sequence. Then
if one account is compromised, only the client computers to which that account has access are compromised.
If the command line requires administrative access on the computer, consider creating a local administrator account solely
for this account on all computers that run the task sequence. Delete the account once you no longer need it.
IMPORTANT
Modifying or removing these objects may cause drastic issues within a Configuration Manager environment. We
recommend that you don't make any changes to these objects.
smsdbuser_ReadOnly
This object is used to run queries under the read-only context. This object is used with several stored
procedures.
smsdbuser_ReadWrite
This object is used to provide permissions for dynamic SQL statements.
smsdbuser_ReportSchema
This object is used to run SQL Server Reporting Executions. The following stored procedure is used with this
function: spSRExecQuery .
IMPORTANT
Modifying or removing these objects may cause drastic issues within a Configuration Manager environment. Don't
change these objects. The following list is for information purposes only.
smsdbrole_AITool
Configuration Manager grants this permission to administrative user accounts based on role-based access to
import volume license information for Asset Intelligence. This account could be added by a Full Administrator,
Operations Administrator or Asset Manager role, or any role with 'Manage Asset Intelligence' permission.
smsdbrole_AIUS
Configuration Manager grants the computer account that hosts the Asset Intelligence synchronization point
account access to get Asset Intelligence proxy data and to view pending AI data for upload.
smsdbrole_CRP
Configuration Manager grants permission to the computer account of the site system that supports the
certificate registration point for Simple Certificate Enrollment Protocol (SCEP) support for certificate signing and
renewal.
smsdbrole_CRPPfx
Configuration Manager grants permission to the computer account of the site system that supports the
certificate registration point configured for PFX support for signing and renewal.
smsdbrole_DMP
Configuration Manager grants this permission to computer account for a management point that has the option
Allow mobile devices and Mac computers to uses this management point , the ability to provide
support for MDM enrolled devices.
smsdbrole_DmpConnector
Configuration Manager grants this permission to the computer account that hosts the service connection point
to retrieve and provide diagnostic data, manage cloud services, and retrieve service updates.
smsdbrole_DViewAccess
Configuration Manager grants this permission to the computer account of the primary site servers on the CAS
when the SQL Server distributed views option is selected in the replication link properties.
smsdbrole_DWSS
Configuration Manager grants this permission to the computer account that hosts the data warehouse role.
smsdbrole_EnrollSvr
Configuration Manager grants this permission to the computer account that hosts the enrollment point to allow
for device enrollment via MDM.
smsdbrole_extract
Provides access to all the extended schema views.
smsdbrole_HMSUser
For the hierarchy manager service. Configuration Manager grants permissions this account to manage failover
state messages and SQL Server Broker transactions between sites within a hierarchy.
NOTE
The smdbrole_WebPortal role is a member of this role by default.
smsdbrole_MCS
Configuration Manager grants this permission to the computer account of the distribution point that supports
multicast.
smsdbrole_MP
Configuration Manager grants this permission to the computer account that hosts the management point role
to provide support for the Configuration Manager clients.
smsdbrole_MPMBAM
Configuration Manager grants this permission to the computer account that hosts the management point that
manages BitLocker for an environment.
smsdbrole_MPUserSvc
Configuration Manager grants this permission to the computer account that hosts the management point to
support user-based application requests.
smsdbrole_siteprovider
Configuration Manager grants this permission to the computer account that hosts an SMS Provider role.
smsdbrole_siteserver
Configuration Manager grants this permission to the computer account that hosts the primary site or CAS.
smsdbrole_SUP
Configuration Manager grants this permission to the computer account that hosts the software update point for
working with third-party updates.
smsschm_users
Configuration Manager grants access to the account used for the reporting services point account to allow
access to the SMS reporting views to display the Configuration Manager reporting data. The data is further
restricted with the use of role-based access.
Elevated permissions
Configuration Manager requires some accounts to have elevated permissions for on-going operations. For
example, see Prerequisites for installing a primary site. The following list summarizes these permissions and the
reasons why they're needed.
The computer account of the primary site server and central administration site server requires:
Local Administrator rights on all site system servers. This permission is to manage, install, and
remove system services. The site server also updates local groups on the site system when you
add or remove roles.
Sysadmin access to the SQL Server instance for the site database. This permission is to configure
and manage SQL Server for the site. Configuration Manager tightly integrates with SQL, it's not
just a database.
User accounts in the Full Administrator role require:
Local Administrator rights on all site servers. This permission is to view, edit, remove, and install
system services, registry keys and values, and WMI objects.
Sysadmin access to the SQL Server instance for the site database. This permission is to install and
update the database during setup or recovery. It's also required for SQL Server maintenance and
operations. For example, reindexing and updating statistics.
NOTE
Some organizations may choose to remove sysadmin access and only grant it when it is required. This
behavior is sometimes referred to as "just-in-time (JIT) access." In this case, users with the Full
Administrator role should still have access to read, update, and execute stored procedures on the
Configuration Manager database. These permissions allow them to troubleshoot most issues without full
sysadmin access.
Communications between endpoints in
Configuration Manager
2/16/2022 • 11 minutes to read • Edit Online
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
HTTPS Using one of the following Location request: For user-centric scenarios,
methods: Anonymous using one of the following
- PKI certificate Client package: Anonymous methods to prove user
- Windows-integrated Registration, using one of identity:
authentication the following methods to - Windows-integrated
- Azure AD user or device prove device identity: authentication
token - Anonymous (manual - Azure AD user token
approval)
- Windows-integrated
authentication
- PKI certificate
- Azure AD user or device
token
After registration, the client
uses message signing to
prove device identity
TIP
For more information on the configuration of the management point for different device identity types and with the cloud
management gateway, see Enable management point for HTTPS.
DP T Y P E C L IEN T A UT H EN T IC AT IO N
NOTE
If you want to manage devices that are on the internet, you can install internet-based site system roles in your perimeter
network when the site system servers are in an Active Directory forest. This scenario doesn't require two-way trust
between the perimeter network and the site server's forest.
NOTE
A child site can be a primary site (where the central administration site is the parent site) or a secondary site.
Intersite communication in Configuration Manager uses database replication and file-based transfers. When you
install a site, you must specify an account with which to install the site on the designated server. This account
also establishes and maintains communication between sites. After the site successfully installs and initiates file-
based transfers and database replication, you don't have to configure anything else for communication to the
site.
When a two-way forest trust exists, Configuration Manager doesn't require any additional configuration steps.
By default, when you install a new child site, Configuration Manager configures the following components:
An intersite file-based replication route at each site that uses the site server computer account.
Configuration Manager adds the computer account of each computer to the
SMS_SiteToSiteConnection_<sitecode> group on the destination computer.
Database replication between the SQL Servers at each site.
Also set the following configurations:
Intervening firewalls and network devices must allow the network packets that Configuration Manager
requires.
Name resolution must work between the forests.
To install a site or site system role, you must specify an account that has local administrator permissions
on the specified computer.
Scenario 2: Communication in a site that spans forests
This scenario doesn't require a two-way forest trust.
Primary sites support the installation of site system roles on computers in remote forests.
When a site system role accepts connections from the internet, as a security best practice, install the site
system roles in a location where the forest boundary provides protection for the site server (for example, in a
perimeter network).
To install a site system role on a computer in an untrusted forest:
Specify a Site System Installation Account , which the site uses to install the site system role. (This
account must have local administrative credentials to connect to.) Then install site system roles on the
specified computer.
Select the site system option Require the site ser ver to initiate connections to this site system .
This setting requires the site server to establish connections to the site system server to transfer data.
This configuration prevents the computer in the untrusted location from initiating contact with the site
server that's inside your trusted network. These connections use the Site System Installation
Account .
To use a site system role that was installed in an untrusted forest, firewalls must allow the network traffic even
when the site server initiates the transfer of data.
Additionally, the following site system roles require direct access to the site database. Therefore, firewalls must
allow applicable traffic from the untrusted forest to the site's SQL Server:
Asset Intelligence synchronization point
Endpoint Protection point
Enrollment point
Management point
Reporting service point
State migration point
For more information, see Ports used in Configuration Manager.
You might need to configure the management point and enrollment point access to the site database.
By default, when you install these roles, Configuration Manager configures the computer account of the
new site system server as the connection account for the site system role. It then adds the account to the
appropriate SQL Server database role.
When you install these site system roles in an untrusted domain, configure the site system role
connection account to enable the site system role to obtain information from the database.
If you configure a domain user account to be the connection account for these site system roles, make sure that
the domain user account has appropriate access to the SQL Server database at that site:
Management point: Management Point Database Connection Account
Enrollment point: Enrollment Point Connection Account
Consider the following additional information when you plan for site system roles in other forests:
If you run Windows Firewall, configure the applicable firewall profiles to pass communications between
the site database server and computers that are installed with remote site system roles.
When the internet-based management point trusts the forest that contains the user accounts, user
policies are supported. When no trust exists, only computer policies are supported.
Scenario 3: Communication between clients and site system roles when the clients aren't in the same Active Directory forest as their
site server
Configuration Manager supports the following scenarios for clients that aren't in the same forest as their site's
site server:
There's a two-way forest trust between the forest of the client and the forest of the site server.
The site system role server is located in the same forest as the client.
The client is on a domain computer that doesn't have a two-way forest trust with the site server, and site
system roles aren't installed in the client's forest.
The client is on a workgroup computer.
Clients on a domain-joined computer can use Active Directory Domain Services for service location when their
site is published to their Active Directory forest.
To publish site information to another Active Directory forest:
Specify the forest and then enable publishing to that forest in the Active Director y Forests node of the
Administration workspace.
Configure each site to publish its data to Active Directory Domain Services. This configuration enables
clients in that forest to retrieve site information and find management points. For clients that can't use
Active Directory Domain Services for service location, you can use DNS or the client's assigned
management point.
Scenario 4: Put the Exchange Server connector in a remote forest
To support this scenario, make sure that name resolution works between the forests. For example, configure
DNS forwards. When you configure the Exchange Server connector, specify the intranet FQDN of the Exchange
Server. For more information, see Manage mobile devices with Configuration Manager and Exchange.
See also
Plan for security
Security and privacy for Configuration Manager clients
Enhanced HTTP
2/16/2022 • 6 minutes to read • Edit Online
NOTE
PKI certificates are still a valid option for customers with the following requirements:
All client communication is over HTTPS
Advanced control of the signing infrastructure
If you're already using PKI, site systems use the PKI certificate bound in IIS even if you enable enhanced HTTP.
Scenarios
The following scenarios benefit from enhanced HTTP:
Scenario 1: Client to management point
Azure Active Directory (Azure AD)-joined devices and devices with a Configuration Manager issued token can
communicate with a management point configured for HTTP if you enable enhanced HTTP for the site. With
enhanced HTTP enabled, the site server generates a certificate for the management point allowing it to
communicate via a secure channel.
NOTE
This scenario doesn't require using an HTTPS-enabled management point, but it's supported as an alternative to using
enhanced HTTP. For more information on using an HTTPS-enabled management point, see Enable management point for
HTTPS.
Features
The following Configuration Manager features support or require enhanced HTTP:
Cloud management gateway
OS deployment without a network access account
Enable co-management for new internet-based Windows devices
App approvals via email
Administration service
View recently connected consoles
BitLocker management key recovery (version 2103 and later)
Software Center user-available applications (version 2107 and later)
Company Portal on co-managed devices (version 2107 and later)
NOTE
The software update point and related scenarios have always supported secure HTTP traffic with clients as well as the
cloud management gateway. It uses a mechanism with the management point that's different from certificate- or token-
based authentication.
Unsupported scenarios
Enhanced HTTP doesn't currently secure all communication in Configuration Manager. The following list
summarizes some key functionality that's still HTTP.
Client peer-to-peer communication for content
State migration point
Remote tools
Reporting services point
NOTE
This list isn't exhaustive.
Prerequisites
A management point configured for HTTP client connections. Set this option on the General tab of the
management point role properties.
A distribution point configured for HTTP client connections. Set this option on the Communication tab
of the distribution point role properties. Don't enable the option to Allow clients to connect
anonymously .
For scenarios that require Azure AD authentication, onboard the site to Azure AD for cloud management.
If you don't onboard the site to Azure AD, you can still enable enhanced HTTP.
For Scenario 3 only: A client running a supported version of Windows 10 or later and joined to Azure AD.
The client requires this configuration for Azure AD device authentication.
NOTE
There are no OS version requirements, other than what the Configuration Manager client supports.
TIP
Wait up to 30 minutes for the management point to receive and configure the new certificate from the site.
You can also enable enhanced HTTP for the central administration site (CAS). Use this same process, and open
the properties of the CAS. This action only enables enhanced HTTP for the SMS Provider role at the CAS. It's not
a global setting that applies to all sites in the hierarchy.
For more information on how the client communicates with the management point and distribution point with
this configuration, see Communications from clients to site systems and services.
Conceptual diagram
This diagram summarizes and visualizes some of the main aspects of the enhanced HTTP functionality in
Configuration Manager.
The connection with Azure AD is recommended but optional. It enables scenarios that require Azure AD
authentication.
When you enable the site option for enhanced HTTP, the site issues self-signed certificates to site systems
such as the management point and distribution point roles.
With the site systems still configured for HTTP connections, clients communicate with them over HTTPS.
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
NOTE
Even if you don't directly use the administration service REST API, some Configuration Manager features natively use it,
including parts of the Configuration Manager console.
Next steps
Plan for security
Security and privacy for Configuration Manager clients
Configure security
Communication between endpoints
Hierarchy Maintenance Tool (Preinst.exe) for
Configuration Manager
2/16/2022 • 6 minutes to read • Edit Online
/DUMP < SiteCode > - Use this option on the local site server to write site control images to the root folder of
the drive on which the site is installed. You can write a specific site control image to the folder or write all site
control files in the hierarchy.
/DUMP <SiteCode> writes the site control image only for the specified site.
/DUMP writes the site control files for all sites.
An image is a binary representation of the site control file, which is stored in the Configuration Manager site
database. The dumped site control file image is a sum of the base image plus the pending delta images.
After dumping a site control file image with the Hierarchy Maintenance tool, the file name is in the format
sitectrl_<SiteCode>.ct0.
/STOPSITE - Use this option on the local site server to initiate a shutdown cycle for the Configuration Manager
Site Component Manager service, which partially resets the site. When this shutdown cycle is run, some
Configuration Manager services on a site server and its remote site systems are stopped. These services are
flagged for reinstallation. As a result of this shutdown cycle, some passwords are automatically changed when
the services are reinstalled.
NOTE
If you want to see a record of shutdown, reinstallation, and password changes for Site Component Manager, enable
logging for this component before using this command-line option.
After the shutdown cycle is started, it proceeds automatically, skipping any non-responding components or
computers. However, if the Site Component Manager service cannot access a remote site system during the
shutdown cycle, the components that are installed on the remote site system are reinstalled when the Site
Component Manager service is restarted. When it is restarted, the Site Component Manager service repeatedly
attempts reinstallation of all services that are flagged for reinstallation until it is successful.
You can restart the Site Component Manager service using Service Manager. After it is restarted, all affected
services are uninstalled, reinstalled, and restarted. After you use the /STOPSITE option to initiate the shutdown
cycle, you cannot avoid the reinstallation cycles after the Site Component Manager service is restarted.
/KEYFORPARENT - Use this option on a site to distribute the site's public key to a parent site.
The /KEYFORPARENT option places the public key of the site in the file <SiteCode>.CT4 at the root of the
program files drive. After you run preinst.exe with this option, manually copy the <SiteCode>.CT4 file to the
parent site's ...\Inboxes\hman.box folder (not hman.box\pubkey).
/KEYFORCHILD - Use this option on a site to distribute the site's public key to a child site.
The /KEYFORCHILD option places the public key of the site in the file <SiteCode>.CT5 at the root of the program
files drive. After you run preinst.exe with this option, manually copy the <SiteCode>.CT5 file to the child site's
...\Inboxes\hman.box folder (not hman.box\pubkey).
/CHILDKEYS - You can use this option on the child sites of a site that you are recovering. Use this option to
distribute public keys from multiple child sites to the recovering site.
The /CHILDKEYS option places the key from the site where you run the option, and all of that sites child sites
public keys into the file <SiteCode>.CT6.
After you run preinst.exe with this option, manually copy the <SiteCode>.CT6 file to the recovering site's
...\Inboxes\hman.box folder (not hman.box\pubkey).
/PARENTKEYS - You can use this option on the parent site of a site that you are recovering. Use this option to
distribute public keys from all parent sites to the recovering site.
The /PARENTKEYS option places the key from the site where you run the option, and the keys from each parent
site above that site into the file <SiteCode>.CT7.
After you run preinst.exe with this option, manually copy the <SiteCode>.CT7 file to the recovering site's
...\Inboxes\hman.box folder (not hman.box\pubkey).
NOTE
After the public keys are manually exchanged, you can review the hman.log log file, which records site configuration
changes and site information publication to Active Directory Domain Services, on the parent site server to ensure that the
primary site has processed the new public key.
To manually transfer the child site public key to the parent site
1. While logged on to the child site, open a command prompt and navigate to the location of Preinst.exe .
2. Type the following to export the child site's public key: Preinst /keyforparent
3. The /keyforparent option places the public key of the child site in the <site code>.CT4 file located at the
root of the system drive.
4. Move the <site code>.CT4 file to the parent site's <install director y>\inboxes\hman.box folder.
To manually transfer the parent site public key to the child site
1. While logged on to the parent site, open a command prompt and navigate to the location of Preinst.exe .
2. Type the following to export the parent site's public key: Preinst /keyforchild .
3. The /keyforchild option places the public key of the parent site in the <site code>.CT5 file located at the
root of the system drive.
4. Move the <site code>.CT5 file to the <install director y>\inboxes\hman.box directory on the child
site.
International support in Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
GB18030 Requirements
Configuration Manager meets the standards that are defined in GB18030 so that you can use Configuration
Manager in China. A Configuration Manager deployment must have the following configurations to meet the
GB18030 requirements:
Each site server computer and SQL Server computer that you use with Configuration Manager must use
a Chinese operating system.
Each site database and each instance of SQL Server in the hierarchy must use the same collation, and
must be one of the following:
Chinese_Simplified_Pinyin_100_CI_AI
Chinese_Simplified_Stroke_Order_100_CI_AI
NOTE
These database collations are an exception to the requirements that are noted in Support for SQL Server versions
for Configuration Manager.
You must place a file with the name GB18030.SMS in the root folder of the system volume of each site
server computer in the hierarchy. This file does not contain any data and can be an empty text file that is
named to meet this requirement.
Interoperability between different versions of
Configuration Manager
2/16/2022 • 6 minutes to read • Edit Online
Next steps
Use the Configuration Manager client software for extended interoperability with future versions of a Current
Branch site
Language packs in Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
Server languages
Use the following table to map a locale ID to a language that you want to support on servers. For more
information about locale IDs, see Locale IDs assigned by Microsoft.
Client languages
Use the following table to map a locale ID to a language that you want to support on client computers. For more
information about locale IDs, see Locale IDs assigned by Microsoft.
Customize hardware inventory to collect this information. Then build a custom report to view the language
details. For more information about collecting custom hardware inventory, see How to configure hardware
inventory. For more information, see Create reports.
About log files in Configuration Manager
2/16/2022 • 10 minutes to read • Edit Online
How it works
Most processes in Configuration Manager write operational information to a log file that is dedicated to that
process. The log files are identified by .log or .lo_ file extensions. Configuration Manager writes to a .log
file until that log reaches its maximum size. When the log is full, the .log file is copied to a file of the same
name but with the .lo_ extension, and the process or component continues to write to the .log file. When the
.log file again reaches its maximum size, the .lo_ file is overwritten and the process repeats. Some
components establish a log file history by appending a date and time stamp to the log file name and by keeping
the .log extension.
NOTE
Support Center Log File Viewer and OneTrace use Windows Presentation Foundation (WPF). This component isn't
available in Windows PE. Continue to use CMTrace in boot images with task sequence deployments.
Configure logging options
You can change the configuration of the log files, such as the verbose level, size, and history. There are several
ways to change these settings:
During client installation
Using Configuration Manager Service Manager
Using the Windows Registry
In the Configuration Manager console
You can also use hardware inventory to collect log settings from clients.
Configure logging options during client installation
You can set the configuration of the client log files during installation. Use the following properties:
CCMENABLELOGGING
CCMDEBUGLOGGING
CCMLOGLEVEL
CCMLOGMAXHISTORY
CCMLOGMAXSIZE
For more information, see Client installation properties.
Configure logging options by using Configuration Manager Service Manager
You can change where Configuration Manager stores the log files, and their size.
To modify the size of log files, change the name and location of the log file, or to force multiple components to
write to a single log file, do the following steps:
Modify logging for a component
1. In the Configuration Manager console, go to the Monitoring workspace, expand System Status , and
then select either the Site Status or Component Status node.
2. In the ribbon, select Star t , and then select Configuration Manager Ser vice Manager .
3. When Configuration Manager Service Manager opens, connect to the site that you want to manage. If the
site that you want to manage isn't shown, select Site , select Connect , and then enter the name of the site
server for the correct site.
4. Expand the site and go to Components or Ser vers , depending on where the components that you want
to manage are located.
5. In the right pane, select one or more components.
6. On the Component menu, select Logging .
7. In the Configuration Manager Component Logging dialog box, complete the available configuration
options for your selection.
8. Select OK to save the configuration.
Configure logging options by using the Windows Registry
Use the Windows Registry on the servers or clients to change the following logging options:
Verbose level
Maximum history
Maximum size
When troubleshooting a problem, you can enable verbose logging for Configuration Manager to write
additional details in the log files.
WARNING
Misconfiguration of these settings can cause Configuration Manager to log large amounts of information, or none at all.
While this data can be beneficial for troubleshooting, be cautious when changing these values in production sites. Always
test these changes in a lab environment first. Excessive logging can occur, which might make it difficult to find relevant
information in the log files.
After you make changes to these registry settings, restart the component:
If you change the client settings, restart the SMS Agent Host service (CcmExec).
If you change the server settings, restart the SMS Executive service.
The registry settings vary depending upon the component:
Client and management point
Site server
Site system role
Configuration Manager console
Client and management point logging options
To configure logging options for all components on a client or management point site system, configure these
REG_DWORD values under the following Windows Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CCM\Logging\@Global
LogMaxHistory Any integer greater than or equal to When a log file reaches the maximum
zero, for example: size, the client renames it as a backup
0 : No history and creates a new log file. Specify how
1 : Default many previous versions to keep.
LogMaxSize Any integer greater than or equal to The maximum log file size in bytes.
10,000, for example: When a log grows to the specified size,
250000 the client renames it as a history file,
and creates a new file. The default
value is 250,000 bytes.
NOTE
Don't change other values that may exist in this registry key.
For advanced debugging, you can also add this REG_SZ value under the following Windows Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CCM\Logging\DebugLogging
NAME VA L UES DESC RIP T IO N
This setting causes the client to log low-level information for troubleshooting. Avoid using this setting in
production sites. Excessive logging can occur, which might make it difficult to find relevant information in the log
files. Make sure to turn off this setting after you resolve the issue.
Site server logging options
You can configure settings globally or for a specific component on the Configuration Manager site server.
Configure these values under the following Windows Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing
ArchivePath A valid folder path, for REG_SZ The path to archive site
example C:\Logs\Archive server logs.
Only enable SQL Server tracing for troubleshooting purposes. Avoid using it in production sites. Excessive
logging can occur, which might make it difficult to find relevant information in the log files. Make sure to turn off
this setting after you resolve the issue.
NOTE
Don't change other values that may exist in this registry key.
To configure logging options for a specific server component, configure these REG_DWORD values under the
following Windows Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\Tracing\<ComponentName>
LogMaxHistory Any integer greater than or equal to When a log file reaches the maximum
zero, for example: size, the server renames it as a backup
0 : No history and creates a new log file. Specify how
1 : Default many previous versions to keep.
NAME VA L UES DESC RIP T IO N
MaxFileSize Any integer greater than or equal to The maximum log file size in bytes.
10,000, for example: When a log grows to the specified size,
250000 the client renames it as a history file,
and creates a new file. The default
value is 250,000 bytes.
The DebugLogging setting causes the server to log low-level information for troubleshooting. Avoid using this
setting in production sites. Excessive logging can occur, which might make it difficult to find relevant information
in the log files. Make sure to turn off this setting after you resolve the issue.
NOTE
Don't change other values that may exist in this registry key.
LogMaxHistory Any integer greater than or equal to When a log file reaches the maximum
zero, for example: size, the server renames it as a backup
0 : No history and creates a new log file. Specify how
1 : Default many previous versions to keep.
LogMaxSize Any integer greater than or equal to The maximum log file size in bytes.
10,000, for example: When a log grows to the specified size,
250000 the server renames it as a history file,
and creates a new file. The default
value is 250,000 bytes.
NOTE
Don't change other values that may exist in this registry key.
2. Under the system.diagnostics > sources > source element, change the switchValue attribute from
Error to Verbose . For example:
NOTE
This inventory class isn't enabled by default.
For more information, see Enable or disable existing hardware inventory classes.
TIP
The read-only task sequence variable _SMSTSLogPath always contains the path of the current log file.
Next steps
Log files reference
Support Center OneTrace
Support Center log file viewer
CMTrace
Log file reference
2/16/2022 • 44 minutes to read • Edit Online
LO G N A M E DESC RIP T IO N
CcmExec.log Records activities of the client and the SMS Agent Host
service. This log file also includes information about enabling
and disabling wake-up proxy.
ccmsqlce.log Records activities for the SQL Server Compact Edition (CE)
that the client uses. This log is typically only used when you
enable debug logging, or there's a problem with the
component. The client health task (ccmeval) usually self-
corrects problems with this component.
ClientIDManagerStartup.log Creates and maintains the client GUID and identifies tasks
during client registration and assignment.
execmgr.log Records details about packages and task sequences that run
on the client.
LO G N A M E DESC RIP T IO N
FSPStateMessage.log Records the activity for state messages that are sent to the
fallback status point by the client.
InternetProxy.log Records the network proxy configuration and use activity for
the client.
LocationCache.log Records the activity for location cache use and maintenance
for the client.
MaintenanceCoordinator.log Records the activity for general maintenance tasks for the
client.
SCClient_<domain>@<username>_1.log Records the activity in Software Center for the specified user
on the client computer.
SCNotify_<domain>@<username>_1.log Records the activity for notifying users about software for
the specified user.
SensorWmiProvider.log Records the activity of the WMI provider for the endpoint
analytics sensor.
UserAffinityProvider.log Technical details from the component that tracks user device
affinity.
Client installation
The following table lists the log files that contain information related to the installation of the Configuration
Manager client.
LO G N A M E DESC RIP T IO N
LO G N A M E DETA IL S LO C AT IO N
LO G N A M E DETA IL S LO C AT IO N
The log file SMS_DM.log on the site system server also records communication between Mac computers and
the management point that is set up for mobile devices and Mac computers.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
adminservice.log Records actions for the SMS Provider Computer with the SMS Provider
administration service REST API
Inboxast.log Records the files that are moved from Site server
the management point to the
corresponding INBOXES folder on the
site server.
ResourceExplorer.log Records errors, warnings, and Computer that runs the Configuration
information about running Resource Manager console
Explorer.
RESTPROVIDERSetup.log Installation of the SMS Provider Computer with the SMS Provider
administration service REST API
SMS_ISVUPDATES_SYNCAGENT.log Log file for synchronization of third- Top-level software update point in the
party software updates. Configuration Manager hierarchy.
SMS_PhasedDeployment.log Log file for phased deployments Top-level site in the Configuration
Manager hierarchy
SMS_REST_PROVIDER.log Service health state for the SMS Computer with the SMS Provider
Provider administration service REST
API, including certificate information
smsexec.log Records the processing of all site Site server or site system server
server component threads.
SMSProv.log Records WMI provider access to the Computer with the SMS Provider
site database.
smstsvc.log Records information about the Site server and site system server
installation, use, and removal of a
Windows service. Windows uses this
service to test network connectivity
and permissions between servers. It
uses the computer account of the
server that creates the connection.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Management point
The following table lists the log files that contain information related to the management point.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
MP_Relay.log Records the transfer of files that are Site system server
collected from the client.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
CollEval.log Records details about when collections Primary site and central administration
are created, changed, and deleted by site
the Collection Evaluator.
Cloudusersync.log Records license enablement for users. Computer with the service connection
point
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Dmpdownloader.log Records details about downloads from Computer with the service connection
Microsoft, such as site updates. point
Dmpuploader.log Records detail related to uploading Computer with the service connection
database changes to Microsoft. point
EndpointConnectivityCheckWorker.log Starting in version 2010, records detail Computer with the service connection
related to checks for important point
internet endpoints.
WsfbSyncWorker.log Records information about the Computer with the service connection
communication with the Microsoft point
Store for Business.
ServiceConnectionTool.log Records details about use of the Same location as the tool
service connection tool based on the
parameter you use. Each time you run
the tool, it replaces any existing log file.
SMS_CLOUDCONNECTION.log Records information about cloud Computer with the service connection
services. point
Smsprov.log Records activities of the SMS Provider. Computer with the SMS Provider
Configuration Manager console
activities use the SMS Provider.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
SrvBoot.log Records details about the service Computer with the service connection
connection point installer service. point
Statesys.log Records the processing of mobile Primary site and central administration
device management messages. site
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
PatchDownloader.log Records details about the process of When you manually download
downloading software updates from updates, this file is in your %temp%
the update source to the download directory on the computer where you
destination on the site server. use the console. For automatic
deployment rules, if the Configuration
Manager client is installed on the site
server, this file is on the site server in
%windir%\CCM\Logs .
SMS_ISVUPDATES_SYNCAGENT.log Log file for synchronization of third- Top-level software update point in the
party software updates. Configuration Manager hierarchy.
WCM.log Records details about the software Site server that connects to the WSUS
update point configuration and server
connections to the WSUS server for
subscribed update categories,
classifications, and languages.
WUSSyncXML.log Records details about the Inventory Client computer configured as the sync
Tool for the Microsoft Updates sync host for the Inventory Tool for
process. Microsoft Updates
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
WsfbSyncWorker.log Records information about the Computer with the service connection
communication with the Microsoft point
Store for Business.
PrestageContent.log Records details about the use of the Site system server
ExtractContent.exe tool on a remote,
prestaged distribution point. This tool
extracts content that has been
exported to a file.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
SMS_CLOUDCONNECTION.log Records information about cloud Computer with the service connection
services. point
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Asset Intelligence
The following table lists the log files that contain information related to Asset Intelligence.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
smssqlbkup.log Records output from the site database Site database server
backup process when SQL Server is
installed on a server that isn't the site
server.
Certificate enrollment
The following table lists the Configuration Manager log files that contain information related to certificate
enrollment. Certificate enrollment uses the certificate registration point and the Configuration Manager Policy
Module on the server that's running the Network Device Enrollment Service (NDES).
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
CertEnrollAgent.log Records client communication with Windows Hello for Business client
NDES for certificate requests using the
Simple Certificate Enrollment Protocol
(SCEP).
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Along with the Configuration Manager log files, review the Windows Application logs in Event Viewer on the
server running the Network Device Enrollment Service and the server hosting the certificate registration point.
For example, look for messages from the NetworkDeviceEnrollmentSer vice source.
You can also use the following log files:
IIS log files for Network Device Enrollment Service:
%SYSTEMDRIVE%\inetpub\logs\LogFiles\W3SVC1
IIS log files for the certificate registration point: %SYSTEMDRIVE%\inetpub\logs\LogFiles\W3SVC1
Network Device Enrollment Policy log file: mscep.log
NOTE
This file is located in the folder for the NDES account profile, for example, in C:\Users\SCEPSvc. For more
information about how to enable NDES logging, see the Enable Logging section of the NDES wiki.
Client notification
The following table lists the log files that contain information related to client notification.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
CloudMgr.log Records details about deploying the The installdir folder on the primary site
cloud management gateway service, server or CAS.
ongoing service status, and use data
associated with the service. To
configure the logging level, edit the
Logging level value in the following
registry key:
HKLM\SOFTWARE\
Microsoft\SMS\COMPONENTS\
SMS_CLOUD_ SERVICES_MANAGER
CMGSetup.log No te 1 Records details about the second The %approot%\logs on your Azure
phase of the cloud management server, or the SMS/Logs folder on the
gateway deployment (local site system server
deployment in Azure). To configure the
logging level, use the setting Trace
level (Information (Default),
Verbose , Error ) on the Azure
por tal\Cloud ser vices
configuration tab.
CMGService.log No te 1 Records details about the cloud The %approot%\logs on your Azure
management gateway service core server, or the SMS/Logs folder on the
component in Azure. To configure the site system server
logging level, use the setting Trace
level (Information (Default),
Verbose , Error ) on the Azure
por tal\Cloud ser vices
configuration tab.
CMGContentService.log No te 1 When you enable a CMG to also serve The %approot%\logs on your Azure
content from Azure storage, this log server, or the SMS/Logs folder on the
records the details of that service. site system server
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
ConfigMgrAdminUISetup.log Records the installation of the Computer that runs the Configuration
Configuration Manager console. Manager console
SmsAdminUI.log Records information about the Computer that runs the Configuration
operation of the Configuration Manager console
Manager console.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Smsprov.log Records activities of the SMS Provider. Site server or site system server
Configuration Manager console
activities use the SMS Provider.
Content management
The following table lists the log files that contain information related to content management.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
DataTransferService.log Records all BITS communication for Computer that is configured as a pull-
policy or package access. This log also distribution point
is used for content management by
pull-distribution points.
PullDP.log Records details about content that the Computer that is configured as a pull-
pull-distribution point transfers from distribution point
source distribution points.
PrestageContent.log Records the details about the use of Site system role
the ExtractContent.exe tool on a
remote, prestaged distribution point.
This tool extracts content that has
been exported to a file.
smsdpprov.log Records details about the extraction of Distribution point computer that isn't
compressed files received from a colocated with the site server
primary site. This log is generated by
the WMI provider of the remote
distribution point.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Desktop Analytics
Use the following log files to help troubleshoot issues with Desktop Analytics integrated with Configuration
Manager.
The log files on the service connection point are in the following directory:
%ProgramFiles%\Configuration Manager\Logs\M365A . The log files on the Configuration Manager client are in the
following directory: %WinDir%\CCM\logs .
LO G DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Discovery
The following table lists the log files that contain information related to discovery.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Endpoint analytics
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Endpoint Protection
The following table lists the log files that contain information related to Endpoint Protection.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Extensions
The following table lists the log files that contain information related to extensions.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
AdminUI.ExtensionInstaller.log Records information about the Computer that runs the Configuration
download of extensions from Manager console
Microsoft, and the installation and
uninstallation of all extensions.
FeatureExtensionInstaller.log Records information about the Computer that runs the Configuration
installation and removal of individual Manager console
extensions when they're enabled or
disabled in the Configuration Manager
console.
Inventory
The following table lists the log files that contain information related to processing inventory data.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Metering
The following table lists the log files that contain information related to metering.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Migration
The following table lists the log files that contain information related to migration.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Mobile devices
The following sections list the log files that contain information related to managing mobile devices.
Enrollment
The following table lists logs that contain information related to mobile device enrollment.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
dmpmsi.log Records the Windows Installer data for Site system server
the configuration of a management
point that is enabled for mobile
devices.
enrollsrvMSI.log Records the Windows Installer data for Site system server
the configuration of an enrollment
point.
enrollwebMSI.log Records the Windows Installer data for Site system server
the configuration of an enrollment
proxy point.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
DmClientHealth.log Records the GUIDs of all mobile device Site system server
legacy clients that communicate with
the management point that is enabled
for mobile devices.
DmpDiscovery.log Records all the discovery data from the Site system server
mobile device legacy clients on the
management point that is enabled for
mobile devices.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
dmpmsi.log Records the Windows Installer data for Site system server
the configuration of a management
point that is enabled for mobile
devices.
OS deployment
The following table lists the log files that contain information related to OS deployment.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
CreateTSMedia.log Records details for task sequence Computer that runs the Configuration
media creation. Manager console
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
SMS_PhasedDeployment.log Log file for phased deployments Top-level site in the Configuration
Manager hierarchy
Power management
The following table lists the log files that contain information related to power management.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Remote control
The following table lists the log files that contain information related to remote control.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
CMRcViewer.log Records details about the activity of On the computer that runs the remote
the remote control viewer. control viewer, in the %temp% folder.
Reporting
The following table lists the Configuration Manager log files that contain information related to reporting.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
SMSProv.log Records WMI provider access to the Computer with the SMS Provider
site database.
Software metering
The following table lists the log files that contain information related to software metering.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Software updates
The following table lists the log files that contain information related to software updates.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
PatchDownloader.log Records details about the process of When downloading updates manually,
downloading software updates from this log file is located in the %temp%
the update source to the download directory of the user running the
destination on the site server. console on the machine you're running
the console. For Automatic
Deployment Rules, this log file is
located on the site server in
%windir%\CCM\Logs, if the ConfigMgr
client is installed on the site server.
SMS_ISVUPDATES_SYNCAGENT.log Log file for synchronization of third- Top-level software update point in the
party software updates. Configuration Manager hierarchy.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Wake On LAN
The following table lists the log files that contain information related to using Wake On LAN.
NOTE
When you supplement Wake On LAN by using wake-up proxy, this activity is logged on the client. For example, see
CcmExec.log and SleepAgent_<domain>@SYSTEM_0.log in the Client operations section of this article.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
Windows servicing
The following table lists the log files that contain information related to Windows servicing.
Servicing uses the same infrastructure and process as software updates. For other logs applicable to the
servicing scenario, see Software updates.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
See also
About log files
Support Center OneTrace
Support Center log file viewer
CMTrace
Release notes for Configuration Manager
2/16/2022 • 10 minutes to read • Edit Online
TIP
You can use RSS to be notified when this page is updated. For more information, see How to use the docs.
Client management
Some policies may not apply to upgraded clients
Applies to version 2107 early update ring
When you upgrade the client from versions 2010 or 2103 to version 2107, the following policies may not apply
on some devices:
Co-management policies on Windows 10 Enterprise multi-session devices such as Azure Virtual Desktop,
and Windows 11 Insider Preview devices
Desktop Analytics on any Windows version
Windows Update for Business policies on Windows 10 x86 and ARM
Microsoft Edge browser profiles on Windows 10 x64 and x86
NOTE
The timing of how clients apply and evaluate these policies is non-deterministic. Even if you have these policies and these
supported platforms, they may not immediately experience this issue.
When you look at the Configurations tab of the Configuration Manager control panel on the client, it will be
blank.
This issue is fixed in the build of version 2107 that's now generally available for all customers. If you previously
opted in to the early update ring, install the Update for Microsoft Endpoint Configuration Manager version 2107,
early update ring.
Client notification actions apply to entire collection
Applies to version 2010
When you use a client notification action on a device in a collection, the action applies to all devices in the
collection.
For example:
1. In the Configuration Manager console, go to the Assets and Compliance workspace, and select the
Device Collections node.
2. Select a collection, and then choose the Show Members action.
3. Select a device in the collection. In the ribbon on the Home tab, select Client Notification , and choose
an action such as Restar t .
Because of this issue, this action applies to all members of the collection, not just the selected client.
NOTE
This issue doesn't apply to the Star t CMPivot or Run Script options.
To work around this issue, install the following hotfix: Client notifications sent to all collection members in
Configuration Manager current branch, version 2010.
You can also use the Devices node. Find the device in the list and start the action from there.
NOTE
This issue also applies to the Invoke-CMClientAction PowerShell cmdlet and other SDK methods, if you don't include a
collection object or ID.
This failure happens because the service connection point can't communicate with the required internet
endpoint, configmgrbits.azureedge.net . Confirm that the site system that hosts the service connection point role
can communicate with this internet endpoint. It was already required, but its use is expanded in version 2107.
The site system can't download version 2107 or later unless your network allows traffic to this URL.
For more information, see internet access requirements for the service connection point.
Management point installation or update fails because of later Visual C++ version
Applies to: version 2107 early update ring
If the site system server has a version of the Visual C++ redistributable later than 14.28.29914, Configuration
Manager setup will fail to install or update the management point role.
To work around this issue, temporarily uninstall the later version of Visual C++ redistributable. When you install
Configuration Manager version 2107, it will install version 14.28.29914.
OS deployment
Image servicing with Windows Server 2022
Applies to: version 2107
If you try to apply software updates to an image for Windows Server 2022, no updates display as available to
install.
This issue is caused by a change to the Windows update category for Server 2022.
To resolve this issue, install the update rollup for Configuration Manager version 2107.
Task sequence and application policy issue
Applies to: version 2107 early update ring installed between August 2, 2021 and August 6, 2021
If you have all of the following conditions:
Task sequence A
Includes the Install Application step with app X
Deployed and made available to either type that includes Configuration Manager clients
Task sequence B
Includes the Install Application step with the same app X
Deployed and made available to either Only media and PXE option
After you update to version 2107, if you make any change to app X, then task sequence A will fail to run on
clients that receive the deployment policy after the site update. The Configuration Manager client can't get all of
the policies for the task sequence and referenced applications. For clients that already had the deployment
policy for task sequence A before the site update, the task sequence will run, but clients won't have the revised
application policy.
You can run the following SQL script on a primary site database to determine if your site has this issue:
If this query returns 0 , there's currently no issue. If the query returns a non-zero value, the issue only exists
given the above conditions.
NOTE
If there are many media and PXE task sequences that reference an application that you revise, the site will take longer to
update these task sequence policies. During this time, some media and PXE task sequence deployments may fail. There's
no workaround for this timing issue.
Workaround for task sequence and application policy issue in version 2107 early update ring
This issue is fixed in the build of version 2107 that's now generally available for all customers. If you previously
opted in to the early update ring, install the Update for Microsoft Endpoint Configuration Manager version 2107,
early update ring.
For OS deployment task sequences to existing clients not with PXE, you may see entries similar to the following
strings in the ExecMgr.log on the client:
For this issue, after you install the update for version 2107 early update ring, run the following SQL query on
the primary site to which the client is assigned:
For each CI_ID that this query returns, create a 0-KB file named <ci_id>.cit . For example, 16777225.cit . Move
the file to the policypv.box directory on the primary site server. For example,
\\cmpri01.contoso.com\SMS_PR1\inboxes\policypv.box\ .
Software updates
Security roles are missing for phased deployments
The OS Deployment Manager built-in security role has permissions to phased deployments. The following
roles are missing these permissions:
Application Administrator
Application Deployment Manager
Software Update Manager
The App Author role may appear to have some permissions to phased deployments, but can't create
deployments.
A user with one these roles can start the Create Phased Deployment wizard, and can see phased deployments
for an application or software update. They can't complete the wizard, or make any changes to an existing
deployment.
To work around this issue, create a custom security role. Copy an existing security role, and add the following
permissions on the Phased Deployment object class:
Create
Delete
Modify
Read
For more information, see Create custom security roles
CMPivot
Favorite queries lose line breaks or are truncated
Applies to: version 2107 early update ring
After you update the site to version 2107, there are two issues with CMPivot queries that you saved as a
favorite:
When you edit the query, you may see unexpected characters like \r or \t .
The query after the last comma ( , ) is removed.
This issue is fixed in the build of version 2107 that's now generally available for all customers. If you previously
opted in to the early update ring, install the Update for Microsoft Endpoint Configuration Manager version 2107,
early update ring.
State messages in Configuration Manager
2/16/2022 • 10 minutes to read • Edit Online
NOTE
A state message ID value of zero ( 0 ) typically indicates that the topic type is in an unknown state.
Software updates
300 STATE_TOPICTYPE_SUM_ASSIGNMENT_COMPLIANCE
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Compliant
2 Non-compliant
301 STATE_TOPICTYPE_SUM_ASSIGNMENT_ENFORCEMENT
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Installing updates
8 Downloaded updates
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
302 STATE_TOPICTYPE_SUM_ASSIGNMENT_EVALUATION
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Evaluation activated
2 Evaluation succeeded
3 Evaluation failed
400 STATE_TOPICTYPE_SUM_CI_DETECTION
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Not required
2 Not detected
3 Detected
401 STATE_TOPICTYPE_SUM_CI_COMPLIANCE
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Compliant
2 Non-compliant
3 Conflict detected
4 Error
5 Unknown
6 Partial compliance
402 STATE_TOPICTYPE_SUM_CI_ENFORCEMENT
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Enforcement started
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
6 General failure
7 Pending installation
8 Installing update
12 Downloading update
13 Downloaded update
500 STATE_TOPICTYPE_SUM_UPDATE_DETECTION
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
2 Update is required
3 Update is installed
501 STATE_TOPICTYPE_SUM_UPDATE_SOURCE_SCAN
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
2 Scan is running
3 Scan complete
5 Scan failed
TO P IC T Y P E DESC RIP T IO N
700 STATE_TOPICTYPE_RESYNC_STATE_MSG
701 STATE_TOPICTYPE_SYSTEM_HEARTBEAT
702 STATE_TOPICTYPE_CKD_UPDATE
801 STATE_TOPICTYPE_DEVICE_CLIENT_DEPLOYMENT
800 STATE_TOPICTYPE_CLIENT_DEPLOYMENT
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
318 Can't install the client on the MP because the MP and client
versions do not match
607 Site assignment failed; client version higher than site version
810 STATE_TOPICTYPE_CLIENT_COMANAGEMENT
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
820 STATE_TOPICTYPE_CLIENT_WUFB
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
Content
The following topic types have no state IDs:
TO P IC T Y P E DESC RIP T IO N
901 STATE_TOPICTYPE_REMOTE_DP_MONITORING
902 STATE_TOPICTYPE_PULL_DP_MONITORING
903 STATE_TOPICTYPE_DP_USAGE
900 STATE_TOPICTYPE_BRANCH_DP
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Disk Space
Client operations
1000 STATE_TOPICTYPE_CLIENT_FRAMEWORK_COMM
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1001 STATE_TOPICTYPE_CLIENT_FRAMEWORK_LOCAL
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1100 STATE_TOPICTYPE_CLIENT_FRAMEWORK_MODEREADINESS
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1300 STATE_TOPICTYPE_CLIENT_HEALTH
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Success
2 Not successful
TO P IC T Y P E DESC RIP T IO N
1002 STATE_TOPICTYPE_DEVICE_CLIENT_FRAMEWORK_COMM
1003 STATE_TOPICTYPE_DEVICE_CLIENT_FRAMEWORK_LOCAL
TO P IC T Y P E DESC RIP T IO N
1004 STATE_TOPICTYPE_DEVICE_CLIENT_FRAMEWORK_CERTIFICA
TE
1005 STATE_TOPICTYPE_DEVICE_CLIENT_WIPE
1006 STATE_TOPICTYPE_DEVICE_CLIENT_RETIRE
1007 STATE_TOPICTYPE_DEVICE_CLIENT_WIPE_INTUNE
1008 STATE_TOPICTYPE_DEVICE_CLIENT_RETIRE_INTUNE
1009 STATE_TOPICTYPE_DEVICE_CLIENT_DEVICELOCK
1010 STATE_TOPICTYPE_DEVICE_CLIENT_DEVICELOCK_INTUNE
1011 STATE_TOPICTYPE_DEVICE_CLIENT_DEVICEPINRESET
1012 STATE_TOPICTYPE_DEVICE_CLIENT_DEVICEPINRESET_INTUN
E
1013 STATE_TOPICTYPE_DEVICE_CLIENT_DEVICEPINRESET_ONPRE
M
1014 STATE_TOPICTYPE_DEVICE_CLIENT_DEVICEALBYPASS
1015 STATE_TOPICTYPE_DEVICE_CLIENT_DEVICEALBYPASS_INTUN
E
Miscellaneous
The following topic types have no state IDs:
TO P IC T Y P E DESC RIP T IO N
1401 STATE_TOPICTYPE_STATE_REPORT
1500 STATE_TOPICTYPE_CAL_TRACK_UT
1502 STATE_TOPICTYPE_CAL_TRACK_MT
1503 STATE_TOPICTYPE_CAL_TRACK_ML
1600 STATE_TOPICTYPE_USER_AFFINITY
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1660 STATE_TOPICTYPE_SENSOR_STATUS
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Sensor off
2 Sensor on
Applications
The following topic types have no state IDs:
TO P IC T Y P E DESC RIP T IO N
1700 STATE_TOPICTYPE_APP_CI_SCAN
1701 STATE_TOPICTYPE_APP_CI_COMPLIANCE
1703 STATE_TOPICTYPE_APP_CI_ASSIGNMENT_EVALUATION
1704 STATE_TOPICTYPE_APP_CI_LAUNCH
1702 STATE_TOPICTYPE_APP_CI_ENFORCEMENT
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
Events
The following topic types have no state IDs:
TO P IC T Y P E DESC RIP T IO N
1800 STATE_TOPICTYPE_EVENT_INTRINSIC
1801 STATE_TOPICTYPE_EVENT_EXTRINSIC
Endpoint protection
The following topic types have no state IDs:
TO P IC T Y P E DESC RIP T IO N
1900 STATE_TOPICTYPE_EP_AM_INFECTION
1901 State_Topictype_Ep_Am_Health
1902 STATE_TOPICTYPE_EP_MALWARE
1950 STATE_TOPICTYPE_ATP_HEALTH_STATUS
2001 STATE_TOPICTYPE_EP_CLIENT_DEPLOYMENT
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
2002 STATE_TOPICTYPE_EP_CLIENT_POLICYAPPLICATION
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
2003 STATE_TOPICTYPE_CLIENT_ACTION
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Not applicable
2 Failed
3 Succeeded
Wake-up proxy
2100 STATE_TOPICTYPE_WP_CLIENT_DEPLOYMENT
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
TO P IC T Y P E DESC RIP T IO N
2200 STATE_TOPICTYPE_FDM
2201 STATE_TOPICTYPE_CCM_CERT_BINDING
2202 STATE_TOPICTYPE_SERVER_STATISTIC
4000 STATE_TOPICTYPE_MDM_DEVICE_PROPERTY
4002 STATE_TOPICTYPE_MDM_CLIENT_IDENITITY
4003 STATE_TOPICTYPE_MDM_APPLICATION_REQUEST
4004 STATE_TOPICTYPE_MDM_APPLICATION_STATE
4005 STATE_TOPICTYPE_MDM_LICENSE_DEVICE_RELATION
4006 STATE_TOPICTYPE_MDM_LICENSE_KEYS
4007 STATE_TOPICTYPE_MDM_POLICY_ASSIGNMENT
4008 STATE_TOPICTYPE_MDM_ANDROID_COUNT
4009 STATE_TOPICTYPE_MDM_SLK_STATUS
4010 STATE_TOPICTYPE_MDM_USER_COMPANY_TERM_ACCEPTA
NCE
4022 STATE_TOPICTYPE_MDM_DEP_SYNCNOW_STATUS
4023 STATE_TOPICTYPE_MDM_MAM_STORE_APP_SYNC
3000 STATE_TOPICTYPE_DM_WNS_CHANNEL
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
Resource access
5000 STATE_TOPICTYPE_CERTIFICATE_ENROLLMENT
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Challenge issued
7 Issue failed
8 Issue pending
9 Issued
11 Response pending
12 Enrollment succeeded
14 Revoked
16 Renew verified
17 Install failed
18 Installed
19 Delete failed
20 Deleted
21 Renewal requested
5001 STATE_TOPICTYPE_CERTIFICATE_CRP
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Challenge issued
7 Issue failed
8 Issue pending
9 Issued
11 Response pending
12 Enrollment succeeded
14 Revoked
16 Renew verified
17 Install failed
18 Installed
19 Delete failed
20 Deleted
21 Renewal requested
5200 STATE_TOPICTYPE_RESOURCE_ACCESS_STATUS
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
TO P IC T Y P E DESC RIP T IO N
6000 STATE_TOPICTYPE_REMOTEAPP_SUBSCRIPTION_STATUS
6001 STATE_TOPICTYPE_REMOTEAPP_SUBSCRIPTION_SYNC_STAT
US
6002 STATE_TOPICTYPE_REMOTEAPP_AUTHCOOKIES_SYNC_STAT
US
6003 STATE_TOPICTYPE_REMOTEAPPLICATIONS_SYNC_STATUS
6004 STATE_TOPICTYPE_REMOTEAPP_LOCK_RESULT
Compliance settings
The following topic types have no state IDs:
TO P IC T Y P E DESC RIP T IO N
7000 STATE_TOPICTYPE_USER_COMPANY_TERM_ACCEPTANCE
7001 STATE_TOPICTYPE_PFX_CERTIFICATE
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Challenge issued
7 Issue failed
8 Issue pending
9 Issued
11 Response pending
12 Enrollment succeeded
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
14 Revoked
16 Renew verified
17 Install failed
18 Installed
19 Delete failed
20 Deleted
21 Renewal requested
7010 STATE_TOPICTYPE_CONDITIONAL_ACCESS_COMPLIANCE
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
1 Compliance success
2 Compliance fail at MP
Peer caching
7200 STATE_TOPICTYPE_SUPER_PEER_UPDATE_CACHE_MAP
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
7201 STATE_TOPICTYPE_SUPER_PEER_UPDATE_CONFIG
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
7202 STATE_TOPICTYPE_DOWNLOAD_AGGREGATE_DATA
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
7203 STATE_TOPICTYPE_PEERSOURCE_REQ_REJECTION_STATS
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
Proxy
The following topic types have no state IDs:
TO P IC T Y P E DESC RIP T IO N
7300 STATE_TOPICTYPE_PROXY_TRAFFIC
7301 STATE_TOPICTYPE_PROXY_CONNECTION
7302 STATE_TOPICTYPE_SRS_USAGE_DATA
7303 STATE_TOPICTYPE_PROXY_TRAFFIC_IDENTITY
Health attestation
8001 STATE_TOPICTYPE_HAS_REPORT
STAT E M ESSA GE ID STAT E M ESSA GE DESC RIP T IO N
Client actions
The following topic types have no state IDs:
TO P IC T Y P E DESC RIP T IO N
8002 STATE_TOPICTYPE_DEVICE_CLIENT_EDPLOG
8003 STATE_TOPICTYPE_ENABLE_LOSTMODE
8004 STATE_TOPICTYPE_DISABLE_LOSTMODE
TO P IC T Y P E DESC RIP T IO N
8005 STATE_TOPICTYPE_LOCATE_DEVICE
8006 STATE_TOPICTYPE_REBOOT_DEVICE
8007 STATE_TOPICTYPE_LOGOUTUSER
8008 STATE_TOPICTYPE_USERSLIST
8009 STATE_TOPICTYPE_DELETEUSER
8010 STATE_TOPICTYPE_CLEANPCRETAININGUSERDATA
8011 STATE_TOPICTYPE_CLEANPCWITHOUTRETAININGUSERDATA
8012 STATE_TOPICTYPE_SETDEVICENAME
9000 STATE_TOPICTYPE_BOOK_CI_COMPLIANCE
9001 STATE_TOPICTYPE_BOOK_CI_ENFORCEMENT
Next steps
Description of state messaging in Configuration Manager
Unicode and ASCII support in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
These accounts support ASCII characters, and RUS characters on a site that runs in Russian.
NOTE
The accounts that you specify for role-based administration support Unicode.
The reporting services point account supports Unicode, with the exception of RUS characters.
Fully qualified domain name (FQDN) for site servers and site systems
Installation path for Configuration Manager
SQL Server instance name
The path for the following site system roles:
Enrollment point
Enrollment proxy point
Reporting services point
State migration point
The path for the following folders:
The folder that stores client state migration data
The folder that contains the Configuration Manager reports
The folder that stores the Configuration Manager backup
The folder that stores the installation source files for site setup
The folder that stores the prerequisite downloads for use by setup
The path for the following objects:
IIS website
Virtual application installation path
Virtual application name
Boot media ISO file names
Custom property names
Other limitations
The following limitations are for supported character sets and language versions:
Configuration Manager doesn't support changing the locale of the site server computer.
An enterprise certificate authority (CA) doesn't support client computer names that use double-byte
character sets (DBCS). The client computer names that you can use are restricted by the PKI limitation of
the IA5 character set. Configuration Manager doesn't support CA names or subject name values that use
DBCS.
Next steps
Language packs in Configuration Manager
Management insights in Configuration Manager
2/16/2022 • 15 minutes to read • Edit Online
NOTE
When you select the Management Insights node, it shows the Management insights dashboard.
Operations
The site reevaluates the applicability of the management insights on a weekly schedule. To manually reevaluate
an insight, right-click the insight, and select Re-evaluate .
The log file for management insights is SMS_DataEngine.log on the site server.
Some insights let you take action. Select an insight, select More Details , and then if available select Take
action . Depending upon the insight, this action has one of the following behaviors:
Automatically navigate in the console to the node where you can take further action. For example, if the
management insight recommends changing a client setting, taking action navigates to the Client
Settings node. Then take further action by modifying the default or a custom client settings object.
Navigate to a filtered view based on a query. For example, taking action on the empty collections insight
shows just these collections in the list of collections. Then take further action, such as deleting a collection
or modifying its membership rules.
Applications
Insights for your application management.
Applications without deployments or references : Lists the applications in your environment that don't
have active deployments or references. References include dependencies, task sequences, and virtual
environments. This insight helps you find and delete unused applications to simplify the list of applications
displayed in the console. For more information, see Deploy applications.
Cloud services
Helps you integrate with many cloud services, which enable modern management of your devices.
Assess co-management readiness : Helps you understand what steps are needed to enable co-
management. This insight has prerequisites. For more information, see Co-management overview.
Devices not uploaded to Azure AD : This insight lists devices that the site hasn't uploaded to Azure
Active Directory (Azure AD) because you haven't configured it for HTTPS. Configure Enhanced HTTP, or
enable at least one management point for HTTPS. If you already configured the site for HTTPS
communication, this insight doesn't appear.
Enable cloud management gateway : The cloud management gateway (CMG) provides a simple way
to manage Configuration Manager clients over the internet. By deploying the CMG as a cloud service in
Microsoft Azure, you can continue to manage and serve content to clients that roam onto the internet.
With CMG, you don't need any additional on-premises infrastructure exposed to the internet. For more
information, see Overview of CMG.
Enable devices to be hybrid Azure Active Director y joined : Azure AD-joined devices allow users to
sign in with their domain credentials, and make sure devices meet the organization's security and
compliance standards. For more information, see Azure AD hybrid identity design considerations.
Sites that don't have proper HTTPS configuration : This insight lists sites in your hierarchy that
aren't properly configured for HTTPS. This configuration prevents the site from synchronizing collection
membership results to Azure AD groups. It may cause Azure AD sync to not upload all devices.
Management of these clients may not function properly. Configure Enhanced HTTP, or enable at least one
management point for HTTPS. If you already configured the site for HTTPS communication, this insight
doesn't appear.
Update clients to the latest Windows 10 version : Windows 10, version 1709 or above improves
and modernizes the computing experience of your users. For more information, see Stay current with
Windows as a service.
Collections
Insights that help simplify management by cleaning up and reconfiguring collections.
Empty Collections : Lists collections in your environment that have no members. For more information, see
How to manage collections.
Collections with no quer y rules and no direct members : To simplify the list of collections in your
hierarchy, delete these collections.
Collections with the same re-evaluation star t time : These collections have the same re-evaluation
time as other collections. Modify the re-evaluation time so they don't conflict.
Collections with quer y time over 5 minutes : Review the query rules for this collection. Consider
modifying or deleting the collection.
The following insights include configurations that potentially cause unnecessary load on the site. Review
these collections, then either delete them, or disable collection rule evaluation:
Collections with no quer y rules and incremental updates enabled
Collections with no quer y rules and enabled for any schedule
Collections with no quer y rules and schedule full evaluation selected
NOTE
For more information on managing collections and collection evaluation, see the following articles:
Best practices for collections
Collection evaluation
How to view collection evaluation
TIP
If you're already a customer of Microsoft Unified or Microsoft Premier, sign in to the Services Hub for additional on-
demand assessments.
For more information about Microsoft Services, see Support Solutions.
TIP
In version 2006, the insight for Unused boot images moved to the new OS deployment group.
Security
Insights for improving the security of your infrastructure and devices.
NTLM fallback is enabled : This insight detects if you enabled the less secure NTLM authentication
fallback method for the site. When using the client push method of installing the Configuration Manager
client, the site can require Kerberos mutual authentication. This enhancement helps to secure the
communication between the server and the client. For more information, see How to install clients with
client push.
Unsuppor ted antimalware client versions : More than 10% of clients are running versions of System
Center Endpoint Protection that aren't supported. For more information, see Endpoint Protection.
Update clients running Windows 7 and Windows Ser ver 2008 : The rule shows clients running
Windows 7, Windows Server 2008 (non-Azure), and Windows Server 2008 R2 (non-Azure) that are no
longer receiving security updates. For more information about updates for these operating systems, see
Extended Security Updates (ESU).
Simplified management
Insights that help you simplify the day-to-day management of your environment.
Connect the site to the Microsoft cloud for Configuration Manager updates : This insight makes
sure your Configuration Manager service connection point has connected to the Microsoft cloud within
the past seven days. This connection is to download content for regular updates. Review
DMPDownloader.log and hman.log. For more information, see Internet access requirements.
Non-CB Client Versions : Lists all clients whose versions aren't a current branch (CB) build. For more
information, see Upgrade clients.
Update clients to a suppor ted Windows 10 version : This insight reports on clients that are running
a version of Windows 10 that's no longer supported.
Software Center
Insights for managing Software Center.
Direct users to Software Center instead of Application Catalog : Check if users have installed or
requested applications from the application catalog in the last 14 days. The primary functionality of
application catalog is now included in Software Center. Support for the application catalog roles ended
with version 1910. For more information, see Deprecated features.
Use the new version of Software Center : The previous version of Software Center is no longer
supported. Set up clients to use the new Software Center by enabling the client setting Use new
Software Center in the Computer Agent group. For more information, see About client settings.
Software updates
Client settings aren't configured to allow clients to download delta content : Some software
updates synchronized in your environment include delta content. Enable the client setting, Allow clients
to download delta content when available . If you don't enable this setting, when you deploy these
updates, client will unnecessarily download more content than they require. For more information, see
Client settings - Software updates.
Enable the software updates product categor y 'Windows 10, version 1903 and later' : There's a
new software updates product category for Windows 10, version 1903 and later. If you synchronize
Windows 10 updates, and have Windows 10, version 1903 or later clients, select the Windows 10,
version 1903 and later product category in the software update point component properties. For
more information, seeConfigure classifications and products to synchronize.
Configure software update points to use TLS/SSL : Detects if your software update points are
configured to use TLS/SSL. Configuring Windows Server Update Services (WSUS) servers and their
corresponding software update points (SUPs) to use TLS/SSL may reduce the ability of a potential
attacker to remotely compromise a client and elevate privileges. This rule was added in Configuration
Manager version 2107.
Windows 10
Insights related to the deployment and servicing of Windows 10. The Windows 10 management insight group is
only available when more than half of clients are running Windows 7, Windows 8, or Windows 8.1.
Configure Windows diagnostic data and commercial ID key : To use data from Desktop Analytics,
configure devices with a Commercial ID key and enable collection of diagnostic data. Set Windows 10
devices to Enhanced (Limited) level or higher. For more information, see Enable data sharing for Desktop
Analytics.
Community hub and GitHub
2/16/2022 • 10 minutes to read • Edit Online
What's new
Support for downloading signed console extensions and limited contribution, added in July 2021
Filter content when using search, added in June 2021
Support for configuration baselines including child configuration items, added in March 2021
Support for Power BI reports, added in February 2021
Prerequisites
The device running the Configuration Manager console used to access the Community hub needs the
following items:
.NET Framework version 4.6 or later
.NET Framework version 4.6.2 or later is required starting in Configuration Manager 2010
Starting in version 2107, the console requires .NET version 4.6.2, and version 4.8 is
recommended. For more information, see Install the Configuration Manager console.
A supported version of Windows 10 or later
Windows Server isn't supported before version 2010, so the Configuration Manager console
needs to be installed on a supported Windows client device separate from the site server.
Starting in version 2010, install the Microsoft Edge WebView2 console extension to support
Windows Server.
The logged-in user account can't be the built-in administrator account
The administration service in Configuration Manager needs to be set up and functional.
If your organization restricts network communication with the internet using a firewall or proxy device,
you need to allow the Configuration Manager console to access internet endpoints. For more
information, see Internet access requirements.
A GitHub account is only required to contribute and share content from the Your hub page. If you don't
wish to share, you can use contributions from others without having a GitHub account, For more
information, see Contribute to Community hub.
IMPORTANT
Configuration Manager versions 2006 and earlier won't be able to sign in to GitHub. Configuration Manager
version 2010 or later with the WebView2 console extension installed is required for sign in.
Permissions
To import a script: Create permission for SMS_Scripts class.
To import a report: Full Administrator security role.
Starting in version 2010, Full Administrators can opt in the hierarchy for unreviewed content via hierarchy
settings. Lower hierarchy administrators can't opt in the hierarchy for unreviewed hub items. For more
information, see the Categorize Community hub content section.
Most built-in security roles will have access to the Community hub node:
C O N T RIB UT E H UB
RO L E N A M E VIEW T H E H UB C O N T EN T DO W N LO A D H UB C O N T EN T
Curated curated:false No
User user:<GitHubUserName> No
Organization org:<GitHubOrganizationName> No
Admins can choose the types of content their environment displays from the following options:
Display Microsoft content : Selecting this option means that only content created by Microsoft will be
shown in the Community hub. This content has had some basic testing and scanning validation to confirm no
malware and inappropriate text.
Display Microsoft and curated community content : Show curated content from both Microsoft and
community partners with basic level of review. Selecting this option means that only content that has been
curated will be shown. The curation process includes basic review to confirm that the content doesn’t have
malware and inappropriate text, but hasn’t necessarily been tested. It will include content from the
community, not just from Microsoft.
Display all content including unreviewed content : Selecting this option means that all content is
shown. This option includes unreviewed open-source type samples from the community, meaning that the
content hasn’t necessarily been reviewed at all. It's provided as-is as open-source type sample content. Doing
your own inspection and testing before using is highly encouraged, which is good practice on any content,
but especially this class of content.
Since the content is open-source style content, admins should always review what is provided before
consuming it. The new curation process is intended to vet the material to make sure there aren't obvious quality
or compliance issues, but it will be somewhat of a cursory review. All content stored within GitHub and accessed
from the Community hub isn’t supported by Microsoft. Microsoft doesn’t validate content collected from or
shared by the general community. For more information, see GitHub Terms of Service and GitHub Privacy
Statement.
Select the content categories to display in Community hub for the environment
1. In the Configuration Manager console, go to Administration > Over view > Site Configuration > Sites .
2. Select the top-level site in your hierarchy and select Hierarchy Settings from the ribbon.
3. On the General tab, change the Community hub setting to Display Microsoft content .
4. Select Ok when you're finished changing the hierarchy setting.
5. Open the Community hub node in the Community workspace.
6. Ensure that only Microsoft content is displayed and available for download.
7. Go back to Hierarchy Settings and select another option such as Display all content, including
unreviewed content .
8. Confirm that only the type of content is displayed and able to be downloaded from the Community hub, that
matches the corresponding hierarchy setting category.
IMPORTANT
When you upgrade to Configuration Manager 2107, you will be prompted to install the WebView2 console extension
again.
Configuration Manager versions 2006 and earlier can’t sign into GitHub but can still download items. Using
Community hub on Windows Server requires the WebView2 console extension and Configuration Manager version
2010 or later.
Follow the instructions below to enable the full functionality of Community hub:
1. In the upper-right corner of the console, select the bell icon to display Configuration Manager console
notifications.
2. The notification will say New custom console extensions are available .
3. Select the link Install custom console extensions to launch the install.
4. When the install completes, select Close to restart the console.
5. Confirm that you can view the Community hub node from the machine running the Windows Server
operating system.
You may also notice that a new folder
AdminConsole\bin\Microsoft.WebView2.FixedVersionRuntime.<version>.x86 was created.
The files are automatically downloaded from https://developer.microsoft.com/en-us/microsoft-
edge/webview2/#download-section with the other redistributable files.
TIP
Starting in Configuration Manager version 2103, you can also install the WebView2 extension from the Console
Extensions node. For more information, see Install an extension on a local console.
Known issues
Community hub doesn't load
The Community hub may not load, or load after a long delay if the WebView2 console extension hasn't been
installed. For more information about installing console extensions, see the Install the WebView2 console
extension and Managing console extensions (starting in version 2103).
Unhandled exception occurs when loading Community hub
In certain circumstances, you may encounter the following exception when loading Community hub:
Could not load type 'System.Runtime.InteropServices.Architecture' from assembly 'mscorlib, Version=4.0.0.0,
Culture=neutral, PublicKeyToken=b77a5c561934e089'.
Workaround : To work around this issue, update the .NET Framework to version 4.7.1 or later for the machine
running the Configuration Manager console.
Unable to access Community hub node when running console as a different user
If you're signed in as a user with lower rights and choose Run as a different user to open the Configuration
Manager console, you may not be able to access the Community hub node.
Downloaded reports don't get removed from your downloads page
If you delete a downloaded report from the Monitoring > Repor ts node, the report isn't deleted from the
Community hub > Your downloads page and you're unable to download the report again.
Unable to download baseline that contains a previously downloaded configuration item
If you previously downloaded a configuration item from Community hub using Configuration Manager 2010,
you may receive an error when downloading a baseline after upgrading to Configuration Manager version
2103. A download error can occur when the baseline contains an updated version of the configuration item you
previously downloaded with Configuration Manager 2010.
Workaround : To work around this issue, delete the configuration item you previously downloaded, then
download the baseline with the new version of the configuration item.
Unable to sign in when single sign on with multifactor authentication is used
When single sign on with multifactor authentication is used, you may not be able to sign in for the following
features when using Configuration Manager 2103 and earlier:
Community hub
Community hub from CMPivot
Custom tabs in Software Center that load a website that's subject to conditional access policies
Next steps
Contribute to the Configuration Manager Community hub
Contribute to the Community hub
2/16/2022 • 9 minutes to read • Edit Online
Prerequisites
All Community hub prerequisites and permissions
Configuration Manager version 2010 or later
Install the Microsoft Edge WebView2 extension for the Configuration Manager console.
A GitHub account
A GitHub account is only required to contribute and share content from the Your hub page.
If you don't already have a GitHub account, you can create one before you join.
If you don't wish to share, you can use contributions from others without having a GitHub account.
IMPORTANT
Configuration Manager versions 2006 and earlier can’t sign into GitHub but can still download items. Using Community
hub on Windows Server requires the WebView2 console extension and Configuration Manager version 2010 or later.
Most built-in security roles will have access to the Community hub node:
C O N T RIB UT E H UB
RO L E N A M E VIEW T H E H UB C O N T EN T DO W N LO A D H UB C O N T EN T
4. After joining, you'll see your membership request is pending. Your account needs approval by the
Configuration Manager Content Curation team. Approvals are done once a day, so it may take up to one
business day for your approval to be granted.
5. Once you're granted access, you'll get an email from GitHub. Open the link in the email to accept the
invitation.
IMPORTANT
You must accept the invitation sent in the email otherwise you won't be able to contribute content.
Contribute content
Once you've accepted the invitation, you can contribute content.
1. Go to Community > Community hub > Your hub .
2. Select Add an Item to open the Contribute item wizard .
3. Specify the Type of object you want to share from the drop-down menu. The following object types are
available:
CMPivot queries
Applications
Task sequences
Configuration items
Configuration baselines, including child configuration items
Baselines with software updates or version-specific references aren't supported
PowerShell Scripts
Reports
Power BI report templates
For information about sharing and using Power BI report templates with Community hub, see
Integrate with Power BI Report Server.
Console extensions are available for download, but contributions are currently limited
Content for console extensions isn't hosted by Microsoft. Currently, the source download
location displays in the verbose SmsAdminUi.log for the console that initiates the download.
4. Select Browse to load your environment's object list for the selected type. The object's Name and
Description (if available) will automatically load in the contribution wizard.
5. Edit the following information to reflect what the community should see for your contribution:
Name: Name of your object
Description: The description of the object you're contributing.
6. On the Organization page, select the GitHub Organization to use for organization branding if needed.
None is the default.
If your organization isn't listed, verify that the membership visibility is set to Public in your GitHub
profile.
7. Select Next to submit the contribution.
8. Once the contribution is complete, you'll see the GitHub pull request (PR) link. The link is also emailed to
you. You can paste the link into a browser to view the PR. Your PR will go though the standard GitHub
merge process.
PRs should be submitted through the Configuration Manager console, not directly to the GitHub
repository.
9. Choose Close to exit the contribution wizard.
10. Once the PR has been completed and merged, the new item will display in the Community hub home
page for others to see.
Community hub also allows new contributions to be branded instead of using the default personalization. You
can brand a contribution to one of your organization memberships in GitHub that's publicly visible. When you
choose to brand your contribution, the organization's profile picture is used rather than your personal profile
picture. The organization's web page, Twitter handle, and company bio are included on the contribution.
Branding to the organization identity allows for uniformity regardless of which user is submitting the
contribution.
To use branding:
The visibility of the organization membership must be set to Public from the contributor's GitHub profile.
On the Organization page in the Contribute item wizard , select the GitHub Organization to use for
branding. For more information, see the Contribute content section.
NOTE
Currently, when you publish a query through CMPivot, you can't edit or delete it after publishing.
Community hub is only available in CMPivot when you run it from the Configuration Manager console. Community
hub isn't available from standalone CMPivot.
Next steps
Learn more about creating and using the following objects:
Create and run PowerShell scripts
Introduction to reporting
Create and manage task sequences
Create and deploy an application
Create configuration items
Create and contribute console extensions
Console extensions from Community hub
2/16/2022 • 3 minutes to read • Edit Online
You can also use a search filter to find an extension in Community hub. Start with the search filter for
type:extension , then add additional filters as needed. If you're not finding an extension that's known to be
available, double check the displayed categories hierarchy setting for Community hub.
Curated curated:false No
User user:<GitHubUserName> No
Organization org:<GitHubOrganizationName> No
F ILT ER N A M E EXA M P L E SEA RC H USES A LIKE F ILT ER
2. The notification will say New custom console extensions are available .
3. Select the link Install custom console extensions to launch the install.
4. When the install completes, select Close to restart the console and enable the new extension.
NOTE
When you upgrade to Configuration Manager 2107, you will be prompted to install the WebView2 console extension
again. For more information about the WebView2 installation, see the WebView2 installation section if the Community
hub article.
Next steps
Manage console extensions
Import console extensions
Create and contribute your own console extension
CMPivot overview
2/16/2022 • 8 minutes to read • Edit Online
Queries
Queries can be used to search terms, identify trends, analyze patterns, and provide many other insights based
on your data. CMPivot uses a subset of the Azure Log Analytics data flow model for the tabular expression
statement. The typical structure of a tabular expression statement is a composition of client entities and tabular
data operators (such as filters and projections). The composition is represented by the pipe character (|), giving
the statement a regular form that visually represents the flow of tabular data from left to right. Each operator
accepts a tabular data set "from the pipe", and additional inputs (including other tabular data sets) from the
body of the operator, then emits a tabular data set to the next operator that follows:
entity | operator1 | operator2 | ...
In the following example, the entity is CCMRecentlyUsedApplications (a reference to the recently used
applications), and the operator is where (which filter out records from its input according to some per-record
predicate):
Entities
Entities are objects that can be queried from the client. We currently support the following entities:
EN T IT Y DESC RIP T IO N
BaseBoard BaseBoard
EN T IT Y DESC RIP T IO N
Battery Battery
BitLocker BitLocker
CcmLog() Lines within 24 hours (by default) from a Ccm Log file
CCMRAX CCM_RAX
Desktop Desktop
DMA DMA
Environment Environment
Firmware Firmware
Keyboard Keyboard
Memory Memory
Modem Modem
Motherboard Motherboard
PhysicalDisk PhysicalDisk
Ports Ports
Processor Processor
Protocol Protocol
Services Services
EN T IT Y DESC RIP T IO N
Shares Shares
TPM TPM
EN T IT Y DESC RIP T IO N
Volume Volume
Table operators
Table operators can be used filter, summarize, and transform data streams. Currently the following operators are
supported:
order by Sort the rows of the input table into order by one or more
columns
Scalar Operators
The following table summarizes operators:
+ Add 2 + 1, now() + 1d
- Subtract 2 - 1, now() - 1h
* Multiply 2 * 2
/ Divide 2 / 1
% Modulo 2 % 1
like Left Hand Side (LHS) contains a match 'abc' like '%B%'
for Right Hand Side (RHS)
!like LHS doesn't contain a match for RHS 'abc' !like '_d_'
Aggregation functions
Aggregation functions can be used with the summarize table operator to calculated summarized values.
Currently the following aggregation functions are supported:
F UN C T IO N DESC RIP T IO N
maxif() Starting in version 2107, you can use maxif with the
summarize table operator.
minif() Starting in version 2107, you can use minif with the
summarize table operator.
F UN C T IO N DESC RIP T IO N
ago() Subtracts the given timespan from the current UTC clock
time
iif() Evaluates the first argument and returns the value of either
the second or third arguments depending on whether the
predicate evaluated to true (second) or false (third)
Next steps
To learn more about CMPivot, see Use CMPivot.
CMPivot for real-time data in Configuration
Manager
2/16/2022 • 15 minutes to read • Edit Online
IMPORTANT
Some security software may block scripts running from c:\windows\ccm\scriptstore. This can prevent successful
execution of CMPivot queries. Some security software may also generate audit events or alerts when running CMPivot
PowerShell.
Certain anti-malware software may inadvertently trigger events against the Configuration Manager Run Scripts or
CMPivot features. It is recommended to exclude %windir%\CCM\ScriptStore so that the anti-malware software permits
those features to run without interference.
Prerequisites
The following components are required to use CMPivot:
Upgrade the target devices to the latest version of the Configuration Manager client.
Target clients require a minimum of PowerShell version 4.
To gather data for the following entities, target clients require PowerShell version 5.0:
Administrators
Connection
IPConfig
SMBConfig
CMPivot and the Microsoft Edge installer are currently signed with the Microsoft Code Signing PCA
2011 certificate. If you set PowerShell execution policy to AllSigned , then you need to make sure that
devices trust this signing certificate. You can export the certificate from a computer where you've
installed the Configuration Manager console. View the certificate on
"C:\Program Files (x86)\Microsoft Endpoint Manager\AdminConsole\bin\CMPivot.exe" , and then export the
code signing certificate from the certification path. Then import it to the machine's Trusted Publishers
store on managed devices. You can use the process in the following blog, but make sure to export the
code signing certificate from the certification path: Adding a Certificate to Trusted Publishers using
Intune.
Permissions
The following permissions are needed for CMPivot:
Run CMPivot permission on the Collection
Read permission on Inventor y Repor ts
Read permission on the SMS Scripts object
Read for SMS Scripts isn't required starting in version 2107
CMPivot doesn't need Read for SMS Scripts for it's primary scenario starting in version 2107.
However, if the administration service is down and the permission has been removed, then when the
administration service falls back, CMPivot will fail. The SMS Provider still requires Read permission
on SMS Scripts if the administration service falls back to it due to a 503 (Service Unavailable) error,
as seen in the CMPivot.log.
The default scope .
The default scope isn't required starting in version 2107
CMPivot permissions by Configuration Manager version
1902 A N D EA RL IER VERSIO N S 1906 T H RO UGH 2103 2107 O R L AT ER
Run Script permission on the Run CMPivot permission on the Run CMPivot permission on the
Collection Collection Collection
Limitations
CMPivot only returns data for clients connected to the current site unless it's run from the central
administration site (CAS).
If a collection contains devices from another site, CMPivot results are only from devices in the current
site unless CMPivot is run from the CAS.
In some environments, additional permissions are needed for CMPivot to run on the CAS. For more
information, see CMPivot changes for version 1902.
You can't customize entity properties, columns for results, or actions on devices.
Only one instance of CMPivot can run at the same time on a computer that is running the Configuration
Manager console.
In CMPivot standalone, you're not able to access CMPivot queries stored in the Community hub.
When single sign on with multifactor authentication is used, you may not be able to sign into Community
hub from CMPivot when using Configuration Manager 2103 and earlier.
Start CMPivot
1. In the Configuration Manager console, connect to the primary site or the CAS. Go to the Assets and
Compliance workspace, and select the Device Collections node. Select a target collection, and select
Star t CMPivot in the ribbon to launch the tool. If you don't see this option, check the following
configurations:
Confirm with a site administrator that your account has the required permissions. For more
information, see Prerequisites.
2. The interface provides further information about using the tool.
Manually enter query strings at the top, or select the links in the in-line documentation.
Select one of the Entities to add it to the query string.
The links for Table Operators , Aggregation Functions , and Scalar Functions open language
reference documentation in the web browser. CMPivot uses the Kusto Query Language (KQL).
3. Keep the CMPivot window open to view results from clients. When you close the CMPivot window, the
session is complete.
If the query has been sent, then clients still send a state message response to the server.
Show devices without : Query for devices without this value for this property. For
example, from the results of the OS query, select this option on a cell in the Version row:
OS | summarize countif( (Version == '10.0.17134') ) by Device | where (countif_ == 0) |
project Device
Bing it : Launch the default web browser to https://www.bing.com with this value as the
query string.
Select any hyperlinked text to pivot the view on that specific information.
The results pane doesn't show more than 20,000 rows. Either adjust the query to further filter the
data, or restart CMPivot on a smaller collection.
7. The status bar shows the following information (from left to right):
The status of the current query to the target collection. This status includes:
The number of active clients that completed the query (3)
The number of total clients (5)
The number of offline clients (2)
Any clients that returned failure (0)
For example: Query completed on 3 of 5 clients (2 clients offline and 0 failure)
The total number of rows in the results pane. For example, 1 objects
TIP
Starting in version 2107, use the Quer y devices again button, or Ctrl + F5 to force the client to retrieve the data
again for the query. Using Quer y devices again is useful when you expect the data to change on the device since the
last query, such as during troubleshooting. Selecting Run quer y again after the initial results are returned only parses
the data CMPivot has already retrieved from the client.
7. Give your query a Name and Description , then select the Publish button to send your query to the
Community hub.
8. Once the contribution is complete, you can access your query anytime from the Me tab.
9. To view the GitHub pull request (PR), go to https://github.com/Microsoft/configmgr-hub/pulls. You can
also access the PR link from the Your hub page in the Community hub node.
PRs shouldn't be submitted directly to the GitHub repository.
NOTE
Currently, when you publish a query through CMPivot, you can't edit or delete it after publishing.
Community hub is only available in CMPivot when you run it from the Configuration Manager console. Community
hub isn't available from standalone CMPivot.
As results appear, you right-click on the Name column and select Group by .
Service | summarize dcount( Device ) by Name
In the row for the Browser service, you select the hyperlinked number in the dcount_ column.
Service | where (Name == 'Browser') | summarize count() by Device
You multi-select all devices, right-click the selection, and choose Run Script . This action launches the Run Script
wizard, from which you run an existing script you have for stopping and disabling a service. With CMPivot you
quickly respond to the security incident for all active computers, viewing results in the Run Script wizard. You
then followup to create a configuration baseline to remediate other computers in the collection as they become
active in the future.
CMPivot standalone
You can use CMPivot as a standalone app. CMPivot standalone is only available in English. Run CMPivot outside
of the Configuration Manager console to view the real-time state of devices in your environment. This change
enables you to use CMPivot on a device without first installing the console.
You can share the power of CMPivot with other personas, such as helpdesk or security admins, who don't have
the console installed on their computer. These other personas can use CMPivot to query Configuration Manager
alongside the other tools that they traditionally use. By sharing this rich management data, you can work
together to proactively solve business problems that cross roles.
Install CMPivot standalone
1. Set up the permissions needed to run CMPivot. For more information, see prerequisites. You can also use
the Security Administrator role if the permissions are appropriate for the user.
2. Find the CMPivot app installer in the following path: <site install path>\tools\CMPivot\CMPivot.msi . You
can run it from that path, or copy it to another location.
3. When you run the CMPivot standalone app, you'll be asked to connect to a site. Specify the fully qualified
domain name or computer name of either the Central Administration or primary site server.
Each time you open CMPivot standalone you'll be prompted to connect to a site server.
4. Browse to the collection on which you want to run CMPivot, then run your query.
NOTE
Right-click actions, such as Run Scripts , Resource Explorer , and web search aren't available in CMPivot standalone.
CMPivot standalone's primary use is querying independently from the Configuration Manager infrastructure. To help
security administrators, CMPivot standalone does include the ability to connect to Microsoft Defender Security Center.
You can do local device query evaluation using CMPivot standalone.
Inside CMPivot
CMPivot sends queries to clients using the Configuration Manager "fast channel". This communication channel
from server to client is also used by other features such as client notification actions, client status, and Endpoint
Protection. Clients return results via the similarly quick state message system. State messages are temporarily
stored in the database. For more information about the ports used for client notification, see the Ports article.
The queries and the results are all just text. The entities InstallSoftware and Process return some of the
largest result sets. During performance testing, the largest state message file size from one client for these
queries was less than 1 KB . Scaled to a large environment with 50,000 active clients, this one-time query would
generate less than 50 MB of data across the network. All the items on the welcome page that are underlined, will
return less than 1 KB of info per client.
Starting in Configuration Manager 1810, CMPivot can query hardware inventory data, including extended
hardware inventory classes. These new entities (entities not underlined on the welcome page) may return much
larger data sets, depending on how much data is defined for a given hardware inventory property. For example,
the "InstalledExecutable" entity might return multiple MB of data per client, depending on the specific data you
query on. Be mindful of the performance and scalability on your systems when returning larger hardware
inventory data sets from larger collections using CMPivot.
A query times out after one hour. For example, a collection has 500 devices, and 450 of the clients are currently
online. Those active devices receive the query and return the results almost immediately. If you leave the
CMPivot window open, as the other 50 clients come online, they also receive the query, and return results.
Log files
CMPivot interactions are logged to the following log files:
Ser ver-side:
SmsProv.log
BgbServer.log
StateSys.log
Client-side:
CcmNotificationAgent.log
Scripts.log
StateMessage.log
For more information, see Log files and Troubleshooting CMPivot.
Next steps
Changes to CMPivot
Troubleshooting CMPivot
Create and run PowerShell scripts
Changes to CMPivot
2/16/2022 • 22 minutes to read • Edit Online
Registry('hklm:\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\*')
RegistryKey('hklm:\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\*')
RegistryKey('hklm:\SOFTWARE\Microsoft\SMS\*')
Registry('hklm:\SOFTWARE\Microsoft\SMS\*')
NOTE
These queries are available when you run CMPivot from the Configuration Manager console. They're not yet available
from standalone CMPivot.
Prerequisites:
Meet all of the CMPivot prerequisites and permissions
Enable Community hub. You don't need a GitHub account to download content.
Verify which content categories are displayed for community hub
Install the Microsoft Edge WebView2 extension from the Configuration Manager console notification
Use CMPivot to access the top Community hub queries
1. Go to the Assets and Compliance workspace then select the Device Collections node.
2. Select a target collection, target device, or group of devices then select Star t CMPivot in the ribbon to
launch the tool.
3. Use the community hub icon on the menu.
5. Select one of the top queries to load it into the query pane.
6. Edit the query if needed then select Run Quer y .
7. Optionally, select the folder icon to access your favorites list. Add the original query or your edited
version to your favorites list to run later. Select the community hub icon to search for another query.
8. Keep the CMPivot window open to view results from clients. When you close the CMPivot window, the
session is complete. If the query has been sent, then clients still send a state message response to the
server.
EventLog('Security')
| where EventID == 4673
| summarize count() by Device
| order by count_ desc
Device
| join kind=leftouter ( File('%windir%\\system32\\*.exe')
| where SHA256Hash == 'A92056D772260B39A876D01552496B2F8B4610A0B1E084952FE1176784E2CE77')
| project Device, MalwareFound = iif( isnull(FileName), 'No', 'Yes')
WinEvent(<logname>,[<timespan>])
This entity is used to get events from event logs and event tracing log files. The entity gets data from event logs
that are generated by the Windows Event Log technology. The entity also gets events in log files generated by
Event Tracing for Windows (ETW). WinEvent looks at events that have occurred within the last 24 hours by
default. However, the 24-hour default can be overridden by including a timespan.
WinEvent('Microsoft-Windows-HelloForBusiness/Operational', 1d)
| where LevelDisplayName =='Error'
| summarize count() by Device
FileContent(<filename>)
FileContent is used to get the contents of a text file.
FileContent('c:\\windows\\SMSCFG.ini')
| where Content startswith 'SMS Unique Identifier='
| project Device, SMSId= substring(Content,22)
ProcessModule (<processname>)
This entity is used to enumerate the modules (dlls) loaded by a given process. ProcessModule is useful when
hunting for malware that hides in legitimate processes.
ProcessModule('powershell')
| summarize count() by ModuleName
| order by count_ desc
AadStatus
This entity can be used to get the current Azure Active Directory identity information from a device.
AadStatus
| project Device, IsAADJoined=iif( isnull(DeviceId),'No','Yes')
| summarize DeviceCount=count() by IsAADJoined
| render piechart
EPStatus
EPStatus is used to get the status of antimalware software installed on the computer.
EPStatus
| project Device, QuickScanAge=datetime_diff('day',now(),QuickScanEndTime)
| summarize DeviceCount=count() by QuickScanAge
| order by QuickScanAge
| render barchart
//Find BIOS manufacture that contains any word like Micro, such as Microsoft
Bios
| where Manufacturer like '%Micro%'
We've updated the CcmLog() and EventLog() entities to only look at messages in the last 24 hours by
default. This behavior can be overridden by passing in an optional timespan. For example, the following
query will look at events in the last 1 hour:
CcmLog('Scripts',1h)
The File() entity has been updated to collect information about Hidden and System files, and include the
MD5 hash. While an MD5 hash isn't as accurate as the SHA256 hash, it tends to be the commonly
reported hash in most malware bulletins.
You can add comments in queries. This behavior is useful when sharing queries. For example:
CMPivot automatically connects to the last site. After you start CMPivot, you can connect to a new site if
necessary.
From the Expor t menu, select the new option to Quer y link to clipboard . This action copies a link to
the clipboard that you can share with others. For example:
cmpivot:Ly8gU2FtcGxlIHF1ZXJ5DQpPcGVyYXRpbmdTeXN0ZW0NCnwgc3VtbWFyaXplIGNvdW50KCkgYnkgQ2FwdGlvbg0KfCBvcmRlciBieSBjb3VudF8gYXNjDQp8IHJlbmRlciBiYXJj
// Sample query
OperatingSystem
| summarize count() by Caption
| order by count_ asc
| render barchart
TIP
For this link to work, install CMPivot standalone.
In query results, if the device is enrolled in Microsoft Defender for Endpoint, right-click the device to
launch the Microsoft Defender Security Center online portal.
Known issues for CMPivot in version 1910
The maximum results banner may not be displayed when the limit is reached.
Each client is limited to 128 KB worth of data per query.
Results may be truncated if the results of the query exceed 128 KB.
The render operator already exists in CMPivot. Support for multiple series and the with statement were added.
For more information, see the examples section and Kusto's join operator article.
Limitations for joins
1. The join column is always implicitly done on the Device field.
2. You can use a maximum of 5 joins per query.
3. You can use a maximum of 64 combined columns.
Scalar operators
+ Add 2 + 1, now() + 1d
- Subtract 2 - 1, now() - 1d
* Multiply 2 * 2
/ Divide 2 / 1
% Modulo 2 % 1
Aggregation functions
F UN C T IO N DESC RIP T IO N
Scalar functions
F UN C T IO N DESC RIP T IO N
iff() Evaluates the first argument and returns the value of either
the second or third arguments depending on whether the
predicate evaluated to true (second) or false (third)
Examples
Show device, manufacturer, model, and OSVersion:
ComputerSystem
| project Device, Manufacturer, Model
| join (OperatingSystem | project Device, OSVersion=Caption)
SystemBootData
| where Device == 'MyDevice'
| project SystemStartTime, BootDuration, OSStart=EventLogStart, GPDuration, UpdateDuration
| order by SystemStartTime desc
| render barchart with (kind=stacked, title='Boot times for MyDevice', ytitle='Time (ms)')
NOTE
Run Scripts is a super set of the Run CMPivot permission.
CMPivot standalone
You can use CMPivot as a standalone app. CMPivot standalone is only available in English. Run CMPivot outside
of the Configuration Manager console to view the real-time state of devices in your environment. This change
enables you to use CMPivot on a device without first installing the console.
You can share the power of CMPivot with other personas, such as helpdesk or security admins, who don't have
the console installed on their computer. These other personas can use CMPivot to query Configuration Manager
alongside the other tools that they traditionally use. By sharing this rich management data, you can work
together to proactively solve business problems that cross roles.
Install CMPivot standalone
1. Set up the permissions needed to run CMPivot. For more information, see prerequisites. You can also use
the Security Administrator role if the permissions are appropriate for the user.
2. Find the CMPivot app installer in the following path: <site install path>\tools\CMPivot\CMPivot.msi . You
can run it from that path, or copy it to another location.
3. When you run the CMPivot standalone app, you'll be asked to connect to a site. Specify the fully qualified
domain name or computer name of either the Central Administration or primary site server.
Each time you open CMPivot standalone you'll be prompted to connect to a site server.
4. Browse to the collection on which you want to run CMPivot, then run your query.
NOTE
Right-click actions, such as Run Scripts , Resource Explorer , and web search aren't available in CMPivot standalone.
CMPivot standalone's primary use is querying independently from the Configuration Manager infrastructure. To help
security administrators, CMPivot standalone does include the ability to connect to Microsoft Defender Security Center.
You can do local device query evaluation using CMPivot standalone.
Clients updated to the 1810 version return output less than 80 KB to the site over a fast communication
channel.
This change increases the performance of viewing script or query output.
If the script or query output is greater than 80 KB, the client sends the data via a state message.
If the client isn't updated to the 1810 client version, it continues to use state messages.
You may see the following error when you start CMPivot: You can't use CMPivot right now due to
an incompatible script version. This issue may be because the hierarchy is in the process of
upgrading a site. Wait until the upgrade is complete and then tr y again.
If you see this message, it could mean:
The security scope isn't set up properly.
There are issues with Upgrade in the process.
The underlying CMPivot script is incompatible.
Scalar functions
CMPivot supports the following scalar functions:
ago() : Subtracts the given timespan from the current UTC clock time
datetime_diff() : Calculates the calendar difference between two datetime values
now() : Returns the current UTC clock time
bin() : Rounds values down to an integer multiple of a given bin size
NOTE
The datetime data type represents an instant in time, typically expressed as a date and time of day. Time values are
measured in 1-second units. A datetime value is always in the UTC time zone. Always express date time literals in ISO
8601 format, for example, yyyy-mm-dd HH:MM:ss
Examples
datetime(2015-12-31 23:59:59.9) : A specific date time literal
now() : The current time
ago(1d) : The current time minus one day
Rendering visualizations
CMPivot now includes basic support for the KQL render operator. This support includes the following types:
barchar t : First column is x-axis, and can be text, datetime or numeric. The second columns must be numeric
and is displayed as a horizontal strip.
columnchar t : Like barchart, with vertical strips instead of horizontal strips.
piechar t : First column is color-axis, second column is numeric.
timechar t : Line graph. First column is x-axis, and should be datetime. Second column is y-axis.
Example: bar chart
The following query renders the most recently used applications as a bar chart:
CCMRecentlyUsedApplications
| summarize dcount( Device ) by ProductName
| top 10 by dcount_
| render barchart
OperatingSystem
| where LastBootUpTime <= ago(7d)
| summarize count() by bin(LastBootUpTime,1d)
| render timechart
Example: pie chart
The following query displays all OS versions in a pie chart:
OperatingSystem
| summarize count() by Caption
| render piechart
Hardware inventory
Use CMPivot to query any hardware inventory class. These classes include any custom extensions you make to
hardware inventory. CMPivot immediately returns cached results from the last hardware inventory scan stored
in the site database. At the same time, it updates the results if necessary with live data from any online clients.
The color saturation of the data in the results table or chart indicates if the data is live or cached. For example,
dark blue is real-time data from an online client. Light blue is cached data.
Example
LogicalDisk
| summarize sum( FreeSpace ) by Device
| order by sum_ desc
| render columnchart
Limitations
The following hardware inventory entities aren't supported:
Array properties, for example IP address
Real32/Real64
Embedded object properties
Inventory entity names must begin with a character
You can't overwrite the built-in entities by creating an inventory entity of the same name
Scalar operators
CMPivot includes the following scalar operators:
NOTE
LHS: string to the left of the operator
RHS: string to the right of the operator
!like LHS doesn't contain a match for RHS "Fabrikam" !like "%xyz%"
Query summary
Select the Quer y Summar y tab at the bottom of the CMPivot window. This status helps you identify clients
that are offline, or troubleshoot errors that may occur. Select a value in the Count column to open a list of
specific devices with that status.
For example, select the count of devices with a Failure status. See the specific error message, and export a list of
these devices. If the error is that a specific cmdlet isn't recognized, create a collection from the exported device
list to deploy a Windows PowerShell update.
CMPivot audit status messages
Starting in version 1810, when you run CMPivot, an audit status message is created with MessageID 40805 .
You can view the status messages by going to Monitoring > System Status > Status Message Queries . You
can run All Audit status Messages for a Specific User , All Audit status Messages for a Specific Site ,
or create your own status message query.
The following format is used for the message:
MessageId 40805: User <UserName> ran script <Script-Guid> with hash <Script-Hash> on collection
<Collection-ID>.
7DC6B6F1-E7F6-43C1-96E0-E1D16BC25C14 is the Script-Guid for CMPivot.
The Script-Hash can be seen in the client's scripts.log file.
You can also see the hash stored in the client's script store. The filename on the client is <Script-
Guid>_<Script-Hash>.
Example file name: C:\Windows\CCM\ScriptStore\7DC6B6F1-E7F6-43C1-96E0-
E1D16BC25C14_abc1d23e45678901fabc123d456ce789fa1b2cd3e456789123fab4c56789d0123.ps
Next steps
Troubleshooting CMPivot
CMPivot sample scripts
2/16/2022 • 2 minutes to read • Edit Online
Operating system
Gets operating system information.
CCMRecentlyUsedApplications
| where (LastUsedTime > ago(2h))
| project CompanyName, ProductName, ProductVersion, LastUsedTime
OperatingSystem
| where LastBootUpTime <= ago(7d)
| summarize count() by bin(LastBootUpTime,1d)
LogicalDisk
| project Device, DeviceID, Name, Description, FileSystem, Size, FreeSpace
| order by DeviceID asc
Device information
Show device, manufacturer, model, and OSVersion:
ComputerSystem
| project Device, Manufacturer, Model
| join (OperatingSystem | project Device, OSVersion=Caption)
Boot times for a device
Show boot times for devices:
SystemBootData
| project Device, SystemStartTime, BootDuration, OSStart=EventLogStart, GPDuration, UpdateDuration
| order by SystemStartTime desc
Authentication failures
Search the event logs for authentication failures.
EventLog('Security')
| where EventID == 4673
ProcessModule(<processname>)
Enumerates all the modules (dlls) loaded by a given process. ProcessModule is useful when hunting for malware
that hides in legitimate processes.
ProcessModule('powershell')
| summarize count() by ModuleName
| order by count_ desc
EPStatus
| project Device, QuickScanAge=datetime_diff('day',now(),QuickScanEndTime)
| summarize DeviceCount=count() by QuickScanAge
Device
| join kind=leftouter ( File('%windir%\\system32\\*.exe')
| where SHA256Hash == 'A92056D772260B39A876D01552496B2F8B4610A0B1E084952FE1176784E2CE77')
| project Device, MalwareFound = iif( isnull(FileName), 'No', 'Yes')
CcmLog('Scripts',1h)
Registry('hklm:\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\*')
RegistryKey('hklm:\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\*')
RegistryKey('hklm:\SOFTWARE\Microsoft\SMS\*')
Registry('hklm:\SOFTWARE\Microsoft\SMS\*')
Next steps
To learn more about CMPivot, see Use CMPivot.
Troubleshoot CMPivot
2/16/2022 • 6 minutes to read • Edit Online
CMPivot is a tool that provides access to a real-time state of the devices in your environment. CMPivot runs a
query on all currently connected devices in the target collection and returns the results.
Occasionally, you might need to troubleshoot CMPivot. For example, if a state message from a client to CMPivot
gets corrupted, the site server can't process the message. This article helps you understand the flow of
information for CMPivot.
IMPORTANT
When troubleshooting CMPivot, enable verbose logging on your management points (MPs) and on the site server's
SMS_MESSAGE_PROCESSING_ENGINE to get more information. Also, if the client's output is larger than 80 KB, enable
verbose logging on the MP and the site server's SMS_STATE_SYSTEM component. For information about how to enable
verbose logging, see Site server logging options.
7DC6B6F1-E7F6-43C1-96E0-E1D16BC25C14 is the Script-Guid for CMPivot. You can also see this GUID in CMPivot
audit status messages.
Next, find the ID in the CMPivot window. This ID is the ClientOperationID .
Find the TaskID from the ClientAction table. The TaskID corresponds to the UniqueID in the ClientAction table.
In BgbServer.log , look for the TaskID you gathered from SQL Server and note the PushID . The TaskID is
labeled TaskGUID . For example:
Client logs
After you have the information from the site server, check the client logs. By default, the client logs are located in
C:\Windows\CCM\Logs .
In CcmNotificationAgent.log , look for log entries that look like the following lines:
NOTE
If you don't see "(fast)" in the Scripts.log , then the data is likely over 80 KB. In this case, the information is sent to the
site server as a state message. Use client's StateMessage.log and the site server's Statesys.log .
Review messages on the site server
When verbose logging is enabled on the management point, you can see how incoming client messages are
handled. In MP_RelayMsgMgr.log , look for the TaskID .
In the MP_RelayMsgMgr.log example, you can see the client's ID (GUID:83F67728-2E6D-4E4F-8075-ED035C31B783) and
the Task ID {9A4E59D2-2F5B-4067-A9FA-B99602A3A4A0} . A message ID gets assigned to the client's response before
it's sent to the message processing engine:
MessageKey: GUID:83F67728-2E6D-4E4F-8075-ED035C31B783{9A4E59D2-2F5B-4067-A9FA-B99602A3A4A0}
Create message succeeded for message id 22f00adf-181e-4bad-b35e-d18912f39f89
Add message payload succeeded for message id 22f00adf-181e-4bad-b35e-d18912f39f89
Put message succeeded for message id 22f00adf-181e-4bad-b35e-d18912f39f89
CRelayMsgMgrHandler::HandleMessage(): ExecuteTask() succeeded
When verbose logging is enabled on SMS_MESSAGE_PROCESSING_ENGINE.log , the client results are processed. Use
the message ID you found from the MP_RelayMsgMgr.log . The processing log entries are similar to the following
example:
TIP
If you get an exception during processing, you can review it by running the following SQL query and looking at the
Exception column. After the message is processed, it will no longer be in the MPE_RequestMessages_Instant table.
In BgbServer.log , look for the PushID to see the number of clients that reported or failed.
Check the monitoring view for CMPivot from SQL Server by using the TaskID .
Find the TaskID from the ClientAction table. The TaskID corresponds to the UniqueID in the ClientAction table.
In BgbServer.log , look for the TaskID you gathered from SQL. It's labeled TaskGUID . For example:
Starting to send push task (PushID: 260 TaskID: 258 TaskGUID: F8C7C37F-B42B-4C0A-B050-2BB44DF1098A TaskType:
15
TaskParam: PFNjcmlwdEhhc2ggU2NyaXB0SGF...truncated...to 5 clients with throttling (strategy: 1 param: 42)
Finished sending push task (PushID: 260 TaskID: 258) to 5 clients
Client logs
After you have the information from the site server, check the client logs. By default, the client logs are located in
C:\Windows\CCM\Logs .
In CcmNotificationAgent.log , look for logs that are similar to the following entry:
Look in StateMessage.log . In the following example, you see that TaskID is near the bottom of the message
next to <Param> :
Successfully forwarded State Messages to the MP StateMessage 7/3/2018 11:44:47 AM 5036 (0x13AC)
NOTE
For clients that are using version 1810 or higher, state messaging isn't used unless the output is larger than 80 KB. When
troubleshooting CMPivot in these cases, you can get more information when you enable verbose logging on your MPs
and the site server's SMS_MESSAGE_PROCESSING_ENGINE. For information on how to enable verbose logging, see Site
server logging options.
To troubleshoot, refer to the following logs:
MP_Relay.log
SMS_MESSAGE_PROCESSING_ENGINE.log
Next steps
Using CMPivot
Create and run PowerShell scripts
Maintenance tasks for Configuration Manager
2/16/2022 • 7 minutes to read • Edit Online
Maintenance tasks
Regular maintenance is important to ensure correct site operations. Keep a maintenance log to document
maintenance dates, who did maintenance, and any maintenance-related comments about the tasks. To maintain
your site, consider daily or weekly maintenance. Some tasks might require a different schedule. Common
maintenance can include both the built-in maintenance tasks and other tasks like account maintenance to
maintain compliance with your company policies.
Use the following information as a guide to help you plan when to do different maintenance tasks. Use these
lists as a starting point, and add tasks that you might require.
Daily Tasks
The following are maintenance tasks that you might consider for on a daily schedule:
Check that predefined maintenance tasks that are scheduled to run daily are running successfully.
Check the Configuration Manager database status.
Check site server status.
Check Configuration Manager site system inboxes for file backlogs.
Check site systems status.
Check the operating system event logs from the site systems.
Check the SQL Server error log from the site database computer.
Check system performance.
Check Configuration Manager alerts.
Weekly Tasks
The following are maintenance tasks that you might consider for a weekly schedule:
Check that predefined maintenance tasks that are scheduled to run weekly are running successfully.
Delete unnecessary files from site systems.
Produce and distribute end-user reports if necessary.
Back up application, security, and system event logs and clear them.
Check the site database size and verify there's enough available disk space on the site database server so
that the site database can grow.
Do SQL Server database maintenance on the site database according to your SQL Server maintenance
plan.
Check available disk space on all site systems.
Run disk defragmentation tools on all site systems.
Periodic Tasks
Some tasks that don't require daily or weekly maintenance are important to ensure overall site health. These
tasks also ensure that security and disaster recovery plans are up-to-date. The following are maintenance tasks
that you might consider for a more periodic schedule than the daily or weekly tasks:
Change accounts and passwords, if it's necessary, according to your security plan.
Review the maintenance plan to check that scheduled maintenance tasks are scheduled correctly and
effectively depending on configured site settings.
Review the Configuration Manager hierarchy design for any required changes.
Check network performance to ensure that changes haven't been made that affect site operations.
Check that Active Directory settings that affect site operations haven't changed. For example, check that
subnets that are assigned to Active Directory sites and that are used as boundaries for Configuration
Manager site haven't changed.
Review your disaster recovery plan for any required changes.
Do a site recovery according to the disaster recovery plan in a test lab by using a backup copy of the
most recent backup that the Backup Site Server maintenance task created.
Check hardware for any errors or for available hardware updates.
Check the overall health of the site.
After you install a Configuration Manager site, review the available maintenance tasks and enable those tasks
that your operations require. Review the default schedule of each task, and when necessary, set up the schedule
to fine-tune the maintenance task to fit your hierarchy and environment. Although the default schedule of each
task should suit most environments, monitor the performance of your sites and database and expect to fine-
tune tasks to increase your deployment's efficiency. Plan to periodically review the site and database
performance and reconfigure maintenance tasks and their schedules to maintain that efficiency.
NOTE
For Delete Aged Status Messages , you set up the age of data to delete when you set up status filter rules.
5. To enable or disable the task without editing the task properties, choose the Enable or Disable button.
The button label changes depending on the current configuration of the task.
6. When you're finished configuring the maintenance tasks, choose OK to finish the procedure.
Next steps
Reference for maintenance tasks
Reference for maintenance tasks in Configuration
Manager
2/16/2022 • 15 minutes to read • Edit Online
Tasks
Backup Site Server
Use this task to create a backup of your critical information to restore a site and the Configuration Manager
database. For more information, see Back up a Configuration Manager site.
SIT E T Y P E STAT US
SIT E T Y P E STAT US
TIP
You may also see this task in the console named Clear Install Flag .
Use this task to remove the installed flag for clients that don't submit a Heartbeat Discovery record during the
Client Rediscover y period. The installed flag prevents automatic client push installation to a computer that
might have an active Configuration Manager client. The default value is 21 days.
IMPORTANT
Make sure this value is greater than the interval for Heartbeat discovery, which by default is seven days. Otherwise,
clients will unnecessarily reinstall.
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
TIP
You may also see this task in the console named Delete Aged Devices Managed by the Exchange Ser ver
Connector .
Use this task to delete aged data about mobile devices managed by the Exchange Server connector. The site
deletes this data according to the Ignore mobile devices that are inactive for more than (days) setting
on the Discover y tab of the Exchange Server connector properties. For more information, see Manage mobile
devices with Configuration Manager and Exchange.
SIT E T Y P E STAT US
SIT E T Y P E STAT US
IMPORTANT
By default, this task runs daily at each site. At a central administration site and primary sites, the task deletes data that's
older than 30 days. When you use SQL Server Express at a secondary site, make sure that this task runs daily and deletes
data that's inactive for seven days.
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
IMPORTANT
When it's enabled, configure this task to run at an interval greater than the Hear tbeat Discover y schedule. This
configuration enables active clients to send a Heartbeat Discovery record to mark their client record as active so this task
doesn't delete them.
SIT E T Y P E STAT US
SIT E T Y P E STAT US
IMPORTANT
When it's enabled, configure this task to run at an interval greater than the Heartbeat Discovery schedule. This
configuration enables the client to send a Heartbeat Discovery record that correctly sets the obsolete status.
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
Monitor Keys
Use this task to monitor the integrity of the Configuration Manager database primary keys. A primary key is a
column or a combination of columns that uniquely identifies one row. The key distinguishes the row from any
other row in a Microsoft SQL Server database table.
SIT E T Y P E STAT US
Rebuild Indexes
Use this task to rebuild the Configuration Manager database indexes. An index is a database structure that's
created on a database table to speed up data retrieval. For example, searching an indexed column is often much
faster than searching a column that isn't indexed.
To improve performance, the Configuration Manager database indexes are frequently updated to remain
synchronized with the constantly changing data that's stored in the database. This task:
Rebuilds indexes when they are more than 10% fragmented
For indexes that are less than 30% fragmented, the index is reorganized
For indexes that are greater than 30% fragmented, the index is rebuilt
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
SIT E T Y P E STAT US
See also
Maintenance tasks
Modify your Configuration Manager infrastructure
2/16/2022 • 15 minutes to read • Edit Online
TIP
To move the SMS provider between two computers, first install it to the new computer. Then remove it from the
original location. There's no option to move the SMS provider between computers.
After the setup wizard finishes, the SMS provider configuration is complete. In the site Proper ties , on the
General tab, verify the computers that have an SMS provider installed for a site.
IMPORTANT
When new server languages are configured for the site server, the .msp and .mst files are recopied to the
LanguagePack folder, and you must repeat this procedure to install new Configuration Manager consoles in only
English.
Temporarily disable a console language on an existing Configuration Manager console installation
1. On the computer that is running the Configuration Manager console, close the Configuration Manager
console.
2. In Windows Explorer, browse to <ConsoleInstallationPath>\Bin\ on the Configuration Manager console
computer.
3. Rename the appropriate language folder for the language that is configured on the computer. For
example, if the language settings for the computer were set for German, you could rename the de folder
to de.disabled .
4. To open the Configuration Manager console in the language that is configured for the computer, rename
the folder to the original name. For example, rename de.disabled to de .
IMPORTANT
The Configuration Manager console uses WMI to connect to the SMS provider, and WMI internally uses DCOM. If the
Configuration Manager console runs on a computer other than the SMS provider computer, it requires permissions to
activate a DCOM server on the SMS provider computer. By default, Remote Activation is granted only to the members of
the built-in Administrators group.
If you allow the SMS Admins group to have Remote Activation permission, a member of this group could attempt DCOM
attacks against the SMS provider computer. This configuration also increases the attack surface of the computer. To
mitigate this threat, carefully monitor the membership of the SMS Admins group.
Use the following procedure to configure each central administration site (CAS), primary site server, and each
computer where the SMS provider is installed to grant remote Configuration Manager console access for
administrative users.
Configure DCOM permissions for remote Configuration Manager console connections
1. As an administrator on the target computer, run Dcomcnfg.exe to open Component Ser vices .
2. Expand Component Ser vices , expand Computers , and then select My Computer . On the Action
menu, select Proper ties .
3. In the My Computer Proper ties window, switch to the COM Security tab. In the Launch and
Activation Permissions section, select Edit Limits .
4. In the Launch and Activation Permissions window, select Add .
5. In the Select Users, Computers, Ser vice Accounts, or Groups window, in the Enter the object
names to select field, type SMS Admins , and then select OK .
TIP
To locate the SMS Admins group, you might have to change the setting: From this Location . This group is local
to the computer when the SMS provider runs on a member server, and is a domain local group when the SMS
provider runs on a domain controller.
6. In the Permissions for SMS Admins section, to allow remote activation, select the Allow column for
the Remote Activation row.
7. Select OK to save changes and close all windows.
Your computer is now configured to allow remote Configuration Manager console access to members of the
SMS Admins group.
Repeat this procedure on each SMS provider computer that supports remote Configuration Manager consoles.
NOTE
When you modify the database configuration for a site, Configuration Manager restarts or reinstalls Configuration
Manager services on the site server and remote site system servers that communicate with the database.
Make sure the new SQL Server has access to the backup location. When you use a UNC for storing your
site database backup, after moving the database to a new server, make sure the computer account of the
new SQL Server has write permissions to the UNC location. This configuration includes when you move
to a SQL Server Always On availability group or a failover cluster instance.
IMPORTANT
Before you move a database that has one or more database replicas for management points, first remove the database
replicas. After you complete the database move, you can reconfigure database replicas. For more information, see
Database replicas for management points.
IMPORTANT
When you create an SPN for a SQL Server Always On failover cluster instance, specify the virtual name of the
failover cluster instance as the SQL Server computer name.
3. Review the registered Ser vicePrincipalName . Make sure that you created a valid SPN for the SQL
Server.
Change the SQL Server service account from local system to a domain user account
1. Create or select a domain or local system user account that you want to use as the SQL Server service
account.
2. Open SQL Ser ver Configuration Manager .
3. Select SQL Ser ver Ser vices , and then open SQL Ser ver<INSTANCE NAME> .
4. Switch to the Log on tab. Select This account , and then enter the user name and password for the
domain user account from step 1.
5. Confirm the service account change and restart the SQL Server service.
NOTE
A site reset doesn't reset access permissions to non-Configuration Manager objects.
NOTE
Configuration Manager initiates a site reset which also reinstalls all site system roles at the site.
TIP
Make sure the redistributable files you use are current. If you haven't recently downloaded redistributable files, plan to
allow Setup to do so from Microsoft.
The following scenarios create or update the CD.Latest folder on a central administration site or primary site
server:
When you install an update or hotfix from within the Configuration Manager console, the site creates or
updates the folder in the Configuration Manager installation folder.
When you run the built-in Configuration Manager backup task, the site creates or updates the folder
under the designated backup folder location.
When you install a new site using baseline media, the site creates the CD.Latest folder.
Supported scenarios
The source files from the CD.Latest folder are supported for the following scenarios:
Backup and recovery
To recover a site, use the source files from a CD.Latest folder that matches your site. When you run a site backup
using the built-in site backup task, the CD.Latest folder is included as part of the backup.
When you reinstall a site as part of a site recovery, you install the site from the CD.Latest folder included
in your backup. This action installs the site using the file versions that match your site backup and site
database.
If you don't have access the correct CD.Latest folder version, get the CD.Latest folder with the
correct file versions by installing a site in a lab environment. Then update that site to match the
version you want to recover.
If you don't have the correct CD.Latest folder and its contents available, you can't recover a site. In
this circumstance, you need to reinstall the site.
When you don't have a CD.Latest folder, but do have a working child primary site or central
administration site, you can use that site as a reference site for a site recovery.
Install a child primary site
When you want to install a new child primary site below a central administration site that has installed one or
more in-console updates, use Setup and the source files from the CD.Latest folder from the central
administration site. This process uses installation source files that match the version of the central
administration site. For more information, see Use the Setup Wizard to install sites.
Expand a stand-alone primary site
When you expand a stand-alone primary site by installing a new central administration site, use Setup and the
source files from the CD.Latest folder from the primary site. This process uses installation source files that match
the version of the primary site. For more information, see Expand a stand-alone primary site.
Install a secondary site
When you want to install a new secondary site below a primary site that has installed one or more in-console
updates, use the source files from the CD.Latest folder from the primary site.
For more information, see Install a secondary site.
Unsupported scenarios
The updated CD.Latest source files aren't supported for:
Installing a new site for a new hierarchy
Upgrading a Microsoft System Center 2012 Configuration Manager site to Configuration Manager current
branch
Installing Configuration Manager clients
Installing Configuration Manager consoles
Next steps
Updates for Configuration Manager
Upgrade on-premises infrastructure that supports
Configuration Manager
2/16/2022 • 8 minutes to read • Edit Online
IMPORTANT
If you use BitLocker management in Configuration Manager, and you encrypt recovery data in the database, before you
upgrade SQL Server, make sure the certificate is for a supported version. For example, certificates created with SQL Server
2014 or earlier aren't compatible with SQL Server 2016 or later. For more information, see Manage the encryption
certificate on SQL Server upgrade.
NOTE
When you change the SQL Server edition in use at the central administration site from Standard to either a Datacenter or
Enterprise, the database partition doesn't change. This database partition limits the number of clients the hierarchy
supports.
Updates and servicing for Configuration Manager
2/16/2022 • 8 minutes to read • Edit Online
TIP
The terms upgrade, update, and install are used to describe three separate concepts in Configuration Manager. For more
information about how each term is used, see About upgrade, update, and install.
IN - C O N SO L E
VERSIO N AVA IL A B IL IT Y DAT E SUP P O RT EN D DAT E B A SEL IN E UP DAT E
NOTE
The Availability date in this table is when the early update ring was released. Baseline media will be available on the
VLSC soon after the update is globally available.
N o t e 1 : H o w t o g e t b a se l i n e m e d i a
The baseline media is available as part of the following releases on the Volume License Service Center (VLSC):
Microsoft Endpoint Configmgr (current branch)
System Center Datacenter
System Center Standard
For example, search the VLSC for Microsoft Endpoint Configmgr (current branch) . Find the baseline media in the
list of files, and download for that release.
NOTE
The search string may be different on other media sites. For example, on the Visual Studio Subscriptions Portal, search for
Microsoft Endpoint Configuration Manager .
Historical versions
The following table lists historical versions of Configuration Manager current branch that are out of support:
IN - C O N SO L E
VERSIO N AVA IL A B IL IT Y DAT E SUP P O RT EN D DAT E B A SEL IN E UP DAT E
NOTE
The console version is slightly different from the site version. The minor version of the console corresponds to the
Configuration Manager release version. For example, in Configuration Manager version 1802 the initial site version is
5.0.8634.1000, and the initial console version is 5.1802 .1082.1700. The build (1082) and revision (1700) numbers may
change with future hotfixes.
NOTE
In-console hotfixes have supersedence relationships. For more information, see Supersedence for in-console
hotfixes.
The in-console updates deliver increased stability and resolve common issues. They replace the update types
seen for previous product versions such as service packs, cumulative updates, hotfixes that are applicable to all
customers, and the extension for Microsoft Intune.
The in-console updates can apply to one or more of the following systems:
Primary and CAS servers
Site system roles and site system servers
Instances of the SMS Provider
Configuration Manager consoles
Configuration Manager clients
Configuration Manager discovers new updates for you. Synchronize your Configuration Manager service
connection point with the Microsoft cloud service, noting the following behaviors:
When your service connection point is in online mode, your site synchronizes with Microsoft every day. It
automatically identifies new updates that apply to your infrastructure. To download updates and
redistributable files, the computer that hosts the service connection point site system role uses the
System context to access the following internet locations: go.microsoft.com and download.microsoft.com
. For more information about other locations used by the service connection point, see Internet access
requirements.
When your service connection point is in offline mode, use the service connection tool to manually sync
with the Microsoft cloud. For more information, see Use the service connection tool.
In-console updates replace the need to independently locate and install individual updates, service packs,
and new features.
Install only the in-console updates you choose. When installing some updates, you can select individual
features to enable and use. For more information, see Enable optional features from updates.
When you install an in-console update, the following process occurs:
It automatically runs a prerequisite check. You can also manually run this check before starting the
installation.
It installs at the top-level site in your environment. This site is the CAS if there's one. In a hierarchy, the
update automatically installs at primary sites. Control when each primary site server is allowed to update
by using Service windows for site servers.
After a site server updates, all affected site system roles automatically update. These roles include
instances of the SMS Provider. After the site installs the update, Configuration Manager consoles also
prompt the console user to update the console.
If an update includes the Configuration Manager client, you're offered the option to test the update in
pre-production, or to apply the update to all clients immediately.
After a primary site is updated, secondary sites don't automatically update. Instead, you must manually
start the secondary site update.
NOTE
The Configuration Manager current branch, the long-term servicing branch, and the technical preview branch are
different releases. Updates that apply for one branch aren't available as in-console updates for the other branches. For
more information about available branches, see Which branch of Configuration Manager should I use?.
Not installed Not installed Not installed Show all three hotfixes
Out-of-band hotfixes
Some hotfixes release with limited availability to address specific issues. Other hotfixes are applicable to all
customers but can't install using the in-console method. These fixes are delivered out-of-band and not
discovered from the Microsoft cloud service.
Typically, when you're seeking to fix or address a problem with your deployment of Configuration Manager, you
can learn about out-of-band hotfixes from Microsoft customer support services, a Microsoft support knowledge
base article, or the Configuration Manager team blog.
Install these fixes manually, using one of the following two methods:
Update Registration Tool
This tool manually imports the hotfix into your Configuration Manager console. Then install the update as you
would in-console updates that are discovered automatically.
This method is used for hotfixes that use the following file name structure:
<Product>-<product version>-<KB article ID>-ConfigMgr.Update.exe
For more information, see Use the update registration tool to import hotfixes.
Hotfix Installer
Use this tool to manually install a hotfix that can't be installed using the in-console method.
This method is used for fixes that use the following file name structure:
<Product>-<product version>-<KB article ID>-<platform>-<language>.exe
For more information, see Use the hotfix installer to install updates.
Next steps
The following articles can help you understand how to find and install the different update types for
Configuration Manager:
Install in-console updates
Use the service connection tool
Use the update registration tool to import hotfixes
Use the hotfix installer to install updates
For more information about the technical preview branch, see Technical preview.
Prepare to install in-console updates for
Configuration Manager
2/16/2022 • 4 minutes to read • Edit Online
NOTE
If necessary, import out-of-band fixes into your console. To do so, use the update registration tool. These out-of-band
fixes supplement the updates you get when you synchronize with the Microsoft cloud service.
After updates synchronize, view them in the Configuration Manager console. Go to the Administration
workspace and select the Updates and Ser vicing node.
Updates you haven't installed display as Available .
Updates you've installed display as Installed . Only the most recently installed update is shown. To view
previously installed updates, select Histor y in the ribbon.
Before you configure the service connection point, understand and plan for its use. The following uses might
affect how you configure this site system role:
The site uses the service connection point to upload usage information about your site. This information
helps the Microsoft cloud service identify the updates that are available for the current version of your
infrastructure. For more information, see Diagnostics and usage data.
To better understand what happens when updates are downloaded, see the following flowcharts:
Flowchart - Download updates
Flowchart - Update replication
Permissions
To view updates in the console, a user must have a role-based administration security role that includes the
security class Update packages . This class grants access to view and manage updates in the Configuration
Manager console.
About the Update packages class
By default, the Update packages class (SMS_CM_Updatepackages) is part of the following built-in security
roles with the listed permissions:
Full Administrator with Modify and Read permissions:
A user with this security role and access to the All security scope can view and install updates. The
user can also enable features during the installation, and enable individual features after the site
updates.
A user with this security role and access to the Default security scope can view and install
updates. The user can also enable features during the installation, and view features after the site
updates. But this user can't enable the features after the site updates.
Read-only Analyst with Read permissions:
A user with this security role and access to the Default scope can view updates but not install them.
This user can also view features after the site updates, but can't enable them.
Permissions required for updates and servicing
Use an account to which you assign a security role that includes the Update packages class with both
Modify and Read permissions.
Assign the account to the Default scope.
Permissions to only view updates
Use an account to which you assign a security role that includes the Update packages class with only
the Read permission.
Assign the account to the Default scope.
Permissions required to enable features after the site updates
Use an account to which you assign a security role that includes the Update packages class with both
Modify and Read permissions.
Assign the account to the All scope.
NOTE
When you start a prerequisite check and then view the status, the Installation phase appears to be active. However, the
site isn't actually installing the update. To run the prerequisite check, the update process extracts the package from the
content library. It then puts the package into a staging folder where it can access the current prerequisite checks. When
you install an update, this same process runs. This behavior is why the Installation phase shows as In progress . Only the
Extract Update package step is shown in the Installation category.
Later, when you install the update, you can configure the update to ignore prerequisite check warnings.
Process to run the prerequisite checker before installing an update
1. In the Configuration Manager console, go to the Administration workspace, and select the Updates
and Ser vicing node.
2. Select the update package for which you want to run the prerequisite check.
3. Select Run prerequisite check in the ribbon.
When you run the prerequisite check, content for the update replicates to child sites. View the
distmgr.log on the site server to confirm that content replicates successfully.
4. To view the results of the prerequisite check:
a. In the Configuration Manager console, go to the Monitoring workspace.
b. Select the Updates and Ser vicing Status node and look for the prerequisite status.
c. For more information, see the ConfigMgrPrereq.log on the site server.
Next steps
Now that you've prepared the environment, you're ready to install the updates.
Install in-console updates
Install in-console updates for Configuration
Manager
2/16/2022 • 7 minutes to read • Edit Online
NOTE
Your user account requires permissions to install updates. For more information, see Permissions for in-console updates.
Install process
1. When the update installation starts
You're presented with the Updates Wizard that displays a list of the product areas that the update applies to.
On the General page of the wizard, configure Prerequisite warnings as necessary:
Prerequisite errors always stop the update installation. Fix errors before you can successfully retry
the update installation. For more information, see Retry installation of a failed update.
Prerequisite warnings can also stop the update installation. Fix warnings before you retry the
update installation. For more information, see Retry installation of a failed update.
Ignore any prerequisite check warnings and install this update regardless of missing
requirements : Set a condition for the update installation to ignore prerequisite warnings. This
option allows the update installation to continue. If you don't select this option, the update
installation stops on a warning. Unless you've previously run the prerequisite check and fixed
prerequisite warnings for a site, don't use this option.
In both the Administration and Monitoring workspaces, the Updates and Servicing node
includes a button on the ribbon named Ignore prerequisite warnings . This button becomes
available when an update package fails to complete installation because of prerequisite check
warnings. For example, you install an update without using the option to ignore prerequisite
warnings (from within the Updates Wizard). The update installation stops with a state of
prerequisite warning but no errors. Later, you select Ignore prerequisite warnings in the
ribbon. This action triggers an automatic continuation of that update installation, which ignores
prerequisite warnings. When you use this option, the update installation automatically continues
after a few minutes.
When an update applies to the Configuration Manager client, choose to test the client update with a
limited set of clients. For more information, see How to test client upgrades in a pre-production
collection.
Starting in Configuration Manager 2107, sites that aren't already onboarded to Microsoft Endpoint
Manager will be prompted to optionally cloud attach as part of the upgrade wizard. Environments are
considered cloud attached if at least one of the following features are already enabled:
Tenant attach
Co-management
Endpoint analytics
If you don't wish to onboard, clear both of the Enable Microsoft Endpoint Manager admin center
and Enable automatic client enrollment for co-management options.
2. During the update installation
As part of the update installation, Configuration Manager does the following actions:
Reinstalls any affected components, like site system roles or the Configuration Manager console.
Manages updates to clients based on the selections that you made for client piloting, and for automatic
client upgrades.
Site system servers generally don't need to restart as part of the update. If a role uses .NET, and the
package updates that prerequisite component, then the site system may restart. For more information,
see Site and site system prerequisites.
TIP
When you install Configuration Manager updates, the site also updates the CD.Latest folder. For more information, see
The CD.Latest folder.
NOTE
During the Installation phase, you can see the state of the Upgrade ConfigMgr database task.
If the database upgrade is blocked, then you'll be given the warning In progress, needs attention .
The cmupdate.log will log the program name and sessionid from SQL Server that is blocking the database
upgrade.
When the database upgrade is no longer blocked, the status will be reset to In progress or Complete .
When the database upgrade is blocked, a check is done every 5 minutes to see if it's still blocked.
NOTE
The console version is slightly different from the site version. The minor version of the console corresponds to the
Configuration Manager release version. For example, in Configuration Manager version 1802 the initial site version is
5.0.8634.1000, and the initial console version is 5.1802 .1082.1700. The build (1082) and revision (1700) numbers may
change with future hotfixes.
Next steps
Continue reading about what happens after the site updates, or what to do if the update fails.
After the site updates
After the site updates
2/16/2022 • 5 minutes to read • Edit Online
Post-installation tasks
When a site installs an update, there are several tasks that can't start until after the update completes installation
on the site server. This list includes the post-installation tasks that are critical for site and hierarchy operations.
Because they're critical, they're actively monitored. Other tasks that aren't directly monitored include the
reinstallation of site system roles. To view the status of the critical post-installation tasks, select the Post
Installation task while monitoring the update installation for a site.
Not all tasks complete immediately. Some tasks don't start until each site completes installation of the update.
New functionality you might expect can be delayed until these tasks complete. Turning on new features doesn't
start until all sites complete update installation, so new features might not be visible for some time.
The post installation tasks include:
Installing SMS_EXECUTIVE ser vice
Critical service that runs on the site server.
Reinstallation of this service should complete quickly.
Installing SMS_DATABASE_NOTIFICATION_MONITOR component
Critical site component thread of SMS_EXECUTIVE service.
Reinstallation of this service should complete quickly.
Installing SMS_HIERARCHY_MANAGER component
Critical site component that runs on the site server.
Responsible for reinstalling roles on site system servers. Status for individual site system role
reinstallation doesn't display.
Reinstallation of this service should complete quickly.
NOTE
Some Configuration Manager site roles share the client framework. For example, the management point
and pull distribution point. When these roles update, the client version on these servers updates at the
same time. For more information, see How to upgrade clients.
TIP
If an update has problems downloading or replicating, use the update reset tool.
When you're ready to retry the installation of an update, select the failed update, and then choose an applicable
option. The update installation retry behavior depends on the node where you start the retry, and the retry
option that you use.
Retry installation for the hierarchy
Retry the installation of an update for the entire hierarchy when that update is in one of the following states:
Prerequisite checks passed with one or more warnings, and the option to ignore prerequisite check
warnings wasn't set in the Update Wizard. (The update's value for Ignore Prereq Warning in the
Updates and Ser vicing node is No .)
Prerequisite failed
Installation failed
Replication of the content to the site failed
Go to the Administration workspace and select the Updates and Ser vicing node. Select the update, and
then choose one of the following options:
Retr y : When you Retr y from Updates and Ser vicing , the update install starts again and automatically
ignores prerequisite warnings. If content replication previously failed, content for the update replicates
again.
Ignore prerequisite warnings : If the update install stops because of a warning, you can then choose
Ignore prerequisite warnings . This action allows the installation of the update to continue after a few
minutes, and uses the option to ignore prerequisite warnings.
Retry installation for the site
Retry the installation of an update at a specific site when that update is in one of the following states:
Prerequisite checks passed with one or more warnings, and the option to ignore prerequisite check
warnings wasn't set in the Update Wizard. (The updates value for Ignore Prereq Warning in the
Updates and Servicing node is No .)
Prerequisite failed
Installation failed
Go to the Monitoring workspace, and select the Site Ser vicing Status node. Select the update, and then
choose one of the following options:
Retr y : When you Retr y from Site Ser vicing Status , you restart the installation of the update at only
that site. Unlike running Retr y from the Updates and Ser vicing node, this retry doesn't ignore
prerequisite warnings.
Ignore prerequisite warnings : If the update install stops because of a warning, you can then select
Ignore prerequisite warnings . This action allows the installation of the update to continue after a few
minutes, and uses the option to ignore prerequisite warnings.
IMPORTANT
For business-impacting issues, contact Microsoft support to open a new support request. Reporting setup and upgrade
failures from the console is for providing product feedback on setup errors you may have encountered. Reporting an error
doesn't generate a support request.
Next steps
Some updates include optional features, which you can enable during or after installation.
Optional features
Optional features in Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
IMPORTANT
In a multi-site hierarchy, enable optional or pre-release features only from the central administration site (CAS). This
behavior makes sure there are no conflicts across the hierarchy.
When you enable a new feature or pre-release feature, the Configuration Manager hierarchy manager (HMAN)
must process the change before that feature becomes available. Processing of the change is often immediate.
Depending on the HMAN processing cycle, it can take up to 30 minutes to complete. After the change is
processed, restart the console before you can use the feature.
When new cloud-based features are available in the Microsoft Endpoint Manager admin center, or other
attached cloud services for your on-premises Configuration Manager installation, you can opt in to these new
features in the Configuration Manager console.
Next steps
The current branch includes pre-release features for early testing in a production environment. For more
information, see pre-release features.
For answers to common questions, see In-console updates FAQ.
Update reset tool
2/16/2022 • 3 minutes to read • Edit Online
TIP
To copy the GUID, select the row for the update package you want to reset, and then use CTRL+C to copy that row. If you
paste your copied selection into a text editor, you can then copy only the GUID for use as a command-line parameter
when you run the tool.
PA RA M ET ER DESC RIP T IO N
-FDELETE Optional
Force deletion of a successfully downloaded update package.
Examples:
In a typical scenario, you want to reset an update that has download problems. Your SQL Servers FQDN is
server1.fabrikam.com, the site database is CM_XYZ, and the package GUID is 61F16B3C-F1F6-4F9F-8647-
2A524B0C802C. You run: CMUpdateReset.exe -S ser ver1.fabrikam.com -D CM_XYZ -P 61F16B3C-
F1F6-4F9F-8647-2A524B0C802C
In a more extreme scenario, you want to force deletion of problematic update package. Your SQL Servers FQDN
is server1.fabrikam.com, the site database is CM_XYZ, and the package GUID is 61F16B3C-F1F6-4F9F-8647-
2A524B0C802C. You run: CMUpdateReset.exe -FDELETE -S ser ver1.fabrikam.com -D CM_XYZ -P
61F16B3C-F1F6-4F9F-8647-2A524B0C802C
Test the database upgrade when installing an
update
2/16/2022 • 3 minutes to read • Edit Online
IMPORTANT
The test upgrade is no longer a required or recommend step for most sites.
If your database is suspect, or is modified by customizations not explicitly supported by Configuration Manager, continue
to use this process.
TIP
When you upgrade to Configuration Manager current branch from an older product, like System Center 2012
Configuration Manager, test database upgrades remain a recommended step.
If you still plan to test the upgrade of a site database when you install an in-console update, the following
information supplements the guidance on installing an in-console update.
5. On the instance of SQL Server where you run the upgrade test, monitor the ConfigMgrSetup.log in the
root of the system drive for progress and success.
If the test upgrade fails, fix any issues related to the site database upgrade failure. Then, create a new
backup of the site database and retest the upgrade of the new copy of the database.
Next steps
After the test database update completes successfully, discard the updated database. It can't be used by a
Configuration Manager site. You can then return to your active site and begin the update installation.
If an update install fails, you shouldn't need to recover the site. Instead, you can retry the update installation
from within the console.
Flowchart - Download updates for Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
Give consent
Before using pre-release features, give consent to use pre-release features. Giving consent is a one-time action
per hierarchy that you can't undo. Until you give consent, you can't enable new pre-release features included
with updates. After you turn on a pre-release feature, you can't turn it off.
1. In the Configuration Manager console, go to the Administration workspace, expand Site
Configuration , and select the Sites node.
2. In the ribbon, select Hierarchy Settings .
3. On the General tab of Hierarchy Settings Properties, enable the option to Consent to use pre-release
features .
IMPORTANT
In a multi-site hierarchy, you can only enable optional or pre-release features from the central administration site. This
behavior ensures there are no conflicts across the hierarchy.
If you gave consent at a stand-alone primary site, and then expand the hierarchy by installing a new central
administration site, you must give consent again at the central administration site.
When you enable a pre-release feature, the Configuration Manager hierarchy manager (HMAN) must process
the change before that feature becomes available. Processing of the change is often immediate. Depending on
the HMAN processing cycle, it can take up to 30 minutes to complete. After the change is processed, restart the
console before using the feature.
TIP
For more information on non-pre-release features that you must enable first, see Enable optional features from updates.
For more information on features that are only available in the technical preview branch, see Technical Preview.
Service windows for site servers
2/16/2022 • 2 minutes to read • Edit Online
TIP
A service window is for a site server. A maintenance window is for a client. For more information, see How to use
maintenance windows.
Default behavior
When you don't configure a service window:
On your top-tier site, you choose when to start the update installation. The top-tier site is either the CAS
or a stand-alone primary site.
On a child primary site, the update automatically installs after it successfully completes at the CAS.
On a secondary site, updates never start automatically. After the parent primary site updates, manually
start the update from the console.
After you create a service window, use the edit and delete buttons to make changes.
Next steps
Install in-console updates
Use the service connection tool for Configuration
Manager
2/16/2022 • 9 minutes to read • Edit Online
Prerequisites
The site has a service connection point, and you configure it for an Offline, on-demand connection .
Run the tool from a command prompt as an administrator. There's no user interface.
You run the tool from the service connection point and a computer that can connect to the internet. Each
of these computers needs to have a x64-bit OS, and have the following components:
Both the Visual C++ Redistributable x86 and x64 files. By default, Configuration Manager
installs the x64 version on the computer that hosts the service connection point. To download this
component, see Visual C++ Redistributable Packages for Visual Studio 2013.
Starting in version 2107, this tool requires .NET version 4.6.2, and version 4.8 is recommended. In
version 2103 and earlier, this tool requires .NET 4.5.2 or later. For more information, Site and site
system prerequisites.
The account you use to run the tool needs the following permissions:
Local administrator on the computer that hosts the service connection point
Read permissions to the site database
You need a method to transfer the files between the computer with internet access and the service
connection point. For example, a USB drive with sufficient free space to store the files and updates.
Overview
1. Prepare : Run the tool on the service connection point. It puts your usage data into a .cab file at the
location you specify. Copy the data file to the computer with an internet connection.
2. Connect : Run the tool on the computer with an internet connection. It uploads your usage data, and then
downloads Configuration Manager updates. Copy the downloaded updates to the service connection
point.
You can upload multiple data files at one time, each from a different hierarchy. You can also specify a
proxy server and a user for the proxy server.
3. Impor t : Run the tool on the service connection point. It imports the updates, and adds them to your site.
You can then view and install those updates in the Configuration Manager console.
Upload multiple data files
Put all exported data files from separate hierarchies into the same folder. Give each file a unique name. If
necessary, you can manually rename them.
When you run the tool to upload data to Microsoft, you specify the folder that contains the data files.
When you run the tool to import data, the tool only imports the data for that hierarchy.
Specify a proxy server
If the computer with an internet connection requires a proxy server, the tool supports a basic proxy
configuration. Use the optional parameters -proxyser veruri and -proxyusername . For more information, see
Command-line parameters.
Specify the type of updates to download
The tool supports options to control what files you download. By default, the tool downloads only the latest
available update that applies to the version of your site. It doesn't download hotfixes.
To modify this behavior, use one of the following parameters to change what files it downloads:
-downloadall : Download all updates, including updates and hotfixes, whatever the version of your site.
-downloadhotfix : Download all hotfixes whatever the version of your site.
-downloadsiteversion : Downloads updates and hotfixes with a later version than the version of your
site.
IMPORTANT
Because of a known issue in Configuration Manager version 2002, the default behavior doesn't work as expected.
Update to version 2006, or use the -downloadsiteversion parameter to download the necessary updates for
version 2002.
TIP
The tool determines the version of your site from the data file. To verify the version, look in the .cab file for the text file
named with the site version.
The path to a USB drive where you store the data to transfer between computers: D:\USB\
The name of the data file that you export from the site: UsageData.cab
The name of the empty folder where the tool stores downloaded updates for Configuration Manager:
UpdatePacks
Prepare
1. On the computer that hosts the service connection point, open a command prompt as an administrator,
and change directory to the tool location. For example:
cd C:\Source\SMSSETUP\TOOLS\ServiceConnectionTool\
NOTE
If you'll upload data files from more than one hierarchy at the same time, give each data file a unique name. If
necessary, you can rename files later.
The data in the file is based on the level of diagnostic and usage data that you configure for the site. For
more information, see Overview of diagnostics and usage data. You can use the tool to export the data to
a CSV file to view the contents. For more information, see -export.
3. After the tool finishes exporting the usage data, copy the data file to a computer that has access to the
internet.
Connect
1. On the computer with internet access, open a command prompt as an administrator, and change
directory to the tool location. This location is a copy of the entire Ser viceConnectionTool folder. For
example:
cd D:\USB\ServiceConnectionTool\
2. Run the following command to upload the data file and download the Configuration Manager updates:
ServiceConnectionTool.exe -connect -usagedatasrc D:\USB -updatepackdest D:\USB\UpdatePacks
NOTE
When you run this command line, you might see the following error:
Unhandled Exception: System.UnauthorizedAccessException: Access to the path
'C:\Users\jqpublic\AppData\Local\Temp\extractmanifestcab\95F8A562.sql' is denied.
You can safely ignore this error. Close the error window to continue.
3. After the tool finishes downloading the updates, copy them to the service connection point.
Import
1. On the computer that hosts the service connection point, open a command prompt as an administrator,
and change directory to the tool location. For example:
cd C:\Source\SMSSETUP\TOOLS\ServiceConnectionTool\
Log files
Ser viceConnectionTool.log : Each time you run the service connection tool, it writes to this log file. The
path of the log file is always the same location as the tool. This log file provides simple details about the
tool usage based on the parameters you use. Each time you run the tool, the tool replaces any existing log
file.
ConfigMgrSetup.log : During the Connect phase, the tool writes to this log file at the root of the system
drive. This log file provides more detailed information. For example, what files the tool downloads, and if
the hash checks are successful.
Command-line parameters
This section lists in alphabetical order all of the available parameters for the service connection tool.
-connect
Use during the Connect phase on the computer with internet access. It connects to the Configuration Manager
cloud service to upload the data file, and download updates.
It requires the following parameters:
-usagedatasrc : The location of the data file to upload
-updatepackdest : A path for the downloaded updates
You can also use the following optional parameters:
-proxyser veruri : The FQDN of the proxy server
-proxyusername : A user name for the proxy server
-downloadall : Download everything, including updates and hotfixes, whatever the version of your site.
-downloadhotfix : Download all hotfixes, whatever the version of your site.
-downloadsiteversion : Download updates and hotfixes that have a later version than the version of your
site.
Example of connect without a proxy server
ServiceConnectionTool.exe -connect -usagedatasrc D:\USB\ -updatepackdest D:\USB\UpdatePacks
-dest
A required parameter with the -expor t parameter to specify the path and file name of the CSV file to export. For
more information, see -export.
-downloadall
An optional parameter with the -connect parameter to download everything, including updates and hotfixes,
whatever the version of your site. For more information, see -connect.
-downloadhotfix
An optional parameter with the -connect parameter to only download all hotfixes, whatever the version of your
site. For more information, see -connect.
-downloadsiteversion
An optional parameter with the -connect parameter to only download updates and hotfixes that have a later
version than the version of your site. For more information, see -connect.
-export
Use during the Prepare phase to export usage data to a CSV file. Run it as an administrator on the service
connection point. This action lets you review the contents of the usage data before you upload to Microsoft. It
requires the -dest parameter to specify the location of the CSV file.
Example of export
-export -dest D:\USB\usagedata.csv
-import
Use during the Import phase on the service connection point to import the updates to the site. It requires the -
updatepacksrc parameter to specify the location of the downloaded updates.
Example of import
ServiceConnectionTool.exe -import -updatepacksrc D:\USB\UpdatePacks
-prepare
Use during the Prepare phase on the service connection point to export usage data from the site. It requires the
-usagedatadest parameter to specify the location of the exported data file.
Example of prepare
ServiceConnectionTool.exe -prepare -usagedatadest D:\USB\UsageData.cab
-proxyserveruri
An optional parameter with the -connect parameter to specify the FQDN of your proxy server. For more
information, see -connect.
-proxyusername
An optional parameter with the -connect parameter to specify the username to authenticate with your proxy
server. For more information, see -connect.
-updatepackdest
A required parameter with the -connect parameter to specify a path for the downloaded updates. For more
information, see -connect.
-updatepacksrc
A required parameter with the -impor t parameter to specify a path of the downloaded updates. For more
information, see -import.
-usagedatadest
A required parameter with the -prepare parameter to specify a path and file name of the exported data file. For
more information, see -prepare.
Next steps
Install in-console updates
How to view diagnostics and usage data
Use the update registration tool to import hotfixes
2/16/2022 • 2 minutes to read • Edit Online
NOTE
This article provides general guidance about how to install hotfixes that update Configuration Manager. For details about
a specific hotfix or update, refer to the corresponding hotfix article.
Prerequisites
This tool only installs out-of-band updates that end with the full .update.exe file extension.
It is self-contained with the individual updates that you get directly from Microsoft.
The service connection point can be in either online or offline mode.
Run it on the server with the service connection point site system role.
Starting in version 2107, the service connection point requires .NET version 4.6.2, and version 4.8 is
recommended. In version 2103 and earlier, this role requires .NET 4.5.2 or later. For more information,
Site and site system prerequisites.
When you run the tool on the service connection point, the account that you use needs the following
configurations:
A local Administrator
Write permissions to the following folder:
<Configuration Manager installation directory>\EasySetupPayload\offline
Process
1. On the computer that hosts the service connection point, open a command prompt with administrative
privileges. Then change directories to the location that contains the update file. The update file name uses
the following format: <Product>-<product version>-<KB article ID>-ConfigMgr.Update.exe
2. Run the following command to start the update registration tool:
<Product>-<product version>-<KB article ID>-ConfigMgr.Update.exe
After the hotfix is registered, it appears as a new update in the console within 24 hours. To accelerate this
process: in the Configuration Manager console, go to Administration workspace, and select the
Updates and Ser vicing node. In the ribbon, select Check for Updates .
The update registration tool logs its actions to a .log file on the local computer. The log file has the same
name as the hotfix file and is in the %SystemRoot%/Temp folder.
After the update is registered, you can close the update registration tool.
3. In the Configuration Manager console, go to the Administration workspace, and select the Updates
and Ser vicing node. Hotfixes that you've imported are now available to install.
Next steps
Install in-console updates
Use the Hotfix Installer to install updates for
Configuration Manager
2/16/2022 • 13 minutes to read • Edit Online
Overview
Hotfixes for Configuration Manager are similar to updates for other Microsoft products, such as SQL Server.
They contain either one individual fix or a bundle, which is a rollup of fixes.
Individual updates include a single focused update for a specific version of Configuration Manager.
Update bundles include multiple updates for a specific version of Configuration Manager.
When an update is a bundle, you can't install individual updates from that bundle.
If you plan to create deployments to install updates on other computers, install the update bundle on a central
administration site (CAS) server or primary site server.
When you run the update bundle, the following process happens:
It extracts the update files for each applicable component from the update bundle.
Starts a wizard that guides you through a process to configure the updates and deployment options for
the updates.
After you complete the wizard, the updates in the bundle that apply to the site server are installed on the
site server.
The wizard also creates deployments that you can use to install the updates on other computers. Deploy the
updates to other computers by using a supported deployment method. For example, a software deployment
package or System Center Updates Publisher.
When the wizard runs, it creates a .cab file on the site server for use with Updates Publisher. Optionally, you can
configure the wizard to also create one or more packages for software deployment. You can use these
deployments to install updates on components, such as clients or the Configuration Manager console. You can
also install updates manually on computers that don't run the Configuration Manager client.
You can update the following three groups in Configuration Manager:
Configuration Manager server roles, which include:
CAS
Primary site
Secondary site
Remote SMS Provider
Configuration Manager console
Configuration Manager client
NOTE
Updates for site system roles are installed as part of the update for site servers. They are serviced by the site component
manager. This behavior includes updates for the site database and the cloud management gateway (CMG).
Pull-distribution points are serviced by distribution manager instead of the site component manager.
Each update bundle for Configuration Manager is a self-extractable .exe file (SFX). This file contains the files that
are necessary to install the update on the applicable components of Configuration Manager. Typically, the SFX
file can contain the following files:
F IL E DETA IL S
<Product version>-QFE-KB<KB article ID>-<platform>- This file is the update. The command line for this file is
<language>.exe managed by Updatesetup.exe. For example:
CM1511RTM-QFE-KB123456-X64-ENU.exe
<Product&updatetype>-<product version>-<KB article When the update applies to the Configuration Manager
ID>-<platform>.msp console or clients, the update bundle includes separate
Windows Installer patch (.msp) files. For example:
ConfigMgr1511-AdminUI-KB1234567-i386.msp for the
console or ConfigMgr1511-client-KB1234567-x64.msp for
the client.
By default, the update bundle logs its actions to a .log file on the site server. The log file has the same name as
the update bundle and is written to the %SystemRoot%/Temp folder.
When you run the update bundle, it extracts a file with the same name as the update bundle to a temporary
folder on the computer, and then runs Updatesetup.exe. Updatesetup.exe starts the software update wizard.
As applicable to the scope of the update, the wizard creates a series of folders under the Configuration Manager
installation folder on the site server. The folder structure is similar to the following example:
\Hotfix\<KB Number>\<Update Type>\<Platform>
The following table provides details about the folders in the folder structure:
F O L DER N A M E M O RE IN F O RM AT IO N
<KB Number> This folder is the ID number for this update bundle.
<Update type> This folder is the type of update for Configuration Manager.
The wizard creates a separate folder for each type of update
in the bundle. They include the following types:
C O M P O N EN T IN ST RUC T IO N S
Site server Deploy updates to a remote site server when you don't
choose to install the update bundle directly on that remote
site server.
Site database For remote site servers, deploy server updates that include
an update to the site database if you don't install the update
bundle directly on that remote site server.
Remote SMS Provider Install updates for each instance of the SMS Provider that
runs on a computer other than the site server where you
installed the update bundle.
C O M P O N EN T IN ST RUC T IO N S
Configuration Manager clients After initial installation of the Configuration Manager client,
you can install updates for the Configuration Manager client
on each computer that runs the client.
NOTE
You can deploy updates only to computers that run the Configuration Manager client.
If you reinstall a client, Configuration Manager console, or SMS Provider, also reinstall the updates for these
components.
Update servers
Updates for servers can include updates for sites, the site database, and computers that run an instance of the
SMS Provider.
Update a site
To update a Configuration Manager site, you can install the update bundle directly on the site server. You can
also deploy the updates to a site server after you install the update bundle on a different site.
When you install an update on a site server, the update installation process manages other actions that are
required to apply the update, such as updating site system roles. The exception is the site database. The next
section contains information about how to update the site database.
Update a site database
To update the site database, the installation process runs a file named update.sql on the site database. You can
configure the update process to automatically update the site database, or you can manually update the site
database later.
A u t o m a t i c u p d a t e o f t h e si t e d a t a b a se
When you install the update bundle on a site server, you can choose to automatically update the site database
when the server update is installed. This decision applies only to the site server where you install the update
bundle and doesn't apply to deployments that are created to install the updates on remote site servers.
NOTE
When you choose to automatically update the site database, the process updates a database regardless whether the
database is located on the site server or on a remote computer.
IMPORTANT
Before you update the site database, create a backup of the site database. You can't uninstall an update to the site
database. For information about how to create a backup for Configuration Manager, see Backup and recovery for
Configuration Manager.
M a n u a l u p d a t e o f t h e si t e d a t a b a se
If you choose not to automatically update the site database when you install the update bundle on the site
server, the server update doesn't modify the database on the site server where the update bundle runs.
However, deployments that use the package that is created for software deployment or that installs always
update the site database.
WARNING
When the update includes updates to both the site server and the site database, the update isn't functional until the
update is completed for both the site server and site database. Until the update is applied to the site database, the site is
in an unsupported state.
1. On the site server, stop the SMS_SITE_COMPONENT_MANAGER service. Then stop the
SMS_EXECUTIVE service.
2. Close the Configuration Manager console.
3. Run the update script named update.sql on that site's database. For information about how to run a
script to update a SQL Server database, see the documentation for the version of SQL Server that you
use for your site database server.
TIP
When the update bundle installs, it extracts update.sql to the following location on the site server:
\\<Server Name>\SMS_<Site Code>\Hotfix\<KB Number>\update.sql .
IMPORTANT
When you install updates for clients and the update bundle includes updates for servers, install the server updates on the
primary site to which the clients are assigned.
To manually install the client update, run Msiexec.exe on each Configuration Manager client. Include the
platform-specific client update MSP file in the command line. For example, you can use the following command
line for a client update:
msiexec.exe /p \\<ServerName>\SMS_<SiteCode>\Hotfix\<KB Number>\Client\<Platform>\<msp> /L\*v <logfile>
REINSTALLMODE=mous REINSTALL=ALL
If the computer that you update runs the Configuration Manager client:
You can use a deployment to install the update. For more information about how to use deployments to
install updates, see Deploy updates for Configuration Manager.
If you're signed in to the client computer, run the installation interactively.
To manually install the Configuration Manager console update, run Msiexec.exe . Include the Configuration
Manager console update MSP file in the command line. For example, you can use the following command line to
update a Configuration Manager console:
msiexec.exe /p \\<ServerName>\SMS_<SiteCode>\Hotfix\<KB Number>\AdminConsole\<Platform>\<msp> /L\*v <logfile>
REINSTALLMODE=mous REINSTALL=ALL
IMPORTANT
The SCUPCatalog.cab file is created by using paths that are specific to the site server where the update bundle is installed.
It can't be used on other site servers.
After the wizard is finished, import the catalog to Updates Publisher. Then use software updates to deploy the
updates. For more information, see System Center Updates Publisher.
Import the updates to Updates Publisher
1. Start the Updates Publisher console and select Impor t .
2. On the Impor t Type page of the Import Software Updates Catalog Wizard, select Specify the path to
the catalog to impor t . Then specify the SCUPCatalog.cab file.
3. Select Next , and then select Next again.
4. In the Security Warning - Catalog Validation window, select Accept . Close the wizard after it's
finished.
5. Select the update that you want to deploy, and then select Publish .
6. On the Publish Options page of the Publish Software Updates Wizard, select Full Content , and then
select Next .
7. Complete the wizard to publish the updates.
Use software deployment to install updates
When you install the update bundle on the site server of a primary site or CAS, you can configure the
installation Wizard to create update packages for software deployment. Then deploy each package to a
collection of computers that you want to update.
To create a software deployment package, on the Configure Software Update Deployment page of the
wizard, select each update package type that you want to update. The available types can include servers,
Configuration Manager consoles, and clients. A separate package is created for each type of update that you
select.
NOTE
The package for servers contains updates for the following components:
Site server
SMS Provider
Site database
Next, on the Configure Software Update Deployment Method page of the wizard, select the option I will
use software distribution .
After the wizard is finished, view the packages in the Configuration Manager console. Go to the Packages node
in the Software Librar y workspace. Use your standard process to deploy software packages to Configuration
Manager clients. When a package runs on a client, it installs the updates to the applicable components of
Configuration Manager on the client computer.
For more information about how to deploy packages to Configuration Manager clients, see Packages and
programs.
Create collections for deploying updates to Configuration Manager
You can deploy specific updates to applicable clients. The following information can help you to create device
collections for the different components for Configuration Manager.
CAS server Create a direct membership query and add the CAS server.
All primary site servers Create a direct membership query and add each primary site
server.
All secondary site servers Create a direct membership query and add each secondary
site server.
All x86 clients Create a collection with the following query criteria:
Select * from SMS_R_System inner join
SMS_G_System_SYSTEM on
SMS_G_System_SYSTEM.ResourceID =
SMS_R_System.ResourceId where
SMS_G_System_SYSTEM.SystemType = "X86-based PC"
All x64 clients Create a collection with the following query criteria:
Select * from SMS_R_System inner join
SMS_G_System_SYSTEM on
SMS_G_System_SYSTEM.ResourceID =
SMS_R_System.ResourceId where
SMS_G_System_SYSTEM.SystemType = "X64-based PC"
C O M P O N EN T O F C O N F IGURAT IO N M A N A GER IN ST RUC T IO N S
All computers that run the Configuration Manager console Create a direct membership query and add each computer.
Remote computers that run an instance of the SMS Provider Create a direct membership query and add each computer.
NOTE
To update a site database, deploy the update to the site server for that site.
IMPORTANT
When you install an update at the CAS, be aware of the following limitations and delays that exist until all child primary
sites also complete the update installation:
Client upgrades don't start. This includes automatic updates of clients and pre-production clients. Additionally, you
can't promote pre-production clients to production until the last site completes the update installation. After the last
site completes the update installation, client updates begin based on your configuration choices.
New features you enable with the update aren't available. This behavior is to prevent the CAS replicating data related
to that feature to a site that hasn't yet installed support for that feature. After all primary sites install the update, the
feature is available for use.
Replication links between the CAS and child primary sites display as not upgraded. This state displays in the update
installation status as Completed with warning for monitoring replication initialization. In the Monitoring workspace of
the console, this state displays as Link is being configured.
Pre-update checklist
All sites run a supported version of Configuration Manager
Each site server in the hierarchy must run the same version of Configuration Manager before you can start the
installation. To update to version 2111, use version 2006 or later.
Review the status of your product licensing
You need an active Software Assurance (SA) agreement or equivalent subscription rights to install this update.
When you update the site, the Licensing page presents the option to confirm your Software Assurance
expiration date .
This value is optional. You can specify as a convenient reminder of your license expiration date. This date is
visible when you install future updates. You might have previously specified this value during setup or
installation of an update. You can also specify this value in the Configuration Manager console. In the
Administration workspace, expand Site Configuration , and select Sites . Select Hierarchy Settings in the
ribbon, and switch to the Licensing tab.
For more information, see Licensing and branches.
Review Microsoft .NET versions
Configuration Manager now requires Microsoft .NET Framework version 4.6.2 for site servers, specific site
systems, clients, and the console. Before you run setup to install or update the site, first update .NET and restart
the system. If possible in your environment, install the latest version of .NET version 4.8.
This installation can put the site system server into a reboot pending state and report errors to the
Configuration Manager component status viewer. .NET applications on the server might experience random
failures until you restart the server.
For more information including how to manage restarts, see Site and site system prerequisites.
Review the version of the Windows ADK
The version of the Windows Assessment and Deployment Kit (ADK) should be supported for Configuration
Manager version 2111. For more information, see Support for the Windows ADK. If you need to update the
Windows ADK, do so before you begin the update of Configuration Manager. This order makes sure the default
boot images are automatically updated to the latest version of Windows PE. Manually update any custom boot
images after updating the site.
If you update the site before you update the Windows ADK, see Update distribution points with the boot image.
Review SQL Server Native Client version
Install a minimum version of SQL Server 2012 Native Client, which includes support for TLS 1.2. For more
information, see the List of prerequisite checks.
Review the site and hierarchy status for unresolved issues
A site update can fail because of existing operational problems. Before you update a site, resolve all operational
issues for the following systems:
The site server
The site database server
Remote site system roles on other servers
For more information, see Use the status system.
Review file and data replication between sites
Make sure that file and database replication between sites is operational and current. Delays or backlogs in
either can prevent a successful update.
Database replication
For database replication, to help resolve issues before you start the update, use the Replication Link Analyzer
(RLA). For more information, see Monitor database replication.
Use RLA to answer the following questions:
Is replication per group in a good state?
Are any links degraded?
Are there any errors?
If there's a backlog, wait until it clears out. If the backlog is large, such as millions of records, then the link is in a
bad state. Before updating the site, solve the replication issue. If you need further assistance, contact Microsoft
Support.
File-based replication
For file-based replication, check all inboxes for a backlog on both sending and receiving sites. If there are lots of
stuck or pending replication jobs, wait until they clear out.
On the sending site, review sender.log .
On the receiving site, review despooler log .
Install all applicable critical Windows updates
Before you install an update for Configuration Manager, install any critical OS updates for each applicable site
system. These servers include the site server, site database server, and remote site system roles. If an update that
you install requires a restart, restart the applicable servers before you start the upgrade.
Disable database replicas for management points at primary sites
Configuration Manager can't successfully update a primary site that has a database replica for management
points enabled. Before you install an update for Configuration Manager, disable database replication.
For more information, see Database replicas for management points.
Set SQL Server Always On availability groups to manual failover
If you use an availability group, make sure that the availability group is set to manual failover before you start
the update installation. After the site has updated, you can restore failover to be automatic. For more
information, see Prepare to use an availability group.
Disable site maintenance tasks at each site
Before you install the update, disable any site maintenance task that might run during the time the update
process is active. For example, but not limited to:
Backup Site Server
Delete Aged Client Operations
Delete Aged Discovery Data
When a site database maintenance task runs during the update installation, the update installation can fail.
Before you disable a task, record the schedule of the task so you can restore its configuration after the update
has been installed.
For more information, see Maintenance tasks and Reference for maintenance tasks.
Temporarily stop any antivirus software
Before you update a site, stop antivirus software on the Configuration Manager servers. The antivirus software
can lock some files that need to be updated which causes our update to fail.
Create a backup of the site database
Before you update a site, back up the site database at the CAS and primary sites. This backup makes sure you
have a successful backup to use for disaster recovery.
For more information, see Backup and recovery.
Back up customized files
If you or a third-party product customizes any Configuration Manager configuration files, save a copy of your
customizations.
For example, you add custom entries to the osdinjection.xml file in the bin\X64 folder of your Configuration
Manager installation directory. After you update Configuration Manager, these customizations don't persist.
Reapply your customizations.
Review hardware inventory customizations
If you changed the state of hardware inventory classes in client settings, when you update the site, some classes
may revert to a default state. For example, if you disable the SMS_Windows8Application or
SMS_Windows8ApplicationUserInfo classes, they're enabled after installing a Configuration Manager update.
When you customize hardware inventory classes, note their configuration before you install the update.
Plan for client piloting
When you install a site update that also updates the client, test that new client update in pre-production before
you update all production clients. To use this option, configure your site to support automatic upgrades for pre-
production before beginning installation of the update.
For more information, see Upgrade clients and How to test client upgrades in a pre-production collection.
NOTE
When you update to version 2107 or later, clients with PKI certificates will recreate self-signed certificates, but don't
reregister with the site. Clients without a PKI certificate will reregister with the site, which can cause extra processing at
the site. Make sure that your process to update clients allows for randomization. If you simultaneously update lots of
clients, it may cause a backlog on the site server.
TIP
If you develop a third-party add-on to Configuration Manager, you should test your add-on with every monthly technical
preview branch release. Regular testing helps confirm compatibility, and allows for early reporting of any issues with
standard interfaces.
NOTE
Starting in version 2111, third-party add-ons that use Microsoft .NET Framework and rely on Configuration Manager
libraries also need to use .NET 4.6.2 or later. For more information, see External dependencies require .NET 4.6.2.
IMPORTANT
When the prerequisite checker runs, the process updates some product source files that are used for site maintenance
tasks. After running the prerequisite checker, but before installing the update, if you need to do a site maintenance task,
run Setupwpf.exe (Configuration Manager Setup) from the CD.Latest folder on the site server.
Update sites
You're now ready to start the update installation for your hierarchy. For more information about installing the
update, see Install in-console updates.
You may plan to install the update outside of normal business hours. Determine when the process will have the
least effect on your business operations. Installing the update and its actions reinstall site components and site
system roles.
For more information, see Updates for Configuration Manager.
Post-update checklist
After the site updates, use the following checklist to complete common tasks and configurations.
Confirm version and restart (if necessary)
Make sure each site server and site system role is updated to version 2111. In the console, add the Version
column to the Sites and Distribution Points nodes in the Administration workspace. When necessary, a site
system role automatically reinstalls to update to the new version.
Consider restarting remote site systems that don't successfully update at first. Review your site infrastructure
and make sure that applicable site servers and remote site system servers successfully restarted. Typically, site
servers restart only when Configuration Manager installs .NET as a prerequisite for a site system role.
Confirm site -to -site replication is active
In the Configuration Manager console, go to the following locations to view the status, and make sure that
replication is active:
Monitoring workspace, Site Hierarchy node
Monitoring workspace, Database Replication node
For more information, see the following articles:
Monitor hierarchy and replication infrastructure
About the Replication Link Analyzer
Update Configuration Manager consoles
Update all remote Configuration Manager consoles to the same version. You're prompted to update the console
when:
You open the console.
You go to a new node in the console.
Reconfigure database replicas for management points
After you update a primary site, reconfigure the database replica for management points that you uninstalled
before you updated the site. For more information, see Database replicas for management points.
Reconfigure availability groups
If you use an availability group, reset the failover configuration to automatic. For more information, see Prepare
to use an availability group.
Reconfigure any disabled maintenance tasks
If you disabled database maintenance tasks at a site before installing the update, reconfigure those tasks. Use
the same settings that were in place before the update.
Restore hardware inventory customizations
If you changed the state of hardware inventory classes in client settings, when you update the site, some classes
may revert to a default state. For example, if you disable the SMS_Windows8Application or
SMS_Windows8ApplicationUserInfo classes, they're enabled after installing a Configuration Manager update.
When you customize hardware inventory classes, review their configuration after you install the update to make
sure they are configured as you intend.
Restore user state from active deployments
If you have any active user state migrations, before you update the Configuration Manager client on those
devices, restore the user state. Due to changes to the encryption algorithm in version 2103, the updated client
will fail to restore the user state when it tries to use a different encryption algorithm.
Update clients
Update clients per the plan you created, especially if you configured client piloting before installing the update.
For more information, see How to upgrade clients for Windows computers.
Third-party extensions
If you use any extensions to Configuration Manager, update them to a version that supports and is compatible
with Configuration Manager version 2111.
Enable any custom solutions
Enable any custom solutions based on the Configuration Manager SDK or PowerShell that you've already tested
in a lab environment with version 2111.
Update boot images and media
Use the Update Distribution Points action for any boot image that you use, whether it's a default or custom
boot image. This action makes sure that clients can use the latest version. Even if there isn't a new version of the
Windows ADK, the Configuration Manager client components may change with an update. If you don't update
boot images and media, task sequence deployments may fail on devices.
When you update the site, Configuration Manager automatically updates the default boot images. It doesn't
automatically distribute the updated content to distribution points. Use the Update Distribution Points action
on specific boot images when you're ready to distribute this content across your network.
NOTE
For default boot images, the site always uses the current version of the Configuration Manager client that matches the
site's version. Even if you configure automatic client upgrades to use a pre-production collection, that feature doesn't
apply to boot images.
After updating the site, manually update any custom boot images. This action updates the boot image with the
latest client components if necessary, optionally reloads it with the current Windows PE version, and
redistributes the content to the distribution points.
For more information, see Update distribution points with the boot image.
Update PowerShell help content
To get the latest information for the Configuration Manager PowerShell module, use the Update-Help cmdlet.
Run this cmdlet on all computers with the Configuration Manager console. This help content is the same as
what's published on docs.microsoft.com for the ConfigurationManager module.
For more information, see Configuration Manager PowerShell cmdlets: Update help.
Next steps
Review the release notes. This article can be updated regularly, especially right after a new current branch
release. You can use RSS to be notified when this page is updated. For more information, see How to use the
docs.
Checklist for installing update 2107 for
Configuration Manager
2/16/2022 • 14 minutes to read • Edit Online
IMPORTANT
When you install an update at the CAS, be aware of the following limitations and delays that exist until all child primary
sites also complete the update installation:
Client upgrades don't start. This includes automatic updates of clients and pre-production clients. Additionally, you
can't promote pre-production clients to production until the last site completes the update installation. After the last
site completes the update installation, client updates begin based on your configuration choices.
New features you enable with the update aren't available. This behavior is to prevent the CAS replicating data related
to that feature to a site that hasn't yet installed support for that feature. After all primary sites install the update, the
feature is available for use.
Replication links between the CAS and child primary sites display as not upgraded. This state displays in the update
installation status as Completed with warning for monitoring replication initialization. In the Monitoring workspace of
the console, this state displays as Link is being configured.
Checklist
All sites run a supported version of Configuration Manager
Each site server in the hierarchy must run the same version of Configuration Manager before you can start the
installation of update 2107. To update to 2107, use version 2002 or later.
Review the status of your product licensing
You need an active Software Assurance (SA) agreement or equivalent subscription rights to install this update.
When you update the site, the Licensing page presents the option to confirm your Software Assurance
expiration date .
This value is optional. You can specify as a convenient reminder of your license expiration date. This date is
visible when you install future updates. You might have previously specified this value during setup or
installation of an update. You can also specify this value in the Configuration Manager console. In the
Administration workspace, expand Site Configuration , and select Sites . Select Hierarchy Settings in the
ribbon, and switch to the Licensing tab.
For more information, see Licensing and branches.
Review Microsoft .NET versions
Configuration Manager now requires Microsoft .NET Framework version 4.6.2 for site servers, specific site
systems, clients, and the console. Before you run setup to install or update the site, first update .NET and restart
the system. If possible in your environment, install the latest version of .NET version 4.8.
This installation can put the site system server into a reboot pending state and report errors to the
Configuration Manager component status viewer. .NET applications on the server might experience random
failures until you restart the server.
For more information including how to manage restarts, see Site and site system prerequisites.
Review the version of the Windows ADK
The version of the Windows Assessment and Deployment Kit (ADK) should be supported for Configuration
Manager version 2107. For more information, see Support for the Windows ADK. If you need to update the
Windows ADK, do so before you begin the update of Configuration Manager. This order makes sure the default
boot images are automatically updated to the latest version of Windows PE. Manually update any custom boot
images after updating the site.
If you update the site before you update the Windows ADK, see Update distribution points with the boot image.
Review SQL Server Native Client version
Install a minimum version of SQL Server 2012 Native Client, which includes support for TLS 1.2. For more
information, see the List of prerequisite checks.
Review the site and hierarchy status for unresolved issues
A site update can fail because of existing operational problems. Before you update a site, resolve all operational
issues for the following systems:
The site server
The site database server
Remote site system roles on other servers
For more information, see Use the status system.
Review file and data replication between sites
Make sure that file and database replication between sites is operational and current. Delays or backlogs in
either can prevent a successful update.
Database replication
For database replication, to help resolve issues before you start the update, use the Replication Link Analyzer
(RLA). For more information, see Monitor database replication.
Use RLA to answer the following questions:
Is replication per group in a good state?
Are any links degraded?
Are there any errors?
If there's a backlog, wait until it clears out. If the backlog is large, such as millions of records, then the link is in a
bad state. Before updating the site, solve the replication issue. If you need further assistance, contact Microsoft
Support.
File-based replication
For file-based replication, check all inboxes for a backlog on both sending and receiving sites. If there are lots of
stuck or pending replication jobs, wait until they clear out.
On the sending site, review sender.log .
On the receiving site, review despooler log .
Install all applicable critical Windows updates
Before you install an update for Configuration Manager, install any critical OS updates for each applicable site
system. These servers include the site server, site database server, and remote site system roles. If an update that
you install requires a restart, restart the applicable servers before you start the upgrade.
Disable database replicas for management points at primary sites
Configuration Manager can't successfully update a primary site that has a database replica for management
points enabled. Before you install an update for Configuration Manager, disable database replication.
For more information, see Database replicas for management points.
Set SQL Server Always On availability groups to manual failover
If you use an availability group, make sure that the availability group is set to manual failover before you start
the update installation. After the site has updated, you can restore failover to be automatic. For more
information, see Prepare to use an availability group.
Disable site maintenance tasks at each site
Before you install the update, disable any site maintenance task that might run during the time the update
process is active. For example, but not limited to:
Backup Site Server
Delete Aged Client Operations
Delete Aged Discovery Data
When a site database maintenance task runs during the update installation, the update installation can fail.
Before you disable a task, record the schedule of the task so you can restore its configuration after the update
has been installed.
For more information, see Maintenance tasks and Reference for maintenance tasks.
Temporarily stop any antivirus software
Before you update a site, stop antivirus software on the Configuration Manager servers. The antivirus software
can lock some files that need to be updated which causes our update to fail.
Create a backup of the site database
Before you update a site, back up the site database at the CAS and primary sites. This backup makes sure you
have a successful backup to use for disaster recovery.
For more information, see Backup and recovery.
Back up customized files
If you or a third-party product customizes any Configuration Manager configuration files, save a copy of your
customizations.
For example, you add custom entries to the osdinjection.xml file in the bin\X64 folder of your Configuration
Manager installation directory. After you update Configuration Manager, these customizations don't persist.
Reapply your customizations.
Plan for client piloting
When you install a site update that also updates the client, test that new client update in pre-production before
you update all production clients. To use this option, configure your site to support automatic upgrades for pre-
production before beginning installation of the update.
For more information, see Upgrade clients and How to test client upgrades in a pre-production collection.
NOTE
When you update to version 2107 or later, clients with PKI certificates will recreate self-signed certificates, but don't
reregister with the site. Clients without a PKI certificate will reregister with the site, which can cause extra processing at
the site. Make sure that your process to update clients allows for randomization. If you simultaneously update lots of
clients, it may cause a backlog on the site server.
IMPORTANT
When the prerequisite checker runs, the process updates some product source files that are used for site maintenance
tasks. After running the prerequisite checker, but before installing the update, if you need to do a site maintenance task,
run Setupwpf.exe (Configuration Manager Setup) from the CD.Latest folder on the site server.
Update sites
You're now ready to start the update installation for your hierarchy. For more information about installing the
update, see Install in-console updates.
You may plan to install the update outside of normal business hours. Determine when the process will have the
least effect on your business operations. Installing the update and its actions reinstall site components and site
system roles.
For more information, see Updates for Configuration Manager.
Post-update checklist
After the site updates, use the following checklist to complete common tasks and configurations.
Confirm version and restart (if necessary)
Make sure each site server and site system role is updated to version 2107. In the console, add the Version
column to the Sites and Distribution Points nodes in the Administration workspace. When necessary, a site
system role automatically reinstalls to update to the new version.
Consider restarting remote site systems that don't successfully update at first. Review your site infrastructure
and make sure that applicable site servers and remote site system servers successfully restarted. Typically, site
servers restart only when Configuration Manager installs .NET as a prerequisite for a site system role.
Confirm site -to -site replication is active
In the Configuration Manager console, go to the following locations to view the status, and make sure that
replication is active:
Monitoring workspace, Site Hierarchy node
Monitoring workspace, Database Replication node
For more information, see the following articles:
Monitor hierarchy and replication infrastructure
About the Replication Link Analyzer
Update Configuration Manager consoles
Update all remote Configuration Manager consoles to the same version. You're prompted to update the console
when:
You open the console.
You go to a new node in the console.
Reconfigure database replicas for management points
After you update a primary site, reconfigure the database replica for management points that you uninstalled
before you updated the site. For more information, see Database replicas for management points.
Reconfigure availability groups
If you use an availability group, reset the failover configuration to automatic. For more information, see Prepare
to use an availability group.
Reconfigure any disabled maintenance tasks
If you disabled database maintenance tasks at a site before installing the update, reconfigure those tasks. Use
the same settings that were in place before the update.
Restore user state from active deployments
If you have any active user state migrations, before you update the Configuration Manager client on those
devices, restore the user state. Due to changes to the encryption algorithm in version 2103, the updated client
will fail to restore the user state when it tries to use a different encryption algorithm.
Update clients
Update clients per the plan you created, especially if you configured client piloting before installing the update.
For more information, see How to upgrade clients for Windows computers.
Third-party extensions
If you use any extensions to Configuration Manager, update them to a version that supports and is compatible
with Configuration Manager version 2107.
Enable any custom solutions
Enable any custom solutions based on the Configuration Manager SDK or PowerShell that you've already tested
in a lab environment with version 2107.
Update boot images and media
Use the Update Distribution Points action for any boot image that you use, whether it's a default or custom
boot image. This action makes sure that clients can use the latest version. Even if there isn't a new version of the
Windows ADK, the Configuration Manager client components may change with an update. If you don't update
boot images and media, task sequence deployments may fail on devices.
When you update the site, Configuration Manager automatically updates the default boot images. It doesn't
automatically distribute the updated content to distribution points. Use the Update Distribution Points action
on specific boot images when you're ready to distribute this content across your network.
NOTE
The site always uses the production version of the Configuration Manager client in default boot images. Even if you
configure automatic client upgrades to use a pre-production collection, that feature doesn't apply to boot images.
After updating the site, manually update any custom boot images. This action updates the boot image with the
latest client components if necessary, optionally reloads it with the current Windows PE version, and
redistributes the content to the distribution points.
For more information, see Update distribution points with the boot image.
Update PowerShell help content
To get the latest information for the Configuration Manager PowerShell module, use the Update-Help cmdlet.
Run this cmdlet on all computers with the Configuration Manager console. This help content is the same as
what's published on docs.microsoft.com for the ConfigurationManager module.
For more information, see Configuration Manager PowerShell cmdlets: Update help.
Next steps
Review the release notes. This article can be updated regularly, especially right after a new current branch
release. You can use RSS to be notified when this page is updated. For more information, see How to use the
docs.
Checklist for installing update 2103 for
Configuration Manager
2/16/2022 • 14 minutes to read • Edit Online
IMPORTANT
When you install an update at the CAS, be aware of the following limitations and delays that exist until all child primary
sites also complete the update installation:
Client upgrades don't start. This includes automatic updates of clients and pre-production clients. Additionally, you
can't promote pre-production clients to production until the last site completes the update installation. After the last
site completes the update installation, client updates begin based on your configuration choices.
New features you enable with the update aren't available. This behavior is to prevent the CAS replicating data related
to that feature to a site that hasn't yet installed support for that feature. After all primary sites install the update, the
feature is available for use.
Replication links between the CAS and child primary sites display as not upgraded. This state displays in the update
installation status as Completed with warning for monitoring replication initialization. In the Monitoring workspace of
the console, this state displays as Link is being configured.
Checklist
All sites run a supported version of Configuration Manager
Each site server in the hierarchy must run the same version of Configuration Manager before you can start the
installation of update 2103. To update to 2103, you must use version 1910 or later.
Review the status of your product licensing
You must have an active Software Assurance (SA) agreement or equivalent subscription rights to install this
update. When you update the site, the Licensing page presents the option to confirm your Software
Assurance expiration date .
This value is optional. You can specify as a convenient reminder of your license expiration date. This date is
visible when you install future updates. You might have previously specified this value during setup or
installation of an update. You can also specify this value in the Configuration Manager console. In the
Administration workspace, expand Site Configuration , and select Sites . Select Hierarchy Settings in the
ribbon, and switch to the Licensing tab.
For more information, see Licensing and branches.
Review Microsoft .NET versions
When a site installs this update, if the minimum requirement of .NET Framework 4.5 isn't installed,
Configuration Manager automatically installs .NET Framework 4.5.2. When this prerequisite isn't already
installed, the site installs it on each server that hosts one of the following site system roles:
Management point
Service connection point
Enrollment proxy point
Enrollment point
This installation can put the site system server into a reboot pending state and report errors to the
Configuration Manager component status viewer. Additionally, .NET applications on the server might experience
random failures until you restart the server.
For more information, see Site and site system prerequisites.
Review the version of the Windows ADK
The version of the Windows Assessment and Deployment Kit (ADK) should be supported for Configuration
Manager version 2103. For more information, see Support for the Windows ADK. If you need to update the
Windows ADK, do so before you begin the update of Configuration Manager. This order makes sure the default
boot images are automatically updated to the latest version of Windows PE. Manually update any custom boot
images after updating the site.
If you update the site before you update the Windows ADK, see Update distribution points with the boot image.
Review SQL Server Native Client version
Install a minimum version of SQL Server 2012 Native Client, which includes support for TLS 1.2. For more
information, see the List of prerequisite checks.
Review the site and hierarchy status for unresolved issues
A site update can fail because of existing operational problems. Before you update a site, resolve all operational
issues for the following systems:
The site server
The site database server
Remote site system roles on other servers
For more information, see Use the status system.
Review file and data replication between sites
Make sure that file and database replication between sites is operational and current. Delays or backlogs in
either can prevent a successful update.
Database replication
For database replication, to help resolve issues before you start the update, use the Replication Link Analyzer
(RLA). For more information, see Monitor database replication.
Use RLA to answer the following questions:
Is replication per group in a good state?
Are any links degraded?
Are there any errors?
If there's a backlog, wait until it clears out. If the backlog is large, such as millions of records, then the link is in a
bad state. Before updating the site, solve the replication issue. If you need further assistance, contact Microsoft
Support.
File-based replication
For file-based replication, check all inboxes for a backlog on both sending and receiving sites. If there are lots of
stuck or pending replication jobs, wait until they clear out.
On the sending site, review sender.log .
On the receiving site, review despooler log .
Install all applicable critical Windows updates
Before you install an update for Configuration Manager, install any critical OS updates for each applicable site
system. These servers include the site server, site database server, and remote site system roles. If an update that
you install requires a restart, restart the applicable servers before you start the upgrade.
Disable database replicas for management points at primary sites
Configuration Manager can't successfully update a primary site that has a database replica for management
points enabled. Before you install an update for Configuration Manager, disable database replication.
For more information, see Database replicas for management points.
Set SQL Server Always On availability groups to manual failover
If you use an availability group, make sure that the availability group is set to manual failover before you start
the update installation. After the site has updated, you can restore failover to be automatic. For more
information, see Prepare to use an availability group.
Disable site maintenance tasks at each site
Before you install the update, disable any site maintenance task that might run during the time the update
process is active. For example, but not limited to:
Backup Site Server
Delete Aged Client Operations
Delete Aged Discovery Data
When a site database maintenance task runs during the update installation, the update installation can fail.
Before you disable a task, record the schedule of the task so you can restore its configuration after the update
has been installed.
For more information, see Maintenance tasks and Reference for maintenance tasks.
Temporarily stop any antivirus software
Before you update a site, stop antivirus software on the Configuration Manager servers. The antivirus software
can lock some files that need to be updated which causes our update to fail.
Create a backup of the site database
Before you update a site, back up the site database at the CAS and primary sites. This backup makes sure you
have a successful backup to use for disaster recovery.
For more information, see Backup and recovery.
Back up customized files
If you or a third-party product customizes any Configuration Manager configuration files, save a copy of your
customizations.
For example, you add custom entries to the osdinjection.xml file in the bin\X64 folder of your Configuration
Manager installation directory. After you update Configuration Manager, these customizations don't persist.
Reapply your customizations.
Plan for client piloting
When you install a site update that also updates the client, test that new client update in pre-production before
you update all production clients. To use this option, configure your site to support automatic upgrades for pre-
production before beginning installation of the update.
For more information, see Upgrade clients and How to test client upgrades in a pre-production collection.
Plan to use service windows
To define a period during which updates to a site server can be installed, use service windows. They can help
you control when sites in your hierarchy install the update. For more information, see Service windows for site
servers.
Review supported extensions
If you extend Configuration Manager with other products from Microsoft, Microsoft partners, or third-party
vendors, confirm that those products support and are compatible with version 2103. Check with the product
vendor for this information.
Disable any custom solutions
If your site has any custom solutions based on the Configuration Manager SDK or PowerShell, disable this code
before you update the site. Make sure to test this custom code in a lab environment to make sure it's compatible
with the new version.
Read the release notes
Before you start the update, review the current release notes. With Configuration Manager, product release
notes are limited to urgent issues. These issues aren't yet fixed in the product, or detailed in a Microsoft Support
article.
Feature-specific documentation may include information about known issues that affect core scenarios.
For more information, see the Release notes.
Run the setup prerequisite checker
When the console lists the update as Available , you can run the prerequisite checker before installing the
update. (When you install the update on the site, prerequisite checker runs again.)
To run a prerequisite check from the console, go to the Administration workspace, and select Updates and
Ser vicing . Select the Configuration Manager 2103 update package, and select Run prerequisite check in
the ribbon.
For more information, see the section to Run the prerequisite checker before installing an update in
Before you install an in-console update.
IMPORTANT
When the prerequisite checker runs, the process updates some product source files that are used for site maintenance
tasks. After running the prerequisite checker, but before installing the update, if you need to do a site maintenance task,
run Setupwpf.exe (Configuration Manager Setup) from the CD.Latest folder on the site server.
Update sites
You're now ready to start the update installation for your hierarchy. For more information about installing the
update, see Install in-console updates.
You may plan to install the update outside of normal business hours. Determine when the process will have the
least effect on your business operations. Installing the update and its actions reinstall site components and site
system roles.
For more information, see Updates for Configuration Manager.
Post-update checklist
After the site updates, use the following checklist to complete common tasks and configurations.
Confirm version and restart (if necessary)
Make sure each site server and site system role is updated to version 2103. In the console, add the Version
column to the Sites and Distribution Points nodes in the Administration workspace. When necessary, a site
system role automatically reinstalls to update to the new version.
Consider restarting remote site systems that don't successfully update at first. Review your site infrastructure
and make sure that applicable site servers and remote site system servers successfully restarted. Typically, site
servers restart only when Configuration Manager installs .NET as a prerequisite for a site system role.
Confirm site -to -site replication is active
In the Configuration Manager console, go to the following locations to view the status, and make sure that
replication is active:
Monitoring workspace, Site Hierarchy node
Monitoring workspace, Database Replication node
For more information, see the following articles:
Monitor hierarchy and replication infrastructure
About the Replication Link Analyzer
Update Configuration Manager consoles
Update all remote Configuration Manager consoles to the same version. You're prompted to update the console
when:
You open the console.
You go to a new node in the console.
Reconfigure database replicas for management points
After you update a primary site, reconfigure the database replica for management points that you uninstalled
before you updated the site. For more information, see Database replicas for management points.
Reconfigure availability groups
If you use an availability group, reset the failover configuration to automatic. For more information, see Prepare
to use an availability group.
Reconfigure any disabled maintenance tasks
If you disabled database maintenance tasks at a site before installing the update, reconfigure those tasks. Use
the same settings that were in place before the update.
Update clients
Update clients per the plan you created, especially if you configured client piloting before installing the update.
For more information, see How to upgrade clients for Windows computers.
Third-party extensions
If you use any extensions to Configuration Manager, update them to a version that supports and is compatible
with Configuration Manager version 2103.
Enable any custom solutions
Enable any custom solutions based on the Configuration Manager SDK or PowerShell that you've already tested
in a lab environment with version 2103.
Update boot images and media
Use the Update Distribution Points action for any boot image that you use, whether it's a default or custom
boot image. This action makes sure that clients can use the latest version. Even if there isn't a new version of the
Windows ADK, the Configuration Manager client components may change with an update. If you don't update
boot images and media, task sequence deployments may fail on devices.
When you update the site, Configuration Manager automatically updates the default boot images. It doesn't
automatically distribute the updated content to distribution points. Use the Update Distribution Points action
on specific boot images when you're ready to distribute this content across your network.
NOTE
The site always uses the production version of the Configuration Manager client in default boot images. Even if you
configure automatic client upgrades to use a pre-production collection, that feature doesn't apply to boot images.
After updating the site, manually update any custom boot images. This action updates the boot image with the
latest client components if necessary, optionally reloads it with the current Windows PE version, and
redistributes the content to the distribution points.
For more information, see Update distribution points with the boot image.
Update PowerShell help content
To get the latest information for the Configuration Manager PowerShell module, use the Update-Help cmdlet.
Run this cmdlet on all computers with the Configuration Manager console. This help content is the same as
what's published on docs.microsoft.com for the ConfigurationManager module.
For more information, see Configuration Manager PowerShell cmdlets: Update help.
Next steps
Review the release notes. This article can be updated regularly, especially right after a new current branch
release. You can use RSS to be notified when this page is updated. For more information, see How to use the
docs.
Checklist for installing update 2010 for
Configuration Manager
2/16/2022 • 12 minutes to read • Edit Online
For more information about installing updates, see In-console updates and servicing.
For more information about current branch versions, see Baseline and update versions.
IMPORTANT
When you install an update at the CAS, be aware of the following limitations and delays that exist until all child primary
sites also complete the update installation:
Client upgrades don't start. This includes automatic updates of clients and pre-production clients. Additionally, you
can't promote pre-production clients to production until the last site completes the update installation. After the last
site completes the update installation, client updates begin based on your configuration choices.
New features you enable with the update aren't available. This behavior is to prevent the CAS replicating data related
to that feature to a site that hasn't yet installed support for that feature. After all primary sites install the update, the
feature is available for use.
Replication links between the CAS and child primary sites display as not upgraded. This state displays in the update
installation status as Completed with warning for monitoring replication initialization. In the Monitoring workspace of
the console, this state displays as Link is being configured.
Checklist
All sites run a supported version of Configuration Manager
Each site server in the hierarchy must run the same version of Configuration Manager before you can start the
installation of update 2010. To update to 2010, you must use version 1906 or later.
Review the status of your product licensing
You must have an active Software Assurance (SA) agreement or equivalent subscription rights to install this
update. When you update the site, the Licensing page presents the option to confirm your Software
Assurance expiration date .
This value is optional. You can specify as a convenient reminder of your license expiration date. This date is
visible when you install future updates. You might have previously specified this value during setup or
installation of an update. You can also specify this value in the Configuration Manager console. In the
Administration workspace, expand Site Configuration , and select Sites . Select Hierarchy Settings in the
ribbon, and switch to the Licensing tab.
For more information, see Licensing and branches.
Review Microsoft .NET versions
When a site installs this update, if the minimum requirement of .NET Framework 4.5 isn't installed,
Configuration Manager automatically installs .NET Framework 4.5.2. When this prerequisite isn't already
installed, the site installs it on each server that hosts one of the following site system roles:
Management point
Service connection point
Enrollment proxy point
Enrollment point
This installation can put the site system server into a reboot pending state and report errors to the
Configuration Manager component status viewer. Additionally, .NET applications on the server might experience
random failures until you restart the server.
For more information, see Site and site system prerequisites.
Review the version of the Windows ADK
The version of the Windows Assessment and Deployment Kit (ADK) should be supported for Configuration
Manager version 2010. For more information, see Support for the Windows ADK. If you need to update the
Windows ADK, do so before you begin the update of Configuration Manager. This order makes sure the default
boot images are automatically updated to the latest version of Windows PE. Manually update any custom boot
images after updating the site.
If you update the site before you update the Windows ADK, see Update distribution points with the boot image.
Review SQL Server Native Client version
Install a minimum version of SQL Server 2012 Native Client, which includes support for TLS 1.2. For more
information, see the List of prerequisite checks.
Review the site and hierarchy status for unresolved issues
A site update can fail because of existing operational problems. Before you update a site, resolve all operational
issues for the following systems:
The site server
The site database server
Remote site system roles on other servers
For more information, see Use the status system.
Review file and data replication between sites
Make sure that file and database replication between sites is operational and current. Delays or backlogs in
either can prevent a successful update.
Database replication
For database replication, to help resolve issues before you start the update, use the Replication Link Analyzer
(RLA). For more information, see Monitor database replication.
Use RLA to answer the following questions:
Is replication per group in a good state?
Are any links degraded?
Are there any errors?
If there's a backlog, wait until it clears out. If the backlog is large, such as millions of records, then the link is in a
bad state. Before updating the site, solve the replication issue. If you need further assistance, contact Microsoft
Support.
File-based replication
For file-based replication, check all inboxes for a backlog on both sending and receiving sites. If there are lots of
stuck or pending replication jobs, wait until they clear out.
On the sending site, review sender.log .
On the receiving site, review despooler log .
Install all applicable critical Windows updates
Before you install an update for Configuration Manager, install any critical OS updates for each applicable site
system. These servers include the site server, site database server, and remote site system roles. If an update that
you install requires a restart, restart the applicable servers before you start the upgrade.
Disable database replicas for management points at primary sites
Configuration Manager can't successfully update a primary site that has a database replica for management
points enabled. Before you install an update for Configuration Manager, disable database replication.
For more information, see Database replicas for management points.
Set SQL Server Always On availability groups to manual failover
If you use an availability group, make sure that the availability group is set to manual failover before you start
the update installation. After the site has updated, you can restore failover to be automatic. For more
information, see Prepare to use an availability group.
Disable site maintenance tasks at each site
Before you install the update, disable any site maintenance task that might run during the time the update
process is active. For example, but not limited to:
Backup Site Server
Delete Aged Client Operations
Delete Aged Discovery Data
When a site database maintenance task runs during the update installation, the update installation can fail.
Before you disable a task, record the schedule of the task so you can restore its configuration after the update
has been installed.
For more information, see Maintenance tasks and Reference for maintenance tasks.
Temporarily stop any antivirus software
Before you update a site, stop antivirus software on the Configuration Manager servers. The antivirus software
can lock some files that need to be updated which causes our update to fail.
Create a backup of the site database
Before you update a site, back up the site database at the CAS and primary sites. This backup makes sure you
have a successful backup to use for disaster recovery.
For more information, see Backup and recovery.
Back up customized files
If you or a third-party product customizes any Configuration Manager configuration files, save a copy of your
customizations.
For example, you add custom entries to the osdinjection.xml file in the bin\X64 folder of your Configuration
Manager installation directory. After you update Configuration Manager, these customizations don't persist. You
need to reapply your customizations.
Plan for client piloting
When you install a site update that also updates the client, test that new client update in pre-production before
you update all production clients. To use this option, configure your site to support automatic upgrades for pre-
production before beginning installation of the update.
For more information, see Upgrade clients and How to test client upgrades in a pre-production collection.
Plan to use service windows
To define a period during which updates to a site server can be installed, use service windows. They can help
you control when sites in your hierarchy install the update. For more information, see Service windows for site
servers.
Review supported extensions
If you extend Configuration Manager with other products from Microsoft or Microsoft partners, confirm that
those products support version 2010. Check with the product vendor for this information. For example, see the
Microsoft Deployment Toolkit release notes.
Remove Intune subscription (hybrid MDM )
The hybrid MDM service offering is retired as of September 1, 2019. If your Configuration Manager site had a
Microsoft Intune subscription, you need to remove it. For more information, see Remove hybrid MDM.
Run the setup prerequisite checker
When the console lists the update as Available , you can run the prerequisite checker before installing the
update. (When you install the update on the site, prerequisite checker runs again.)
To run a prerequisite check from the console, go to the Administration workspace, and select Updates and
Ser vicing . Select the Configuration Manager 2010 update package, and select Run prerequisite check in
the ribbon.
For more information, see the section to Run the prerequisite checker before installing an update in
Before you install an in-console update.
IMPORTANT
When the prerequisite checker runs, the process updates some product source files that are used for site maintenance
tasks. Therefore, after running the prerequisite checker but before installing the update, if you need to perform a site
maintenance task, run Setupwpf.exe (Configuration Manager Setup) from the CD.Latest folder on the site server.
Update sites
You're now ready to start the update installation for your hierarchy. For more information about installing the
update, see Install in-console updates.
You may plan to install the update outside of normal business hours. Determine when the process will have the
least effect on your business operations. Installing the update and its actions reinstall site components and site
system roles.
For more information, see Updates for Configuration Manager.
Post-update checklist
After the site updates, use the following checklist to complete common tasks and configurations.
Confirm version and restart (if necessary)
Make sure each site server and site system role is updated to version 2010. In the console, add the Version
column to the Sites and Distribution Points nodes in the Administration workspace. When necessary, a site
system role automatically reinstalls to update to the new version.
Consider restarting remote site systems that don't successfully update at first. Review your site infrastructure
and make sure that applicable site servers and remote site system servers successfully restarted. Typically, site
servers restart only when Configuration Manager installs .NET as a prerequisite for a site system role.
Confirm site -to -site replication is active
In the Configuration Manager console, go to the following locations to view the status, and make sure that
replication is active:
Monitoring workspace, Site Hierarchy node
Monitoring workspace, Database Replication node
For more information, see the following articles:
Monitor hierarchy and replication infrastructure
About the Replication Link Analyzer
Update Configuration Manager consoles
Update all remote Configuration Manager consoles to the same version. You're prompted to update the console
when:
You open the console.
You go to a new node in the console.
Reconfigure database replicas for management points
After you update a primary site, reconfigure the database replica for management points that you uninstalled
before you updated the site. For more information, see Database replicas for management points.
Reconfigure availability groups
If you use an availability group, reset the failover configuration to automatic. For more information, see Prepare
to use an availability group.
Reconfigure any disabled maintenance tasks
If you disabled database maintenance tasks at a site before installing the update, reconfigure those tasks. Use
the same settings that were in place before the update.
Update clients
Update clients per the plan you created, especially if you configured client piloting before installing the update.
For more information, see How to upgrade clients for Windows computers.
Third-party extensions
If you use any extensions to Configuration Manager, update them to the latest version to support Configuration
Manager version 2010.
Update custom boot images and media
Use the Update Distribution Points action for any boot image that you use, whether it's a default or custom
boot image. This action makes sure that clients can use the latest version. Even if there isn't a new version of the
Windows ADK, the Configuration Manager client components may change with an update. If you don't update
boot images and media, task sequence deployments may fail on devices.
When you update the site, Configuration Manager automatically updates the default boot images. It doesn't
automatically distribute the updated content to distribution points. Use the Update Distribution Points action
on specific boot images when you're ready to distribute this content across your network.
After updating the site, manually update any custom boot images. This action updates the boot image with the
latest client components if necessary, optionally reloads it with the current Windows PE version, and
redistributes the content to the distribution points.
For more information, see Update distribution points with the boot image.
Checklist for installing update 2006 for
Configuration Manager
2/16/2022 • 12 minutes to read • Edit Online
For more information about installing updates, see In-console updates and servicing.
For more information about current branch versions, see Baseline and update versions.
IMPORTANT
When you install an update at the CAS, be aware of the following limitations and delays that exist until all child primary
sites also complete the update installation:
Client upgrades don't start. This includes automatic updates of clients and pre-production clients. Additionally, you
can't promote pre-production clients to production until the last site completes the update installation. After the last
site completes the update installation, client updates begin based on your configuration choices.
New features you enable with the update aren't available. This behavior is to prevent the CAS replicating data related
to that feature to a site that hasn't yet installed support for that feature. After all primary sites install the update, the
feature is available for use.
Replication links between the CAS and child primary sites display as not upgraded. This state displays in the update
installation status as Completed with warning for monitoring replication initialization. In the Monitoring workspace of
the console, this state displays as Link is being configured.
Checklist
All sites run a supported version of Configuration Manager
Each site server in the hierarchy must run the same version of Configuration Manager before you can start the
installation of update 2006. To update to 2006, you must use version 1810 or later.
Review the status of your product licensing
You must have an active Software Assurance (SA) agreement or equivalent subscription rights to install this
update. When you update the site, the Licensing page presents the option to confirm your Software
Assurance expiration date .
This value is optional. You can specify as a convenient reminder of your license expiration date. This date is
visible when you install future updates. You might have previously specified this value during setup or
installation of an update. You can also specify this value in the Configuration Manager console. In the
Administration workspace, expand Site Configuration , and select Sites . Select Hierarchy Settings in the
ribbon, and switch to the Licensing tab.
For more information, see Licensing and branches.
Review Microsoft .NET versions
When a site installs this update, if the minimum requirement of .NET Framework 4.5 isn't installed,
Configuration Manager automatically installs .NET Framework 4.5.2. When this prerequisite isn't already
installed, the site installs it on each server that hosts one of the following site system roles:
Management point
Service connection point
Enrollment proxy point
Enrollment point
This installation can put the site system server into a reboot pending state and report errors to the
Configuration Manager component status viewer. Additionally, .NET applications on the server might experience
random failures until you restart the server.
For more information, see Site and site system prerequisites.
Review the version of the Windows ADK
The version of the Windows Assessment and Deployment Kit (ADK) should be supported for Configuration
Manager version 2006. For more information, see Support for the Windows ADK. If you need to update the
Windows ADK, do so before you begin the update of Configuration Manager. This order makes sure the default
boot images are automatically updated to the latest version of Windows PE. Manually update any custom boot
images after updating the site.
If you update the site before you update the Windows ADK, see Update distribution points with the boot image.
Review SQL Server Native Client version
Install a minimum version of SQL Server 2012 Native Client, which includes support for TLS 1.2. For more
information, see the List of prerequisite checks.
Review the site and hierarchy status for unresolved issues
A site update can fail because of existing operational problems. Before you update a site, resolve all operational
issues for the following systems:
The site server
The site database server
Remote site system roles on other servers
For more information, see Use the status system.
Review file and data replication between sites
Make sure that file and database replication between sites is operational and current. Delays or backlogs in
either can prevent a successful update.
Database replication
For database replication, to help resolve issues before you start the update, use the Replication Link Analyzer
(RLA). For more information, see Monitor database replication.
Use RLA to answer the following questions:
Is replication per group in a good state?
Are any links degraded?
Are there any errors?
If there's a backlog, wait until it clears out. If the backlog is large, such as millions of records, then the link is in a
bad state. Before updating the site, solve the replication issue. If you need further assistance, contact Microsoft
Support.
File-based replication
For file-based replication, check all inboxes for a backlog on both sending and receiving sites. If there are lots of
stuck or pending replication jobs, wait until they clear out.
On the sending site, review sender.log .
On the receiving site, review despooler log .
Install all applicable critical Windows updates
Before you install an update for Configuration Manager, install any critical OS updates for each applicable site
system. These servers include the site server, site database server, and remote site system roles. If an update that
you install requires a restart, restart the applicable servers before you start the upgrade.
Disable database replicas for management points at primary sites
Configuration Manager can't successfully update a primary site that has a database replica for management
points enabled. Before you install an update for Configuration Manager, disable database replication.
For more information, see Database replicas for management points.
Set SQL Server Always On availability groups to manual failover
If you use an availability group, make sure that the availability group is set to manual failover before you start
the update installation. After the site has updated, you can restore failover to be automatic. For more
information, see Prepare to use an availability group.
Disable site maintenance tasks at each site
Before you install the update, disable any site maintenance task that might run during the time the update
process is active. For example, but not limited to:
Backup Site Server
Delete Aged Client Operations
Delete Aged Discovery Data
When a site database maintenance task runs during the update installation, the update installation can fail.
Before you disable a task, record the schedule of the task so you can restore its configuration after the update
has been installed.
For more information, see Maintenance tasks and Reference for maintenance tasks.
Temporarily stop any antivirus software
Before you update a site, stop antivirus software on the Configuration Manager servers. The antivirus software
can lock some files that need to be updated which causes our update to fail.
Create a backup of the site database
Before you update a site, back up the site database at the CAS and primary sites. This backup makes sure you
have a successful backup to use for disaster recovery.
For more information, see Backup and recovery.
Back up customized files
If you or a third-party product customizes any Configuration Manager configuration files, save a copy of your
customizations.
For example, you add custom entries to the osdinjection.xml file in the bin\X64 folder of your Configuration
Manager installation directory. After you update Configuration Manager, these customizations don't persist. You
need to reapply your customizations.
Plan for client piloting
When you install a site update that also updates the client, test that new client update in pre-production before
you update all production clients. To use this option, configure your site to support automatic upgrades for pre-
production before beginning installation of the update.
For more information, see Upgrade clients and How to test client upgrades in a pre-production collection.
Plan to use service windows
To define a period during which updates to a site server can be installed, use service windows. They can help
you control when sites in your hierarchy install the update. For more information, see Service windows for site
servers.
Review supported extensions
If you extend Configuration Manager with other products from Microsoft or Microsoft partners, confirm that
those products support version 2006. Check with the product vendor for this information. For example, see the
Microsoft Deployment Toolkit release notes.
Remove Intune subscription (hybrid MDM )
The hybrid MDM service offering is retired as of September 1, 2019. If your Configuration Manager site had a
Microsoft Intune subscription, you need to remove it. For more information, see Remove hybrid MDM.
Run the setup prerequisite checker
When the console lists the update as Available , you can run the prerequisite checker before installing the
update. (When you install the update on the site, prerequisite checker runs again.)
To run a prerequisite check from the console, go to the Administration workspace, and select Updates and
Ser vicing . Select the Configuration Manager 2006 update package, and select Run prerequisite check in
the ribbon.
For more information, see the section to Run the prerequisite checker before installing an update in
Before you install an in-console update.
IMPORTANT
When the prerequisite checker runs, the process updates some product source files that are used for site maintenance
tasks. Therefore, after running the prerequisite checker but before installing the update, if you need to perform a site
maintenance task, run Setupwpf.exe (Configuration Manager Setup) from the CD.Latest folder on the site server.
Update sites
You're now ready to start the update installation for your hierarchy. For more information about installing the
update, see Install in-console updates.
You may plan to install the update outside of normal business hours. Determine when the process will have the
least effect on your business operations. Installing the update and its actions reinstall site components and site
system roles.
For more information, see Updates for Configuration Manager.
Post-update checklist
After the site updates, use the following checklist to complete common tasks and configurations.
Confirm version and restart (if necessary)
Make sure each site server and site system role is updated to version 2006. In the console, add the Version
column to the Sites and Distribution Points nodes in the Administration workspace. When necessary, a site
system role automatically reinstalls to update to the new version.
Consider restarting remote site systems that don't successfully update at first. Review your site infrastructure
and make sure that applicable site servers and remote site system servers successfully restarted. Typically, site
servers restart only when Configuration Manager installs .NET as a prerequisite for a site system role.
Confirm site -to -site replication is active
In the Configuration Manager console, go to the following locations to view the status, and make sure that
replication is active:
Monitoring workspace, Site Hierarchy node
Monitoring workspace, Database Replication node
For more information, see the following articles:
Monitor hierarchy and replication infrastructure
About the Replication Link Analyzer
Update Configuration Manager consoles
Update all remote Configuration Manager consoles to the same version. You're prompted to update the console
when:
You open the console.
You go to a new node in the console.
Reconfigure database replicas for management points
After you update a primary site, reconfigure the database replica for management points that you uninstalled
before you updated the site. For more information, see Database replicas for management points.
Reconfigure availability groups
If you use an availability group, reset the failover configuration to automatic. For more information, see Prepare
to use an availability group.
Reconfigure any disabled maintenance tasks
If you disabled database maintenance tasks at a site before installing the update, reconfigure those tasks. Use
the same settings that were in place before the update.
Update clients
Update clients per the plan you created, especially if you configured client piloting before installing the update.
For more information, see How to upgrade clients for Windows computers.
Third-party extensions
If you use any extensions to Configuration Manager, update them to the latest version to support Configuration
Manager version 2006.
Update custom boot images and media
Use the Update Distribution Points action for any boot image that you use, whether it's a default or custom
boot image. This action makes sure that clients can use the latest version. Even if there isn't a new version of the
Windows ADK, the Configuration Manager client components may change with an update. If you don't update
boot images and media, task sequence deployments may fail on devices.
When you update the site, Configuration Manager automatically updates the default boot images. It doesn't
automatically distribute the updated content to distribution points. Use the Update Distribution Points action
on specific boot images when you're ready to distribute this content across your network.
After updating the site, manually update any custom boot images. This action updates the boot image with the
latest client components if necessary, optionally reloads it with the current Windows PE version, and
redistributes the content to the distribution points.
For more information, see Update distribution points with the boot image.
Support for Configuration Manager current branch
versions
2/16/2022 • 2 minutes to read • Edit Online
Figure 1. Example of the release cycle overlap for current branch servicing support. This example is for
illustration of the cycle, and doesn't represent actual or expected release dates.
NOTE
The latest current branch version is always in the Security and Critical Updates servicing phase. This support
statement means that if you encounter a code defect that warrants a critical update, you must have the latest current
branch version installed in order to receive a fix. All other supported current branch versions are eligible to receive only
security updates.
All support ends after the 18-month lifecycle has expired for a current branch version.
Update your Configuration Manager environment to the latest version before support for your current version expires.
For a list of the current branch versions, see Version details.
For more information about version numbers, and availability as an in-console update or as a baseline, see
Baseline and update versions.
Back up a Configuration Manager site
2/16/2022 • 15 minutes to read • Edit Online
WARNING
The two backup methods supported for Configuration Manager site recovery are:
A successful backup from the Backup Site Ser ver maintenance task
A manually recovered site database backup
IMPORTANT
Configuration Manager doesn't support DPM backup for a SQL Server Always On failover cluster instance that uses a
named instance. It does support DPM backup on a failover cluster instance that uses the default instance of SQL Server.
After you restore the site database, follow the steps in setup to recover the site. To use the site database that you
backed up with Data Protection Manager, select the recovery option to Use a site database that has been
manually recovered .
NOTE
Modifications of Smsbkup.ctl will apply after a restart of the service SMS_SITE_VSS_WRITER on the Site Server.
Site backup status information is written to the Smsbkup.log file. This file is created in the destination folder
that you specify in the properties of the Backup Site Server maintenance task.
To enable the site backup maintenance task
1. In the Configuration Manager console, go to the Administration workspace, expand Site
Configuration , and select the Sites node.
2. Select the site for which you want to enable the site backup maintenance task.
3. Select Site Maintenance Tasks in the ribbon.
4. Select the Backup Site Ser ver task, and select Edit .
5. Select the option to Enable this task . Select Set Paths to specify the backup destination. You have the
following options:
IMPORTANT
To help prevent tampering of the backup files, store the files in a secure location. The most secure backup path is
to a local drive, so you can set NTFS file permissions on the folder. Configuration Manager doesn't encrypt the
backup data that's stored in the backup path.
Local drive on site ser ver for site data and database : Specifies that the task stores the
backup files for the site and site database in the specified path on the local disk drive of the site
server. Create the local folder before the backup task runs. The Local System account on the site
server must have Write NTFS file permissions to the local folder for the site server backup. The
Local System account on the computer that's running SQL Server must have Write NTFS
permissions to the folder for the site database backup.
Network path (UNC name) for site data and database : Specifies that the task stores the
backup files for the site and site database in the specified network path. Create the share before
the backup task runs. The computer account of the site server must have Write NTFS and share
permissions to the shared network folder. If SQL Server is installed on another computer, the
computer account of the SQL Server must have the same permissions.
Local drives on site ser ver and SQL Ser ver : Specifies that the task stores the backup files for
the site in the specified path on the local drive of the site server. The task stores the backup files for
the site database in the specified path on the local drive of the site database server. Create the local
folders before the backup task runs. The computer account of the site server must have Write
NTFS permissions to the folder that you create on the site server. The computer account of the SQL
Server must have Write NTFS permissions to the folder that you create on the site database
server. This option is available only when the site database isn't installed on the site server.
NOTE
The option to browse to the backup destination is only available when you specify the network path of the backup
destination.
The folder name or share name that's used for the backup destination doesn't support the use of Unicode
characters.
6. Configure a schedule for the site backup task. Consider a backup schedule that's outside active working
hours. If you have a hierarchy, consider a schedule that runs at least two times a week. If the site fails, this
schedule ensures maximum data retention.
When you run the Configuration Manager console on the same site server that you're configuring for
backup, the backup task uses local time for the schedule. When you run the Configuration Manager
console from another computer, the backup task uses Coordinated Universal Time (UTC) for the schedule.
7. Choose whether to create an alert if the site backup task fails. When selected, Configuration Manager
creates a critical alert for the backup failure. You can review these alerts in the Aler ts node of the
Monitoring workspace.
Verify that the Backup Site Server maintenance task is running
Check the timestamp on the files in the backup destination folder that the task created. Verify that the
timestamp updates to the time when the task was last scheduled to run.
Go to the Component Status node of the Monitoring workspace. Review the status messages for
SMS_SITE_BACKUP . When site backup completes successfully, you see message ID 5035 . This message
indicates that the site backup completed without any errors.
When you configure the backup task to create an alert when it fails, look for backup failure alerts in the
Aler ts node of the Monitoring workspace.
Open Windows Explorer on the site server and browse to <ConfigMgrInstallationFolder>\Logs . Review
Smsbkup.log for warnings and errors. When site backup completes successfully, the log shows
Backup completed with message ID STATMSG: ID=5035 .
TIP
When the backup maintenance task fails, restart the backup task by stopping and restarting the
SMS_SITE_BACKUP Windows service.
TIP
To archive your site server backup files with AfterBackup.bat, you must use a copy command tool in the batch file. One
such tool is Robocopy in Windows Server. For example, create the AfterBackup.bat file with the following command:
Robocopy E:\ConfigMgr_Backup \\ServerName\ShareName\ConfigMgr_Backup /MIR
Although the intended use of the AfterBackup.bat is to archive backup snapshots, you can create an
AfterBackup.bat file to run additional tasks at the end of every backup operation.
IMPORTANT
When Configuration Manager updates to a newer version, the predefined reports might be overwritten by new reports. If
you modify a predefined report, make sure to back up the report and then restore it in Reporting Services.
For more information about backing up your custom reports in Reporting Services, see Backup and Restore
Operations for Reporting Services.
Back up content files
The content library in Configuration Manager is the location where all content files are stored for all software
deployments. The content library is located on the site server and on each distribution point. The Backup Site
Server maintenance task doesn't back up the content library or package source files. When a site server fails, the
information about the content library is restored to the site database, but you must restore the content library
and package source files.
The content library must be restored before you can redistribute content to distribution points. When you
start content redistribution, Configuration Manager copies the files from the site server's content library
to the distribution points. For more information, see The content library.
The package source files must be restored before you can update content on distribution points. When
you start a content update, Configuration Manager copies new or modified files from the package source
to the content library. It then copies the files to associated distribution points. Run the following SQL
query against the site database to find the package source location for all packages and applications:
SELECT * FROM v_Package . You can identify the package source site by looking at the first three characters
of the package ID. For example, if the package ID is CEN00001, the site code for the source site is CEN.
When you restore the package source files, they must be restored to the same location where they were
before the failure.
Verify that you include both the content library and package source files in your file system backup for the site
server.
Back up custom software updates
System Center Updates Publisher is a stand-alone tool that lets you manage custom software updates. Updates
Publisher uses a local database for its software update repository. When you use Updates Publisher to manage
custom software updates, determine whether you should include the Updates Publisher database in your
backup plan. For more information, see System Center Updates Publisher.
Use the following procedure to back up the Updates Publisher database.
Back up the Updates Publisher database
1. On the computer that runs Updates Publisher, browse to the Updates Publisher database file Scupdb.sdf
in %USERPROFILE%\AppData\Local\Microsoft\System Center Updates Publisher 2011\5.00.1727.0000\ . There's a
different database file for each user that runs Updates Publisher.
2. Copy the database file to your backup destination. For example, if your backup destination is
E:\ConfigMgr_Backup , you could copy the Updates Publisher database file to E:\ConfigMgr_Backup\SCUP .
TIP
When there's more than one database file on a computer, consider storing the file in a subfolder that indicates the
user profile associated with the database file. For example, you could have one database file in
E:\ConfigMgr_Backup\SCUP\User1 and another database file in E:\ConfigMgr_Backup\SCUP\User2 .
4. The SMS Writer builds metadata, which consists of various components including specific data from the
SMS registry key and subkeys.
a. It sends the metadata to VSS when it's requested.
b. VSS then sends the metadata to the requesting application, the Configuration Manager Backup
Manager.
5. Backup Manager selects the data to back up, and sends this data to the SMS Writer via VSS.
6. The SMS Writer takes the appropriate steps to prepare for the backup.
7. Later, when VSS is ready to take the snapshot:
a. It sends an event
b. The SMS Writer stops all Configuration Manager services
c. It ensures that the Configuration Manager activities are frozen while the snapshot is created.
8. After the snapshot is complete, the SMS Writer restarts services and activities.
The SMS Writer service is installed automatically. It must be running when the VSS application requests a
backup or restore.
Writer ID
The writer ID for the SMS Writer is 03ba67dd-dc6d-4729-a038-251f7018463b .
Permissions
The SMS Writer service must run under the Local System account.
Volume Shadow Copy service
The VSS is a set of COM APIs that implements a framework to allow volume backups to be performed while
applications on a system continue to write to the volumes. The VSS provides a consistent interface that allows
coordination between user applications that update data on disk (the SMS Writer service) and those that back
up applications (the Backup Manager service). For more information, see the Volume Shadow Copy Service.
Next steps
After you create a backup, practice site recovery with that backup. This practice can help you become familiar
with the recovery process before you need to rely on it. It can also help confirm the backup was successful for its
intended purpose.
Recover a Configuration Manager site
2/16/2022 • 20 minutes to read • Edit Online
NOTE
If you select to restore the site database by using a backup set, but the site database already exists, the recovery fails.
NOTE
When you use DPM to back up your site database, use the DPM procedures to restore the site database
to a specified location before you continue the restore process in Configuration Manager. For more
information about DPM, see the Data Protection Manager documentation library.
In a hierarchy, when you recover a primary site database, the recovery process retrieves from the CAS
any changes made to the site database after the last backup. When restoring the CAS, the recovery
process retrieves these changes from a reference primary site. When you recover the site database for a
standalone primary site, you lose site changes after the last backup.
Skip database recovery
Use this option when no data loss has occurred on the Configuration Manager site database server. This option
is only valid when the site database is on a different computer than the site server that you're recovering.
SQL Server change tracking retention period
Configuration Manager enables change tracking for the site database in SQL Server. Change tracking lets
Configuration Manager query for information about the changes made to database tables after a previous point
in time. The retention period specifies how long change tracking information is kept. By default, the site
database is configured to have a retention period of five days. When you recover a site database, the recovery
process proceeds differently if your backup is inside or outside the retention period. For example, if your SQL
Server fails, and your last backup is seven days old, it's outside the retention period.
For more information about SQL Server change tracking internals, see the following blog posts from the SQL
Server team: Change Tracking Cleanup - part 1 and Change Tracking Cleanup - part 2.
Reinitialization of site or global data
The process to reinitialize site or global data replaces existing data in the site database with data from another
site database. For example, when site ABC reinitializes data from site XYZ, the following steps occur:
The data is copied from site XYZ to site ABC.
The existing data for site XYZ is removed from the site database on site ABC.
The copied data from site XYZ is inserted into the site database for site ABC.
Example scenario 1: The primary site reinitializes the global data from the CAS
The recovery process removes the existing global data for the primary site in the primary site database and
replaces the data with the global data copied from the CAS.
Example scenario 2: The CAS reinitializes the site data from a primary site
The recovery process removes the existing site data for that primary site in the CAS database. It replaces the
data with the site data copied from the primary site. The site data for other primary sites isn't affected.
Site database recovery scenarios
After a site database is restored from a backup, Configuration Manager tries to restore the changes in site and
global data after the last database backup. Configuration Manager starts the following actions after a site
database is restored from backup:
Recovered site is a CAS
Database backup within change tracking retention period
Global data : The changes in global data after the backup are replicated from all primary sites.
Site data : The changes in site data after the backup are replicated from all primary sites.
Database backup older than change tracking retention period
Global data : The CAS reinitializes the global data from the reference primary site if you specify it.
Then all other primary sites reinitialize the global data from the CAS. If you don't specify a
reference site, all primary sites reinitialize the global data from the CAS. This data is what you
restored from backup.
Site data : The CAS reinitializes the site data from each primary site.
Recovered site is a primary site
Database backup within change tracking retention period
Global data : The changes in global data after the backup are replicated from the CAS.
Site data : The CAS reinitializes the site data from the primary site. Changes after the backup are
lost. Clients regenerate most data when they send information to the primary site.
Database backup older than change tracking retention period
Global data : The primary site reinitializes the global data from the CAS.
Site data : The CAS reinitializes the site data from the primary site. Changes after the backup are
lost. Clients regenerate most data when they send information to the primary site.
NOTE
After you recover a CAS, replication of some site data from child sites can fail to be established. This data can include
hardware inventory, software inventory, and status messages.
If this issue occurs, reinitialize the ConfigMgrDRSSiteQueue for database replication. Use SQL Ser ver Manager to
run the following query against the site database for the CAS:
Post-recovery tasks
After you recover your site, there are several post-recovery tasks to consider before your site recovery is
complete. Use the following sections to help you complete your site recovery process.
Reenter user account passwords
After a site server recovery, reenter the passwords for any user accounts in the site. These passwords are reset
during the site recovery. The accounts are listed on the Finished page of the setup wizard after site recovery is
completed. The list is also saved to C:\ConfigMgrPostRecoveryActions.html on the recovered site server.
Reenter user account passwords after site recovery
1. Open the Configuration Manager console and connect to the recovered site.
2. Go to the Administration workspace, expand Security , and then select Accounts .
3. For each account, do the following steps to reenter the password:
a. Select the account from the list identified after site recovery.
b. Select Proper ties in the ribbon.
c. On the General tab, select Set , and then reenter the password for the account.
d. Select Verify , choose the appropriate data source for the selected user account, and then select
Test connection . This step tests that the user account can connect to the data source, and verifies
the credentials.
e. Select OK to save the password changes, and then select OK to close the account properties page.
Reenter PXE passwords
1. In the Configuration Manager console, go to the Administration workspace, and select the
Distribution Points node. Any on-premises distribution point with Yes in the PXE column is enabled for
PXE and may have a password to reenter.
2. Select a PXE-enabled distribution point, and select Proper ties in the ribbon.
3. Switch to the PXE tab.
4. If the option to Require a password when computers use PXE is enabled, enter and confirm the
password.
5. Select OK to save and close the properties.
Repeat this process for any other PXE-enabled on-premises distribution point.
Reenter task sequence passwords
1. In the Configuration Manager console, go to the Software Librar y workspace, expand Operating
Systems , and select the Task Sequences node.
2. Select a task sequence, and then in the ribbon, select Edit .
3. Review the following steps for passwords to reenter:
Apply Windows Settings : If you enable and specify the local administrator password, reenter
and confirm the password.
Apply Network Settings : For the account that has permission to join the domain, select Set .
Enter and confirm the password, and then select Verify .
Capture Operating System Image : For the account used to access the destination, select Set .
Enter and confirm the password, and then select Verify .
Connect to Network Folder : For the account used to connect a network folder, select Set . Enter
and confirm the password, and then select Verify .
Enable BitLocker : If you use the key management option TPM and PIN , reenter the PIN.
Join Domain or Workgroup : For the account that has permission to join the domain, select Set .
Enter and confirm the password, and then select Verify .
Run Command Line : If you use the option to Run this step as the following account , select
Set . Enter and confirm the password, and then select Verify .
Run PowerShell Script : If you use the option to Run this step as the following account ,
select Set . Enter and confirm the password, and then select Verify .
Repeat this process for all task sequences.
Recreate bootable media and prestaged media in non-PKI environments
In non-PKI environments, self-signed certs in bootable media and prestaged media are based on the machine
keys of the server where the media was created. For this reason, if the hardware changes or the OS is reinstalled
as part of a recovery, any bootable media and prestaged media created on that server need to be recreated. For
more information on how to create bootable media and prestaged media, see Create bootable media and Create
prestaged media.
Reenter sideloading keys
After a site server recovery, reenter Windows sideloading keys specified for the site. These keys are reset during
site recovery. After you reenter the sideloading keys, the site resets the count in the Activations used column
for Windows sideloading keys.
For example, before the site failure the Total activations count shows as 100 . The number of keys that devices
have used, or Activations used , is 90 . After the site recovery, the Total activations value still displays 100 ,
but the Activations used column incorrectly displays 0 . After 10 new devices use a sideloading key, there are
no more sideloading keys, and the 11th device fails to apply a sideloading key.
Recreate Azure services
After site recovery, you may see the following error in the cloudmgr.log:
Index (zero-based) must be greater than or equal to zero
To resolve this issue, Renew the secret key for each Azure tenant connection.
Delete and recreate subscriptions for external notifications on the CAS
After you recover the CAS, you need to delete and recreate any subscriptions for external notifications. For more
information, see External notifications.
Configure HTTPS for site system roles that use IIS
When you recover site systems that run IIS and you configured for HTTPS, reconfigure IIS to use the web server
certificate.
Reinstall hotfixes
After a site recovery, you must reinstall any out-of-band hotfixes that were applied to the site server. After site
recovery, view the list of the previously installed hotfixes on the Finished page of the setup wizard. This list is
also saved to C:\ConfigMgrPostRecoveryActions.html on the recovered site server.
Recover custom reports
Some customers create custom reports in SQL Server Reporting Services. When this component fails, recover
the reports from a backup of the report server. For more information about restoring your custom reports in
Reporting Services, see Backup and Restore Operations for Reporting Services.
Recover content files
The site database tracks where the site server stores the content files. The content files themselves aren't backed
up or restored as part of the backup and recovery process. To fully recover content files, restore the content
library and package source files to the original location. There are several methods for recovering your content
files. The easiest method is to restore the files from a file system backup of the site server.
If you don't have a file system backup for the package source files, manually copy or download them. This
process is similar to when you originally created the package. Run the following query in SQL Server to find the
package source location for all packages and applications: SELECT * FROM v_Package . Identify the package source
site by looking at the first three characters of the package ID. For example, if the package ID is CEN00001, the
site code for the source site is CEN. When you restore the package source files, they must be restored to the
same location in which they were before the failure.
If you don't have a file system backup that includes the content library, you have the following restore options:
Impor t a prestaged content file : In a Configuration Manager hierarchy, you can create a prestaged
content file with all packages and applications from another location. Then import the prestaged content
file to recover the content library on the site server.
Update content : Configuration Manager copies the content from the package source to the content
library. For this action to finish successfully, the package source files must be available in the original
location. Do this action on each package and application.
Recover custom software updates
When you've included System Center Updates Publisher database files in your backup plan, you can recover the
databases if the Updates Publisher computer fails. For more information about Updates Publisher, see System
Center Updates Publisher.
Restore the Updates Publisher database
1. Reinstall Updates Publisher on the recovered computer.
2. Copy the database file Scupdb.sdf from your backup destination to
%USERPROFILE%\AppData\Local\Microsoft\System Center Updates Publisher 2011\5.00.1727.0000\ on the
computer that runs Updates Publisher.
3. When more than one user runs Updates Publisher on the computer, copy each database file to the
appropriate user profile location.
User State Migration data
As part of the state migration point properties, you specify the folders that store user state data. After you
recover a state migration point, manually restore the user state data on the server. Restore it to the same folders
that stored the data before the failure.
Regenerate the certificates for distribution points
After you restore a site, the distmgr.log might list the following entry for one or more distribution points:
Failed to decrypt cert PFX data . This entry indicates that the distribution point certificate data can't be
decrypted by the site. To resolve this issue, regenerate or reimport the certificate for affected distribution points.
Use the Set-CMDistributionPoint PowerShell cmdlet.
Restore database encryption certificates
If you use SQL Server encryption for the entire database or for specific tables, you may need to restore the
certificates after you restore the site database. For example, if you encrypt recovery data for BitLocker
management. For more information, see Restore certificate for BitLocker management.
IMPORTANT
You need Administrator rights to run Configuration Manager setup. When you run setup with the unattended script,
open the command prompt with the option to Run as administrator .
The script contains section names, key names, and values. Required section key names vary depending on the
recovery type that you need. The order of the keys within sections and the order of sections within the file aren't
important. The keys aren't case-sensitive. When you provide values for keys, the name of the key is followed by
an equal sign ( = ) and the value for the key. For example, Action=RecoverCCAR .
For more information, see the following articles:
Command-line options for setup
Unattended setup script file keys
Site failure impacts in Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
The exception to this location is when migrating sites. Monitored this process in the Migration node of the
Administration workspace. For more information, see Operations for migrating to Configuration Manager current
branch.
Along with using the Configuration Manager console for monitoring, use the following features:
Introduction to reporting
Log files.
When you monitor sites, look for signs that indicate problems that require you to take action. For example:
A backlog of files on site servers and site systems.
Status messages that indicate an error or a problem.
Failing intrasite communication.
Error and warning messages in the system event log on servers.
Error and warning messages in the Microsoft SQL Server error log.
Sites or clients that haven't reported status in a long time.
Sluggish response from the SQL Server database.
Signs of hardware failure.
If monitoring tasks reveal any signs of problems, investigate the source of the problem. Then quickly repair it to
minimize the risk of a site failure.
IMPORTANT
Starting in August 2020, this feature is deprecated. Use the Hierarchy Diagram option.
The geographical view displays the location of each site on a geographical map. It only displays sites that you
configure with a location. When you select a site in this view, it shows replication links to parent or child sites.
Unlike the hierarchy diagram view, you can't display site status message or replication link details in this view.
NOTE
To use the geographical view, the computer to which your Configuration Manager console connects must have Internet
Explorer installed and be able to access Bing Maps by using the HTTP protocol.
Next steps
Monitor database replication
Use the status system in Configuration Manager
2/16/2022 • 10 minutes to read • Edit Online
NOTE
Status filter rules don't support environment variables to run external commands.
Status repor ting : Configure both server and client component reporting, and specify where they're
sent.
WARNING
Because the default reporting settings are appropriate for most environments, change them with caution. When
you increase the level of status reporting by choosing to report all status details, you can increase the amount of
status messages for the site to process. This change increases the processing load on the Configuration Manager
site. If you decrease the level of status reporting, you might limit the usefulness of the status summarizers.
Because the status system maintains separate configurations for each site, edit each site individually.
Warning 10 50
Error 1 5
For example, if a component generates 2000 informational status messages in the threshold period (by default,
since midnight), the site sets that component's state to warning.
Site system status summarizer
1. On the General tab of the summarizer properties page, configure the replication and schedule values:
Enable status summarization
Replicate to parent site and select the Replication priority (by default, Medium )
Status summarization schedule (by default, every hour on the hour)
2. On the Thresholds tab, specify values for the Default thresholds for free space on any site system. The
following values are the defaults:
Warning (KB) : 10485760 (10 GB)
Critical (KB) : 5242880 (5 GB)
For example, if a site system reports less than 10 GB of free space on a drive, that site system's status
changes to warning.
3. The site can also monitor specific thresholds for specific Storage objects . By default, it includes
thresholds for the SQL Server database and transaction log for the site database. The default values for
these default objects are the same as the default thresholds.
To modify these thresholds, select the object in the list, and then select the properties icon. (You can also
double-click the object, or right-click to access these actions.)
4. To create a new storage object to monitor, select the gold asterisk "new" icon. Select a storage object from
the list, and specify the free space thresholds.
5. To delete a storage object, select the object, and then select the delete icon.
TIP
Starting in version 2107, you can enable the site to send notifications to an external system or application. This capability
simplifies the process by using a web service-based method. You configure subscriptions to send these notifications.
These notifications are in response to specific, defined events as they occur. For example, status message filter rules. For
more information, see External notifications.
NOTE
Configuration Manager only requires that a new status filter rule has a name. If you create a rule, but you don't specify
any criteria to process status messages, the status filter rule has no effect. This behavior allows you to create and organize
rules before you configure the criteria for each rule.
4. The Status Message Viewer has many controls to customize the view. For example, to filter the results
based on the status messages details, go to the View menu, and select Filter .
Starting in version 2010, there's an easier way to view status messages for the following objects:
Devices
Users
Content
Deployments
Monitoring workspace
Phased deployments (select Show Deployments from the Phased Deployments node)
Deployments tab in the details pane for:
Packages
Task sequences
Select one of these objects in the Configuration Manager console, and then select Show Status Messages
from the ribbon.
Next steps
Configure alerts
Configuration Manager Service Manager
Configure alerts in Configuration Manager
2/16/2022 • 5 minutes to read • Edit Online
NOTE
You can't configure alerts for user collections.
4. Choose the alerts that you want the site to generate when client status thresholds fall below a specific
value:
Client check pass or no results for active clients falls below threshold (%)
Client remediation success falls below the threshold (%)
Client activity falls below threshold (%)
5. In the Conditions list of the Aler ts tab, select each client status alert, and then specify the following
information:
Aler t Name : Accept the default name or enter a new name for the alert.
Aler t Severity : Choose the alert level that displays in the Configuration Manager console:
Information, Warning, or Critical.
Raise aler t if...: Specify the threshold percentage for the alert.
6. Select OK to save the alerts and close the collection properties.
Email alerts
You can create an email subscription for alerts. When the site triggers an alert, it can then send you email
notification.
Configure email notification for alerts
Before you can subscribe to email alerts, you need to configure the site to send email notifications. You'll need
information about an SMTP email server.
TIP
If you use Microsoft 365, use the following information:
SMTP ser ver : smtp.office365.com
Por t : 587
This ser ver requires an encr ypted connection (SSL)
1. In the Configuration Manager console, go to the Monitoring workspace, expand Aler ts , and select the
Subscriptions node.
2. On the Home tab of the ribbon, in the Create group, select Configure Email Notification .
3. Specify the following information:
Enable email notification for aler ts : Allow Configuration Manager to use an SMTP server to
send email alerts.
FQDN or IP Address of the SMTP ser ver to send email aler ts : Enter the fully qualified
domain name (FQDN) or IP address for the email server to use for these alerts.
Por t : Specify the SMTP port for the email server to use for these alerts. For example, 587 .
This ser ver requires an encr ypted connection (SSL) : Require that the site creates an
encrypted connection with the SMTP server.
SMTP Ser ver Connection Account : Specify the authentication method for Configuration
Manager to use to connect the email server.
IMPORTANT
Specify an account that has the least possible permissions to send emails.
Sender address for email aler ts : Specify the email address from which alert emails are sent.
Test SMTP Ser ver : Sends a test email to the email address specified in Sender address for
email aler ts .
4. Select OK to save the settings and to close the window.
Subscribe to email alerts
1. In the Configuration Manager console, go to the Monitoring workspace, expand Aler ts , and select
either Active Aler ts or All Aler ts .
2. Select an alert. On the Home tab of the ribbon, in the Subscription group, select Create subscription .
3. In the New Subscription window, specify the following information:
Subscription name : Enter a name to identify the email subscription. You can use up to 255
characters.
Email address : Enter the recipient email addresses to get this alert. Separate multiple email
addresses with a semicolon ( ; ).
Email language : Select the language for the email.
4. Select OK to close the New Subscription window and to create the email subscription.
To edit or delete a subscription, select the Subscriptions node under Aler ts .
Monitor alerts
You can view alerts in one of the Aler ts node of the Monitoring workspace. Alerts have one of the following
alert states:
Never triggered : The component hasn't met the condition of the alert.
Active : The site triggered the alert when the component met the condition.
Canceled : The condition that caused the alert is now resolved.
Postponed : An administrator suspended monitoring of the alert. Configuration Manager will evaluate
the state of the alert at a later time.
Disabled : An administrator disabled the alert. Configuration Manager doesn't update the alert even if
the state of the alert changes.
When Configuration Manager generates an alert, you can take one of the following actions:
Resolve the condition that caused the alert. For example, you resolve a network issue. After Configuration
Manager detects that the issue no longer exists, the alert state changes to Cancel .
If the alert is a known issue, postpone the alert until a specific time. At that later time, Configuration
Manager updates the alert to its current state.
You can only postpone an alert when it's active.
Edit the Comment of an alert. This action informs other administrators that you're aware of the alert. For
example, in the comment you can identify how to resolve the condition, provide information about the
current status of the condition, or explain why you postponed the alert.
External notifications
Starting in version 2107, you can enable the site to send notifications to an external system or application. This
capability simplifies the process by using a web service-based method. You configure subscriptions to send
these notifications. These notifications are in response to specific, defined events as they occur. For example,
status message filter rules. For more information, see External notifications.
Next steps
Configure endpoint protection alerts for a collection
Configure client status alerts for a collection
External notifications
2/16/2022 • 11 minutes to read • Edit Online
NOTE
The external system or application defines and provides the methods that this feature calls.
When you set up this feature, the site opens a communication channel with the external system. That system can
then start a complex workflow or action that doesn't exist in Configuration Manager.
Starting in version 2111, use the Configuration Manager console to create or edit subscriptions for external
notifications. This article now focuses on that experience. If you're using version 2107, see Configuration
Manager version 2107.
Prerequisites
Create the subscription on the top-level site of the hierarchy. This site is either a standalone primary site,
or a central administration site (CAS). You can view and modify an existing subscription on any site in a
hierarchy.
The site's service connection point needs to be in online mode. For more information, see About the
service connection point.
Currently, this feature only supports Azure Logic Apps as the external system. An active Azure
subscription with rights to create a logic app is required.
The service connection point needs to communicate with the notification service, for example Azure Logic
Apps. For more information, see Internet access requirements.
To create an event type for an application approval request, the site needs an app that requires approval
and is deployed to a user collection. For more information, see Deploy applications and Approve
applications.
Permissions
You can configure the following permissions to the NotificationSubscription object: Read, Delete, Modify,
Create.
The Full administrator default security role has these permissions.
The Read only analyst default security role has the Read permission.
In version 2107, users also need the All security scope. In version 2111 and later, you can't scope the
subscription objects. If needed, you can use scopes on the Site object, to which users need at least read
permission.
Other permissions may be required for custom roles. Use the following table to understand what's needed:
SIT E:
A L ERT S: SIT E: N OT IF Y : N OT IF Y : N OT IF Y : N OT IF Y : M A N A GE
A C T IO N REA D REA D REA D M O DIF Y C REAT E DEL ET E SF R
View X X
subscriptio
n
Modify X X X X
subscriptio
n
Create X X X X
subscriptio
n No te 1
Delete X X X
subscriptio
n
Create new X X X No te 2 No te 2 X
SFR
Add X X X No te 2 No te 2
existing SFR
Add app X X X No te 2 No te 2
approval
{
"EventID":0,
"EventName":"",
"SiteCode":"",
"ServerName":"",
"MessageID":0,
"Source":"",
"EventPayload":""
}
Create an event
There are two types of events that are currently supported:
The site raises a status message that matches conditions specified in a status filter rule for external
notification. You can create a new rule or use an existing one.
A user requests approval for an application in Software Center.
NOTE
In a hierarchy, the scope of events depends upon the event type:
Application approval events only happen at primary sites.
Status filter rules apply to the site where you create the rule using the Create external ser vice notification event
wizard .
If you run the wizard to create the event while connected to the CAS, it only triggers on matching events from
the CAS.
To subscribe to events raised by a child primary site, connect to the primary site. Modify the notification
subscription to create a new status filter rule for the child primary site.
IMPORTANT
Be cautious with the type of status filter rule that you create. For external notifications, the site can
process 300 status messages every five minutes. If your rule allows more messages than this limit,
it will cause a backlog on the site. Create rules with narrow filters for specific scenarios. Avoid
generic rules that allow a lot of messages.
Existing status filter rule : Reuse a status filter rule for external notification that already
exists. It doesn't display all status filter rules, only the rules that you created using this
wizard.
User submits application request : Send an external notification for application approval
requests.
Manage events
After you create a subscription, use the External ser vice notifications node to do the following actions:
Proper ties : Edit the name, description, or events for a subscription. You can't edit the external service
URL.
Delete : Remove a subscription.
NOTE
You can view and modify an existing subscription on any site in a hierarchy.
When you select a subscription, the details pane shows information about the events that have happened.
Trigger an event
The process to trigger an event depends upon the type of subscription:
For a status filter rule, trigger an event for the site component. For example, use the Configuration
Manager Service Manager to restart the component.
For an app approval request, use Software Center to request an app that requires approval. For more
information, see Software Center user guide.
Known issues
If you create a status filter rule, you'll see it in the site's list of Status filter rules in the Configuration Manager
console. If you make a change on the Actions tab of the rule properties, the external notification won't work.
After you recover a central administration site (CAS), delete and recreate the subscription.
TIP
Before you remove a CAS, recreate the subscriptions at the child primary site.
$FileName = ".\SetupExternalServiceNotifications.ps1"
Invoke-WebRequest https://aka.ms/cmextnotificationscript -OutFile $FileName
(Get-Content $FileName -Raw).Replace("`n","`r`n") | Set-Content $FileName -Force
(Get-Content $FileName -Raw).TrimEnd("`r`n") | Set-Content $FileName -Force
NOTE
SetupExternalSer viceNotifications.ps1 is digitally signed by Microsoft. This script sample downloads the file and fixes
the line breaks to preserve the digital signature.
IMPORTANT
Be cautious with the type of status filter rule that you create. For external notifications, the site can process 300
status messages every five minutes. If your rule allows more messages than this limit, it will cause a backlog on
the site. Create rules with narrow filters for specific scenarios. Avoid generic rules that allow a lot of messages.
NOTE
This event type requires an application that requires approval and is deployed to a user collection. For more information,
see Deploy applications and Approve applications.
1. On the site server, run SetupExternalSer viceNotifications.ps1 . Since you're running it on the site
server, enter y to continue.
2. Select option 3 to create a new subscription.
3. Specify a name and description for the subscription. Then specify the logic app URL that you previously
copied from the Azure portal.
4. Select the appropriate event for an application request.
5. Select 0 to exit the script.
Remove a subscription in version 2107
If you need to delete a subscription, use the following process:
1. Run the SetupExternalSer viceNotifications.ps1 script with option 1 to list the available
subscriptions. Note the subscription ID, which is an integer value.
2. Use the NotificationSubscription API of the administration service. Make a DELETE call to the URI
https://<SMSProviderFQDN>/AdminService/v1.0/NotificationSubscription/<Subscription_ID> .
For more information, see How to use the administration service in Configuration Manager.
After you remove the subscription, the site doesn't send notifications to the external system.
Script usage in version 2107
When you run SetupExternalSer viceNotifications.ps1 , it detects whether it's running on a site server:
Y : Continue on the current server
N : Specify the FQDN of a site server to use
NOTE
This script is only supported for sites running version 2107 or later.
Next steps
Use the status system
Configure alerts
Monitor scenario health in Configuration Manager
2/16/2022 • 4 minutes to read • Edit Online
NOTE
If you use a high availability option, scenario health only monitors the active node. For the SQL Server Service Broker
scenario, it only applies to the primary replica of the SQL Server Always On availability group. The client action health
scenario only applies to the site server in active mode.
Prerequisites
Full administrator role in Configuration Manager, with scope to the top-level site
Scenario Settings : Configure the settings for this scenario: such as whether it's enabled, and the time
interval in minutes.
Enable activity simulation and measurement : Enable the scenario health checks.
Run time inter val (minute) : How frequently the site runs the scenario health checks. By default,
Configuration Manager tests scenarios every 30 minutes.
Job timeout (minute) : How long the site waits for a specific test to complete. By default, the timeout
is one hour (60 minutes).
Histor y : Display the previous instances of the synthetic transaction. Use this history to track the
scenario's health over time. From the history node, you can also Show Status of a specific instance.
Run Now : Trigger the site to check the scenario health. If a previous check isn't successful, you might use
this action after you make changes to a site component. This action creates audit status message ID
54099.
NOTE
Not all sites run all tests.
With this health information, you can see how long it takes for SQL Server to exchange messages via the service
broker. A longer delay or timeout shows a backlog in the processing queue. A failure indicates a larger problem
with the service broker, such as the queue is disabled. Since SQL Server service broker is a core component,
issues with it can impact many other scenarios. For example, client notifications, client status, and some tenant
attach features.
NOTE
Not all sites run all tests.
Next steps
Log file reference
Monitor database replication
Health attestation for Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
TIP
Although a Database Replication node also appears under the Hierarchy Configuration node in the
Administration workspace, you can't view the replication status for database replication links from that location.
NOTE
The direction of the replication failure doesn't matter.
IMPORTANT
Starting in version 1910, this path changed to use the Microsoft Endpoint Manager folder. Make sure you don't
use an older version of the file that might exist in another folder.
When you run RLA, it detects problems by using a series of diagnostic rules and checks. You view the problems
that the tool identifies. When it has instructions to resolve an issue, it displays them. If RLA can automatically
remediate a problem, it presents you with that option.
When RLA finishes, it saves the results in the following XML-based report and a log file on the desktop of the
user who runs the tool:
ReplicationAnalysis.xml
ReplicationLinkAnalysis.log
RLA stops the following services while it remediates some problems. It restarts these services when
remediation is complete:
SMS_SITE_COMPONENT_MANAGER
SMS_EXECUTIVE
If RLA fails to complete remediation, restart these services on the site server if necessary.
RLA logs all investigation and remediation actions to provide additional details that it doesn't display in the
wizard.
RLA prerequisites
The account that you use to run RLA must have the following permissions:
Local administrator rights on each computer that's involved in the replication link.
Sysadmin rights on each SQL Server database that's involved in the replication link.
NOTE
The account doesn't require a specific Configuration Manager role-based administration security role. An administrative
user with access to the Database Replication node can run the tool in the Configuration Manager console. A system
administrator with sufficient rights to each computer can run the tool at a command prompt.
In a multi-site hierarchy, Configuration Manager uses SQL Server replication to transfer data between sites. For
more information, see Database replication.
To better understand and help troubleshoot issues with SQL Server replication, use these diagrams.
SQL Server replication
SQL Server configuration
SQL Server performance
SQL Server replication reinitialization (reinit)
Global data reinit
Site data reinit
Reinit missing message
These troubleshooting diagrams are interconnected. Use the following diagram to understand their
relationships:
For more information, see the following series of blogs from Microsoft Support:
ConfigMgr DRS Synchronization Internals
ConfigMgr 2012 Data Replication Service (DRS) Unleashed
ConfigMgr 2012 DRS – Troubleshooting FAQs
ConfigMgr 2012 DRS Initialization Internals
ConfigMgr 2012: DRS and SQL Server service broker certificate issues
SQL Server replication
2/16/2022 • 2 minutes to read • Edit Online
In a multi-site hierarchy, Configuration Manager uses SQL Server replication to transfer data between sites. For
more information, see Database replication.
Use the following diagram to start troubleshooting SQL Server replication when a link fails:
No
Result
Has
Result
DECLARE @cutoffTime DATETIME
SELECT @cutoffTime =
DATEADD(minute, -30, Check if replication group
GETUTCDATE())
SELECT * FROM link is recently calculated
RCM_ReplicationLinkStatus
WHERE UpdateTime >@cutoffTime
Has
Result
Has No
Result Result
Queries
This diagram uses the following queries:
Check if the replication group link is in degraded or failed state
Next steps
SQL Server replication reinitialization (reinit)
SQL Server performance
SQL Server configuration
SQL Server configuration
2/16/2022 • 2 minutes to read • Edit Online
In a multi-site hierarchy, Configuration Manager uses SQL Server replication to transfer data between sites. For
more information, see Database replication.
Use the following diagram to start troubleshooting SQL Server configuration related to SQL Server Service
Broker:
SELECT
tran smissio n _statu s, *
FRO M CAS / Check if SQL can deliver SSB messages
sys.tran smissio n _qu eu e Primary
O RDER B Y en qu eu e_time
DESC
No End
Result
Has
Result
Check transmission_status
Yo u may n eed to refresh th e
p revio u s qu ery as it co u ld b e b lan k
Has Transmission_status
Result is empty
Queries
This diagram has the following queries and actions:
Check if SQL Server can deliver SSB messages
SELECT transmission_status, *
FROM sys.transmission_queue
ORDER BY enqueue_time DESC
Remediation actions
Remediate the issues reported from transmission_status
Common issues:
Firewall configuration
Network configuration
SSB certificate misconfigured
Run SQL Server profiler to trace SSB events
Run SQL Server profiler on the CAS and primary site database to trace events related to the SQL Server Service
Broker:
Audit Broker Login
Audit Broker Conversation
Events in Broker category
SQL Server performance
2/16/2022 • 2 minutes to read • Edit Online
In a multi-site hierarchy, Configuration Manager uses SQL Server replication to transfer data between sites. For
more information, see Database replication.
Use the following diagram to start troubleshooting SQL Server performance that can impact replication status:
Queries
This diagram uses the following queries:
Make sure SQL Server change tracking table is cleaned up
SELECT @RetentionPeriod=retention_period,
@RetentionUnit=retention_period_units
FROM sys.change_tracking_databases
WHERE database_id = DB_ID();
IF @RetentionUnit = 1
SET @CTCutOffTime = DATEADD(MINUTE,-@RetentionPeriod,GETUTCDATE())
ELSE IF @RetentionUnit = 2
SET @CTCutOffTime = DATEADD(HOUR,-@RetentionPeriod,GETUTCDATE())
ELSE IF @RetentionUnit = 3
SET @CTCutOffTime = DATEADD(DAY,-@RetentionPeriod,GETUTCDATE())
Change current sessions that handle SQL Server service broker messages are blocked
select
req.session_id
,req.blocking_session_id
,req.last_wait_type
,req.wait_type
,req.wait_resource
,t.text
from sys.dm_exec_sessions s
inner join sys.dm_exec_requests req on s.Session_id=req.session_id
cross apply sys.dm_exec_sql_text(sql_handle) t
where program_name='SMS_data_replication_service'
See also
SQL Server configuration
SQL Server replication reinit
2/16/2022 • 2 minutes to read • Edit Online
In a multi-site hierarchy, Configuration Manager uses SQL Server replication to transfer data between sites. For
more information, see Database replication.
Use the following diagram to start troubleshooting SQL Server replication reinitialization (reinit):
No End
Result
Has
Result
SELECT * FROM
RCM_DrsInitializationTracking Check which replication group
WHERE InitializationStatus NOT IN hasn't completed reinit
(6,7)
No
Result
Has
Result
SELECT * FROM
RCM_DrsInitializationTracking dt
INNER JOIN ReplicationData rg
ON dt.ReplicationGroup =
rg.ReplicationGroup Check global data
WHERE dt.InitializationStatus NOT IN
(6,7)
AND rg.ReplicationPattern=N'GLOBAL'
Has No
Result Result
SELECT * FROM
RCM_DrsInitializationTracking dt
INNER JOIN ReplicationData rg
ON dt.ReplicationGroup = Check site data
rg.ReplicationGroup
WHERE dt.InitializationStatus NOT IN
(6,7)
AND rg.ReplicationPattern=N'Site'
Queries
This diagram uses the following queries:
Check if site is in maintenance mode
SELECT * FROM ServerData
WHERE Status = 120
Next steps
Global data reinit
Site data reinit
SQL Server configuration
Troubleshoot global data reinit
2/16/2022 • 2 minutes to read • Edit Online
In a multi-site hierarchy, Configuration Manager uses SQL Server replication to transfer data between sites. For
more information, see Database replication.
Use the following diagram to start troubleshooting SQL Server replication reinitialization (reinit) for global data
in a Configuration Manager hierarchy:
Troubleshoot global data reinit
Start Troubleshoot SQL replication
reinit for global data
No End
Result
Has
Result
SELECT RequestTrackingGUID,
InitializationStatus
FROM RCM_DrsInitializationTracking dt
INNER JOIN ReplicationData rg Get the TrackingGuid &
ON dt.ReplicationGroup =
rg.ReplicationGroup Status from the primary site
WHERE dt.InitializationStatus NOT IN
(6,7)
AND rg.ReplicationPattern=N'Global'
SELECT RequestTrackingGUID,
InitializationStatus Get the TrackingGuid &
FROM RCM_DrsInitializationTracking dt
WHERE Status from the CAS
RequestTrackingGUID=@trackingGuid
No Continue to
Result Reinit missing message
Has
Result
Check InitializationStatus
== 3 or == 99 Continue to
== 4 Reinit failed
== 5
SELECT Status FROM Check request status for
RCM_InitPackageRequest WHERE
RequestTrackingGUID=@trackGuid the tracking ID
Rcmctrl.log (primary site)
RCM on primary site is BCP in the data BcpIn for group <group name>
…
Failed to BCP in for table <table name>
Rcmctrl.log (CAS)
== 1 RCM is preparing the data, check Creating init package for replication
rcmctrl.log on CAS for BCP progress group <replication group> for site
<CAS>
Rcmctrl.log (CAS)
== 2 RCM has finished BCP the data, Created minijob to send compressed
create/compress the package copy of DRS INIT BCP Package to site
<CAS>. Transfer root = <CAB file to
transfer>
Queries
This diagram uses the following queries:
Check if site replication hasn't finished reinit
Next steps
Reinit missing message
Troubleshoot site data reinit
2/16/2022 • 2 minutes to read • Edit Online
In a multi-site hierarchy, Configuration Manager uses SQL Server replication to transfer data between sites. For
more information, see Database replication.
Use the following diagram to start troubleshooting SQL Server replication reinitialization (reinit) for site data in
a Configuration Manager hierarchy:
No End
Result
Has
Result
SELECT RequestTrackingGUID,
InitializationStatus
FROM RCM_DrsInitializationTracking dt
INNER JOIN ReplicationData rg Get the TrackingGuid &
ON dt.ReplicationGroup =
rg.ReplicationGroup Status from CAS
WHERE dt.InitializationStatus NOT IN
(6,7)
AND rg.ReplicationPattern=N'Site'
SELECT RequestTrackingGUID,
InitializationStatus Get the TrackingGuid &
FROM RCM_DrsInitializationTracking dt
WHERE Status from the primary site
RequestTrackingGUID=@trackingGuid
No Continue to
Result Reinit missing message
Has
Result
Check InitializationStatus
== 5 == 99 Continue to
== 4 Reinit failed
== 3
No Continue to
Result Global data reinit
Has
Result
Has
Result
== 3
== 2
== 1
Rcmctrl.log (primary site)
RCM is preparing the data, check
rcmctrl.log on primary for BCP progress Creating init package for replication
group <replication group> for site <CAS>
Despoolr.log (CAS)
Verified Package signature
…
File replication job done, check Executing instruction of type
despoolr.log on CAS for progress MICROSOFT|SMS|MINIJOBINSTRUCTION|
DRSINIT
...
Decompressing snapshot package
<compressed file> to [rcm inbox]
Rcmctrl.log (CAS)
RCM on CAS is BCP in the data BcpIn for group <group name>
…
Failed to BCP in for table <table name>
Queries
This diagram uses the following queries:
Check if site replication hasn't finished reinit
Next steps
Reinit missing message
Global data reinit
Reinit missing message
2/16/2022 • 2 minutes to read • Edit Online
In a multi-site hierarchy, Configuration Manager uses SQL Server replication to transfer data between sites. For
more information, see Database replication.
Use the following diagram to start troubleshooting a missing message with SQL Server replication
reinitialization (reinit):
No
Result
Has
Result End
SELECT RequestTrackingGUID,
InitializationStatus
FROM RCM_DrsInitializationTracking dt
INNER JOIN ReplicationData rg Get the TrackingGuid &
ON dt.ReplicationGroup = Status from subscriber site
rg.ReplicationGroup
WHERE dt.InitializationStatus NOT IN
(6,7)
SELECT RequestTrackingGUID,
InitializationStatus Get the TrackingGuid & Status
FROM RCM_DrsInitializationTracking dt
WHERE from the publishing site
RequestTrackingGUID=@trackingGuid
Has No
Result Result
Queries
This diagram uses the following queries:
Check if site replication hasn't finished reinit
Remediation actions
Version 1902 and later
To detect the issue and reinit, run the Replication Link Analyzer.
Version 1810 and earlier
Run the following SQL query to get the ReplicationGroupID :
Then use the InitializeData method on the SMS_ReplicationGroup WMI class with the following values:
ReplicationGroupID: from the SQL query above
SiteCode1: parent site
SiteCode2: child site
For more information, see InitializeData method in class SMS_ReplicationGroup.
Example
Next steps
SQL Server replication reinitialization (reinit)
Introduction to queries in Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
Next steps
How to create queries
How to manage queries in Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
Manage queries
In the Monitoring workspace, select Queries , select the query to manage, and then select a management task.
The following table provides information about the management tasks.
M A N A GEM EN T TA SK DETA IL S
Run Runs the selected query and displays the results in the
Configuration Manager console.
Install Client Opens the Install Client Wizard , which lets you install the
Configuration Manager client on computers returned by the
selected query.
Expor t Opens the Expor t Objects Wizard . This wizard lets you
export the query to a Managed Object Format (MOF) file
that you can then import at another site.
Move Opens the Move Selected Items dialog box. This dialog
box lets you move the selected query to a folder that you
previously created under the Queries node.
Next steps
Create queries
Create queries in Configuration Manager
2/16/2022 • 6 minutes to read • Edit Online
Create a query
Use this procedure to create a query in Configuration Manager.
1. In the Configuration Manager console, select Monitoring .
2. In the Monitoring workspace, select Queries . On the Home tab, in the Create group, select Create
Quer y .
3. On the General tab of the Create Quer y Wizard , specify a unique name and, optionally, a comment for
the query.
4. If you want to import an existing query to use as a basis for the new query, select Impor t Quer y
Statement . In the Browse Quer y dialog box, select a query that you want to import, and then select
OK .
5. In the Object Type list, select the type of object that you want the query to return. This table describes
some examples of the types of objects you can search for:
System Resource Use to search for typical system attributes, like the
NetBIOS name of a device, the client version, the client IP
address, and Active Directory Domain Services
information.
User Resource Use to search for typical user information, like user
names, user group names, and security group names.
6. Select Edit Quer y Statement to open the <Query Name> Statement Proper ties dialog box.
7. On the General tab of the <Query Name> Statement Proper ties dialog box, specify the attributes that
the query returns and how they should be displayed. Select the New icon to add a new attribute. You can
also select Show Quer y Language to enter or edit the query directly in WMI Query Language (WQL).
For examples of WMI queries, see the Example WQL queries section in this article.
You can use the following reference documentation to help you construct your own WQL queries:
WQL (SQL for WMI)
WHERE Clause
WQL Operators
Starting in Configuration Manager 2010, you can preview the results when you're creating or editing a
query for collection membership. In the Quer y Statement Proper ties , select the green triangle to
show the Quer y Results Preview window. Select Stop if you want to stop a long running query.
8. On the Criteria tab of the <Query Name> Statement Proper ties dialog box, specify criteria that are
used to refine the results of the query. For example, you could return only resources that have a site code
of XYZ . You can configure multiple criteria for a query.
IMPORTANT
If you create a query that contains no criteria, the query will return all devices in the All Systems collection.
9. On the Joins tab of the <Query Name> Statement Proper ties dialog box, you can combine data from
two different attributes into your query results. Although Configuration Manager automatically creates
query joins when you choose different attributes for your query result, the Joins tab provides more
advanced options. Configuration Manager supports these attribute classes:
JO IN T Y P E DESC RIP T IO N
Left Displays all results for the base attribute and only the
matching results for the join attribute.
Right Displays all results for the join attribute and only the
matching results for the base attribute.
Full Displays all results for both the base attribute and the
join attribute.
For more information about how to use join operations, see the SQL Server documentation.
10. Select OK to close the <Query Name> Statement Proper ties dialog box.
11. On the General tab of the Create Quer y Wizard , specify that the results of the query aren't limited to
the members of a collection, that they are limited to the members of a specified collection, or that a
prompt for a collection appears each time the query is run.
12. Complete the wizard to create the query. The new query appears in the Queries node in the Monitoring
workspace.
Import a query
Use this procedure to import a query into Configuration Manager. For information about how to export queries,
see How to manage queries.
1. In the Configuration Manager console, select Monitoring .
2. In the Monitoring workspace, select Queries . On the Home tab, in the Create group, select Impor t
Objects .
3. On the MOF File Name page of the Impor t Objects Wizard , select Browse to select the Managed
Object Format (MOF) file that contains the query that you want to import.
4. Review the information about the query to be imported and then complete the wizard. The new query
appears on the Queries node in the Monitoring workspace.
TIP
Use the wildcard character % to signify any string of characters. For example, %Visio% returns Microsoft Office Visio
2010.
select SMS_R_System.NetbiosName,
SMS_R_System.OperatingSystemNameandVersion from
SMS_R_System where
SMS_R_System.OperatingSystemNameandVersion like "%Workstation 10%"
TIP
This query searches for the software package by using the names that are displayed in the programs list in Windows
Control Panel.
select SMS_R_System.NetbiosName,
SMS_G_System_ADD_REMOVE_PROGRAMS.DisplayName from
SMS_R_System inner join SMS_G_System_ADD_REMOVE_PROGRAMS on
SMS_G_System_ADD_REMOVE_PROGRAMS.ResourceId =
SMS_R_System.ResourceId where
SMS_G_System_ADD_REMOVE_PROGRAMS.DisplayName like "Microsoft%Visio%"
select SMS_R_System.NetbiosName,
SMS_R_System.SystemOUName from
SMS_R_System where
SMS_R_System.SystemOUName = "OU Name"
Nokia Symbian 3
Windows Phone 4
Mac computer 5
Windows Embedded 7
NOTE
Values that aren't listed in this table are associated with devices that are no longer supported.
For example, if you want to return only Mac computers, use this query:
Next steps
How to manage queries
Security and privacy for queries in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
When you export or import a query that's saved to a Restrict who can access the network folder.
network location, secure the location and the network
channel. Use Server Message Block (SMB) signing or Internet
Protocol security (IPsec) between the network location and
the site server to prevent an attacker from tampering with
the query data before it's imported.
Next steps
Security and privacy for Configuration Manager
Introduction to reporting in Configuration Manager
2/16/2022 • 8 minutes to read • Edit Online
WARNING
If you move a destination report to a different report folder, the location for the destination report changes.
Configuration Manager doesn't automatically update the report link in the source report with the new location, and the
link won't work in the source report.
Report folders
Report folders provide a method to sort and filter reports that Configuration Manager stores in Reporting
Services. Report folders are useful when you have many reports to manage. When you install a reporting
services point, it copies reports to Reporting Services and organizes them into more than 50 report folders. The
report folders are read-only. You can't modify them in the Configuration Manager console.
Report subscriptions
A report subscription in Reporting Services is a recurring request to deliver a report at a specific time or in
response to an event. You specify in the subscription an application file format. Subscriptions provide an
alternative to running a report on demand. On-demand reporting requires that you actively select the report
each time you want to view the report. In contrast, subscriptions can be used to schedule and then automate the
delivery of a report.
You can manage report subscriptions in the Configuration Manager console. The report server processes the
subscriptions. It distributes them by using delivery extensions that are deployed on the server. By default, you
can create subscriptions that send reports to a shared folder or to an email address.
For more information, see Manage report subscriptions.
Report Builder
For Reporting Services-based reports, Configuration Manager uses Microsoft SQL Server Report Builder as the
exclusive authoring and editing tool for both model-based and SQL-based reports. If you create or edit a report
in the Configuration Manager console, Report Builder opens. When you create or modify a report for the first
time, Report Builder installs automatically. The version of Report Builder associated with the installed version of
SQL Server opens when you run or edit reports.
The Report Builder installation adds support for over 20 languages. When you run Report Builder, it displays
data in the language of the local computer's OS. If Report Builder doesn't support the language, it displays the
data in English. Report Builder supports the full capabilities of SQL Server Reporting Services, which includes
the following capabilities:
Delivers an intuitive report authoring environment with an appearance similar to Microsoft 365 Apps.
Offers the flexible report layout of SQL Server report definition language (RDL).
Provides various forms of data visualization including charts and gauges.
Provides richly formatted text boxes.
Exports to Microsoft Word format.
You can also open Report Builder directly from SQL Server Reporting Services.
Next steps
Plan for reporting
Integrate with Power BI Report Server
2/16/2022 • 7 minutes to read • Edit Online
Prerequisites
Power BI Report Server license. For more information, see Licensing Power BI Report Server.
Download Microsoft Power BI Report Server-September 2019, or later.
Don't install Power BI Report Server right away. For the proper process based on your environment,
see Configure the reporting services point.
Download Microsoft Power BI Desktop (Optimized for Power BI Report Server). Use a version released
between September 2019 and January 2021. For versioning information, see the Change log for Power BI
Report Server.
IMPORTANT
Use versions of Power BI Desktop:
That are from the Microsoft Download Center. Don't use a version from the Microsoft Store
That states they're Optimized for Power BI Repor t Ser ver . Don't use versions that aren't Optimized for
Power BI Repor t Ser ver .
That were released no earlier than September 2019 and no later than January 2021. Microsoft Power BI
Desktop (Optimized for Power BI Report Server - January 2021) is recommended.
TIP
Reports and report folders with Power BI reports must be located in the ConfigMgr_<SiteCode> folder on the
report server or they won't appear in the Configuration Manager console.
5. Select Yes and Power BI Desktop (Optimized for Power BI Report Server) will load the .pbit file.
6. Specify your Configuration Manager database name and database server name when prompted, then
select Load .
NOTE
When loading or applying the data model, ignore any errors if you come across one. For example, if you see the
following error: "Connecting to tables from more than one database isn't supported in DirectQuery mode", select
Close . Then refresh the data source settings:
1. In Power BI Desktop, in the ribbon, select Edit Queries , and then select Data source settings .
2. Select Change Source , confirm your server and database names, and select OK .
3. Close the data source settings window, and then select Apply changes .
7. When the report data is loaded, select File > Save As , then select Power BI Repor t Ser ver .
8. Save the report to a folder on the root Configuration Manager reporting folder on the reporting point.
You may want to create a Downloaded Reports folder for these items.
9. Repeat the steps for any other report templates that were downloaded. When you're done, close
Microsoft Power BI Desktop (Optimized for Power BI Report Server).
Known issues
There's a known issue with Power BI Report Server and email subscriptions. After you configure the email
settings in the Reporting Services Configuration Manager, when you try to create a new subscription, the option
to deliver a report by Email isn't available. To work around this issue, restart the Power BI Report Server service.
Next steps
After you create a report, use the following actions in the Configuration Manager console:
Run in Browser : Opens the Power BI report in the web browser. Share this URL with others, for example:
https://rsp.contoso.com/Reports/POWERBI/ConfigMgr_ABC/Windows%2010/Windows10%20Dashboard?rs:embed=true
TIP
You can only view these reports in the web browser.
Edit : Make changes to the report in Power BI Desktop. For an existing report, use the Save option to save
changes back to the report server.
Add to Favorites : Starting in version 2103, you can make a report a favorite. This action allows you to
quickly access it from the Favorites node. For more information, see Operations and maintenance for
reporting.
For more information on log files to use for reporting, see Log file reference - Reporting.
Install Power BI sample reports
2/16/2022 • 2 minutes to read • Edit Online
Prerequisites
Configuration Manager reporting services point with Power BI Report Server integrated
Microsoft Power BI Desktop (Optimized for Power BI Report Server). Use a version released between
September 2019 and January 2021. For versioning information, see the Change log for Power BI Report
Server.
IMPORTANT
Use versions of Power BI Desktop:
That are from the Microsoft Download Center. Don't use a version from the Microsoft Store
That states they're Optimized for Power BI Repor t Ser ver . Don't use versions that aren't Optimized for
Power BI Repor t Ser ver .
That were released no earlier than September 2019 and no later than January 2021. Microsoft Power BI
Desktop (Optimized for Power BI Report Server - January 2021) is recommended.
NOTE
Some of the sample reports are also available for download in Community hub.
Community hub direct link to the Software Update Compliance Status sample report
Community hub direct link to the Software Update Deployment Status sample report
NOTE
When loading or applying the data model, ignore any errors if you come across one. For example, if you see the
following error: "Connecting to tables from more than one database isn't supported in DirectQuery mode", select
Close . Then refresh the data source settings:
1. In Power BI Desktop, in the ribbon, select Edit Queries , and then select Data source settings .
2. Select Change Source , confirm your server and database names, and select OK .
3. Close the data source settings window, and then select Apply changes .
6. When the report data is loaded, select File > Save As , then select Power BI Repor t Ser ver .
7. Save the report to the Sample Reports folder you created on the reporting point.
8. Repeat the steps for any other sample reports. When you're done, close Microsoft Power BI Desktop
(Optimized for Power BI Report Server).
9. In the Configuration Manager console, go to Monitoring > Power BI Repor ts > Sample Repor ts .
10. Right-click on one of the reports and select Run in Browser to launch the report.
Sample reports
The following sample Power BI reports are included in the download:
Software Update Compliance Status
Software Update Deployment Status
Client Status
Content Status
Microsoft Edge Management
Plan for reporting in Configuration Manager
2/16/2022 • 5 minutes to read • Edit Online
NOTE
For more information about planning for site systems in Configuration Manager, see Add site system roles.
IMPORTANT
For users from a different domain than that of the reporting services point account to successfully run reports, establish a
two-way trust between the two domains.
Reports are fully enabled for role-based administration. Configuration Manager filters the data for all included
reports based on the permissions of the user who runs the report. Users with specific roles can only view
information defined for their roles.
For more information about security rights for reporting, see Configure reporting.
For more information about role-based administration in Configuration Manager, see Configure role-based
administration.
Reporting recommendations
Consider the following recommendations and tips for reporting in Configuration Manager:
For best performance, install the reporting services point on a remote site system. Although you can
install it on the site server, the reporting services point performs best when you install it on a remote site
system. When this role does background processing, it can compete for system resources with other
roles. There are many variables to consider with site and role performance, but in general this
configuration improves reporting and overall site performance.
Optimize SQL Server Reporting Services queries. Typically any reporting delays are because of the time it
takes to run queries and retrieve the results. Microsoft SQL Server tools such as Query Analyzer and
Profiler can help you optimize queries.
Schedule report subscription processing to run outside standard office hours. Whenever possible,
processing subscriptions during off-hours can minimize the CPU processing on the Configuration
Manager site database server. This practice also improves availability for unpredicted report requests.
Site updates preserve built-in reports. If you modify a standard report, when the site updates, it renames
the report with an underscore prefix ( _ ). This behavior makes sure that the site update doesn't overwrite
the modified report by the standard report.
Security and privacy
Configuration Manager reports display information that it collects during standard Configuration Manager
management operations. For example, you can display a report of information that Configuration Manager
collected from discovery or inventory. Reports can also contain the current status information for client
management operations, such as deploying software, and checking for compliance.
For more information about any security recommendations and privacy information for Configuration Manager
operations that might generate data that you can view in reports, see Security and privacy for Configuration
Manager.
Next steps
Prerequisites for reporting
Prerequisites for reporting in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
Next steps
Configure reporting
List of reports in Configuration Manager
2/16/2022 • 59 minutes to read • Edit Online
Administrative security
The following six reports are listed under the Administrative Security category.
Administrative users security assignments Displays administrative users, their associated security roles,
and the security scopes associated with each security role for
each user.
Objects secured by a single security scope Displays objects that an administrator assigned to only the
specified security scope. This report doesn't display objects
that an administrator associates with more than one security
scope.
Security for a specific or multiple Configuration Displays securable objects, the security scopes associated
Manager objects with the objects, and which administrative users have rights
to the objects.
Security roles summar y Displays security roles and the Configuration Manager
administrators associated with each role.
Security scopes summar y Displays security scopes and the Configuration Manager
administrative users and security groups associated with
each scope.
Alerts
The following two reports are listed under the Aler ts category.
Aler ts Generated Most Often Displays a summary of the alerts that were generated most
often from today back to the specified date for the specified
feature area.
Asset Intelligence
The following 67 reports are listed under the Asset Intelligence category.
Hardware 01A - Summar y of computers in a specific Displays an Asset Intelligence summary view of computers in
collection a collection you specify.
Hardware 03A - Primar y computer users Displays users and the count of computers on which they're
the primary user.
Hardware 03B - Computers for a specific primar y Displays all computers for which a specified user is the
console user primary console user.
Hardware 04A - Computers with multiple users Displays computers that don't have a primary user because
(shared) no one user has a signed-in time greater than 66%.
Hardware 05A - Console users on a specific Displays all of the console users on a specified computer.
computer
Hardware 06A - Computers for which console users Helps administrative users identify computers that need to
could not be determined have security logging turned on.
Hardware 07A - USB devices by manufacturer Displays USB devices, grouped by manufacturer.
Hardware 07B - USB devices by manufacturer and Displays USB devices, grouped by manufacturer and
description description.
Hardware 07C - Computers with a specific USB Displays all the computers with a specified USB device.
device
Hardware 07D - USB devices on a specific computer Displays all USB devices on a specified computer.
Hardware 08A - Hardware that is not ready for a Displays hardware that doesn't meet the minimum hardware
software upgrade requirements.
Hardware 09A - Search for computers Displays a summary of computers matching keyword filters.
These filters are computer name, Configuration Manager
site, domain, top console user, operating system,
manufacturer, or model.
Hardware 10A - Computers in a specified collection Displays a list of computers in a specified collection where a
that have changed during a specified timeframe hardware class has changed during a specified time period.
Hardware 10B - Changes on a specified computer Displays the classes that have changed on a specified
within a specified timeframe computer within a specified time period.
License 01A - Microsoft Volume License ledger for Displays an inventory of all Microsoft software titles that are
Microsoft license statements available from the Microsoft Volume Licensing program.
License 01B - Microsoft Volume License ledger item Identifies and displays sales channel for inventoried
by sales channel Microsoft Volume License software.
License 01C - Computers with a specific Microsoft Identifies and displays computers that have a specified item
Volume License ledger item and sales channel from the Microsoft Volume license ledger.
REP O RT N A M E DESC RIP T IO N
License 01D - Microsoft Volume License ledger Identifies and displays all Microsoft Volume license ledger
products on a specific computer items on a specified computer.
License 02A - Count of licenses nearing expiration Displays a count of licenses nearing expiration by a specified
by time ranges time range. The displayed products have their licenses
managed by the Software Licensing Service.
License 02B - Computers with licenses nearing Displays the specified computers with licenses that are
expiration nearing expiration.
License 02C - License information on a specific Displays products on a specified computer that have their
computer licenses managed by the Software Licensing Service.
License 03A - Count of licenses by license status Displays products, by license status, which have their licenses
managed by the Software Licensing Service.
License 03B - Computers with a specific license Displays products, with a specified license status, whose
status licenses are managed by the Software Licensing Service.
License 04A - Count of products managed by Displays a count of products that have their licenses
software licensing managed by the Software Licensing Service.
License 04B - Computers with a specific product Displays computers, managed by the Software Licensing
managed by Software Licensing Ser vice Service, that include a specified product.
License 05A - Computers providing Key Displays computers that act as Key Management Servers.
Management Ser vice
License 06A - Processor counts for per-processor Displays the number of processors on computers using
licensed products Microsoft products that support per-processor licensing.
License 06B - Computers with a specific product Displays a list of computers where a specified Microsoft
that suppor ts per-processor licensing product that supports per-processor licensing is installed.
License 14A - Microsoft Volume Licensing Displays reconciliation on software licenses acquired through
reconciliation repor t Microsoft Volume License Agreement and the actual
inventory count.
License 14B - List of Microsoft software inventor y This report displays Microsoft software titles in use that
not found in MVLS aren't found in the Microsoft Volume License Agreement.
License 15A - General license reconciliation repor t Displays reconciliation on general software licenses acquired
and the actual inventory count.
License 15B - General license reconciliation repor t Displays computers that installed the licensed product with a
by computer specified version.
Software 01A - Summar y of installed software in a Displays a summary of installed software ordered by the
specific collection number of instances found from inventory.
Software 02A - Product families for a specific Displays the product families and the count of software in
collection the family for a specified collection.
REP O RT N A M E DESC RIP T IO N
Software 02B - Product categories for a specific Displays the product categories in a specified product family
product family and the count of software within the category.
Software 02C - Software in a specific product family Displays all software that is in the specified product family
and categor y and category.
Software 02D - Computers with specific software Displays all computers with specified software installed.
installed
Software 02E - Installed software on a specific Displays all software installed on a specified computer.
computer
Software 03A - Uncategorized software Displays the software that is either categorized as unknown
or has no categorization.
Software 04A - Software configured to automatically Displays a list of software configured to automatically run on
run on computers computers.
Software 04B - Computers with specific software Displays all computers with specified software configured to
configured to automatically run automatically run.
Software 04C - Software configured to automatically Displays installed software configured to automatically run
run on a specific computer on a specified computer.
Software 05A - Browser Helper Objects Displays the browser helper objects installed on computers
in a specified collection.
Software 05B - Computers with a specific Browser Displays all of the computers with a specified browser helper
Helper Object object.
Software 05C - Browser Helper Objects on a specific Displays all browser helper objects on the specified
computer computer.
Software 06A - Search for installed software This report provides a summary of installed software. It
searches based on the following criteria: product name,
publisher, or version.
Software 06B - Software by product name Displays a summary of installed software based on a
specified product name.
Software 07A - Recently used executable programs Displays executable programs that users recently used. It
by the count of computers also includes the count of computers on which users used
the program. Software metering must be enabled for this
site to view this report.
Software 07B - Computers that recently used a Displays the computers on which users recently used a
specified executable program specified executable program. This report requires that you
enable the software metering client setting.
Software 07C - Recently used executable programs Displays executable files that users recently used on a
on a specified computer specified computer. This report requires that you enable the
software metering client setting.
REP O RT N A M E DESC RIP T IO N
Software 08A - Recently used executable programs Displays executable programs that users recently used. It
by the count of users also includes a count of users that most recently used the
program. This report requires that you enable the software
metering client setting.
Software 08B - Users that recently used a specified Displays the users that most recently used a specified
executable program executable program. This report requires that you enable the
software metering client setting.
Software 08C - Recently used executable programs Displays executable programs that the specified user used
by a specified user recently. This report requires that you enable the software
metering client setting.
Software 09A - Infrequently used software Displays software titles that users haven't used during a
specified period of time.
Software 09B - Computers with infrequently used Displays computers with installed software that users haven't
software installed used for a specified period of time. The specified period of
time is based on the value specified in the 'Software 09A -
Infrequently used software' report.
Software 10A - Software titles with specific multiple Displays software titles based on matching of all specified
custom labels defined custom label criteria. Up to three custom labels can be
selected to refine a software title search.
Software 10B - Computers with a specific custom- Displays all computers in this collection that have the
labeled software title installed specified custom-labeled software title installed.
Software 11A - Software titles with a specific custom Displays software titles based on matching of at least one of
label defined the specified custom label criteria.
Software 12A - Software titles without a custom Displays all software titles that don't have a custom label
label defined.
Software 14A - Search for software identification tag Displays a count of installed software with a software
enabled software identification tag enabled.
Software 14B - Computers with specific software Displays all computers that have installed software with a
identification tag enabled software installed specified software identification tag enabled.
Software 14C - Installed software identification tag Displays all installed software with a specified software
enabled software on a specific computer identification tag enabled on a specified computer.
Lifecycle 01A - Computers with a specific software View a list of computers on which a specified product is
product detected.
Lifecycle 02A - List of machines with expired View computers that have expired products on them. You
products in the organization can filter this report by product name.
Lifecycle 03A - List of expired products found in the View details for products in your environment that have
organization expired lifecycle dates.
Lifecycle 04A - General Product Lifecycle over view View a list of product lifecycles. Filter the list by product
name and days to expiration.
REP O RT N A M E DESC RIP T IO N
Lifecycle 05A - Product lifecycle dashboard Starting in version 1810, this report includes similar
information as the in-console dashboard.
Client push
The following four reports are listed under the Client Push category.
Client push installation status details Displays information about the client push installation
process for all sites.
Client push installation status details for a specified Displays information about the client push installation
site process for a specified site.
Client push installation status summar y Displays a summary view of the client push installation
status for all sites.
Client push installation status summar y for a Displays a summary view of the client push installation
specified site status for a specified site.
Client status
The following seven reports are listed under the Client Status category.
Client remediation details Displays details of client remediation actions for a collection
you specify.
Client status histor y Displays a historical view of overall client status in the site.
Client status summar y Displays the client check results of active clients for a given
collection.
Client time to request policy Displays the percentage of clients that requested policy at
least once in the last 30 days. Each day represents a
percentage of total clients that requested policy since the
first day in the cycle.
Clients with failed client check details Displays details about clients that client check failed for a
specified collection.
Inactive clients details Displays a detailed list of inactive clients for a given
collection.
Cer tificate issuance histor y Displays the history of certificates issued by the certificate
registration point to users and devices for the specified date
range.
List of assets by cer tificate issuance status Displays the devices or users in a specified certificate
issuance state following the evaluation of a specified
certificate profile.
List of assets with cer tificates nearing expir y Displays the devices or users with certificates that expire on
or before the specified date.
Compliance histor y of a configuration baseline Displays the history of the changes in compliance of a
configuration baseline for the specified date range.
Compliance histor y of a configuration item Displays the history of the changes in compliance of a
configuration item for the specified date range.
Details of compliant rules of configuration items in a Displays information about the rules evaluated as compliant
configuration baseline for an asset for a specified configuration item for a specified device or
user.
Details of conflicting rules of configuration items in Displays information about rules in a deployed configuration
a configuration baseline for an asset item that conflict with other rules. Include the other rules in
the same or another deployed configuration item.
Details of errors of configuration items in a Displays information about errors generated by a specified
configuration baseline for an asset configuration item for a specified device or user.
Details of non-compliant rules of configuration Displays information about rules that were evaluated as
items in a configuration baseline for an asset noncompliant for a specified configuration item, for a
specified device or user.
Details of remediated rules of configuration items in Displays information about rules that were remediated by a
a configuration baseline for an asset specified configuration item for a specified device or user.
List of assets by compliance state for a Displays the devices or users in a specified compliance state
configuration baseline following the evaluation of a specified configuration baseline.
List of assets by compliance state for a Displays the devices or users in a specified compliance state
configuration item in a configuration baseline following the evaluation of a specified configuration item.
List of noncompliant Apps and Devices for a Displays information about users and devices that have apps
specified user installed that aren't compliant with a policy you specified.
List of rules conflicting with a specified rule for an Displays a list of rules that conflict with a specified rule for a
asset deployed configuration item.
REP O RT N A M E DESC RIP T IO N
List of unknown assets for a configuration baseline Displays a list of devices or users that haven't yet reported
any compliance data for a specified configuration baseline.
List of unknown assets for a configuration item Displays a list of devices or users that haven't yet reported
any compliance data for a specified configuration item.
Rules and errors summar y of configuration items in Displays a summary of the compliance state of the rules and
a configuration baseline for an asset any setting errors for a specified configuration item. The
configuration item must be deployed to a device or user.
Summar y compliance by configuration baseline Displays a summary of the overall compliance of deployed
configuration baselines in the hierarchy.
Summar y compliance by configuration items for a Displays a summary of the compliance of configuration
configuration baseline items in a specified configuration baseline.
Summar y compliance of a configuration baseline for Displays a summary of the overall compliance of a specified
a collection configuration baseline. The configuration item must be
deployed to the specified collection.
Summar y of Users who have Noncompliant Apps Displays information about users that have apps installed
that aren't compliant with a policy you specified.
Terms and Conditions acceptance Displays Terms and Conditions items and which version each
user has accepted.
Data warehouse
The following seven reports are listed under the Data warehouse category.
Endpoint Protection and Software Update Historical: View computers that are missing software
Compliance updates.
General Hardware Inventor y Historical: View all hardware inventory for a specific machine.
General Software Inventor y Historical: View all software inventory for a specific machine.
Infrastructure Health Over view Historical: Displays an overview of the health of your
Configuration Manager infrastructure.
List of Malware Detected Historical: View malware that has been detected in the
organization.
NOTE
Configuration Manager version 2006 dropped support for Windows CE 7.0 as a client. Deprecation was announced with
version 1906.
All corporate-owned mobile devices Displays all corporate owned mobile devices.
All mobile device clients Displays information about all mobile device clients. Devices
that are managed by the Exchange Server connector aren't
included.
Cer tificate issues on mobile devices that are Displays detailed information about certificate issues on
managed by the Configuration Manager client for mobile devices that are managed by the Configuration
Windows CE and that are not healthy Manager client for Windows CE.
Client deployment failure for mobile devices that are Displays detailed information about deployment failure for
managed by the Configuration Manager client for mobile devices that are managed by the Configuration
Windows CE Manager client for Windows CE.
Client deployment status details for mobile devices Displays information about the status of mobile devices that
that are managed by the Configuration Manager are managed by the Configuration Manager client for
client for Windows CE Windows CE.
Client deployment success for mobile devices that Displays detailed information about deployment success for
are managed by the Configuration Manager client mobile devices that are managed by the Configuration
for Windows CE Manager client for Windows CE.
Communication issues on mobile devices that are This report contains detailed information about
managed by the Configuration Manager client for communication issues on mobile devices that are managed
Windows CE and that are not healthy by the Configuration Manager client for Windows CE.
Compliance status of default ActiveSync mailbox Displays a summary of the compliance status with the
policy for the mobile devices that are managed by Default Exchange ActiveSync mailbox policy for the mobile
the Exchange Ser ver connector devices managed by the Exchange Server connector.
Count of mobile devices by display configurations This report displays the number of mobile devices by display
settings.
Count of mobile devices by operating system Displays the number of mobile devices by operating system.
Count of mobile devices by program memor y Displays the number of mobile devices by program memory.
Count of mobile devices by storage memor y Count of mobile devices by storage memory configurations
configurations
Health information for mobile devices that are Displays detailed health information for mobile devices that
managed by the Configuration Manager client for are managed by the Configuration Manager client for
Windows CE Windows CE.
REP O RT N A M E DESC RIP T IO N
Health summar y for mobile devices that are Displays health summary information for mobile devices that
managed by the Configuration Manager client for are managed by the Configuration Manager client for
Windows CE Windows CE.
Inactive mobile devices that are managed by the Displays the mobile devices managed by the Exchange
Exchange Ser ver connector Server connector that haven't connected to an Exchange
Server in a specified number of days.
List of devices by Health Attestation state Displays a list of devices with attributes reported by Health
Attestation Service
List of Devices enrolled per user in Microsoft Intune Displays all devices a user has enrolled with Microsoft
Intune.
List of devices in a specific device categor y Displays information for all devices within a specific device
category.
Local client issues on mobile devices that are This report contains detailed information about local client
managed by the Configuration Manager client for issues on mobile devices that are managed by the
Windows CE and that are not healthy Configuration Manager client for Windows CE.
Mobile device client information Displays information about the mobile devices that have the
Configuration Manager client installed. You can use this
report to verify which mobile devices can successfully
communicate with a management point.
Mobile device compliance details for the Exchange Displays the mobile device compliance details for a default
Ser ver connector Exchange ActiveSync mailbox policy that is configured by
using the Exchange Server connector.
Mobile devices by operating system Displays the mobile devices by operating system.
Mobile devices that are jailbroken or a rooted Displays the mobile devices that are jailbroken or a rooted
device device.
Mobile devices that are unmanaged because they Displays the mobile devices that completed enrollment with
enrolled but failed to assign to a site Configuration Manager, have a certificate, but failed to
complete site assignment.
Mobile devices with a specific amount of free Displays all mobile devices with their specified amount of
program memor y free program memory.
Mobile devices with a specific amount of free Displays all mobile devices with the specified amount of free
removable storage memor y removable memory.
Mobile devices with cer tificate renewal issues Displays the enrolled mobile devices that failed to renew
their certificate. If you don't renew the certificate before the
expiry period, the mobile devices become unmanaged.
Mobile devices with low free program memor y (less Displays the mobile devices for which the program memory
than specified KB free) is lower than a specified size in KB.
Mobile devices with low free removable storage Displays the mobile devices for which the removable storage
memor y (less than specified KB free) memory is lower than a specified size in KB.
REP O RT N A M E DESC RIP T IO N
Number of devices enrolled per user in Microsoft Displays the users enabled for the Microsoft Intune
Intune subscription. It also shows the total number of devices
enrolled for each user.
Pending retire and wipe request for mobile devices Displays the wipe requests that are pending for mobile
devices.
Recently enrolled and assigned mobile devices Displays mobile devices that recently enrolled with
Configuration Manager and successfully assigned to a site.
Recently wiped mobile devices Displays the list of mobile devices that were recently
successfully wiped.
Settings summar y for mobile devices that are Displays the number of mobile devices that apply the
managed by the Exchange Ser ver connector settings for each Default Exchange ActiveSync mailbox policy
managed by the Exchange Server connector.
Windows RT Sideloading Keys Detailed Status Displays detailed status information for a specified Windows
RT sideloading key.
Windows RT Sideloading Keys Summar y Displays the status of Windows RT sideloading keys.
Driver management
The following 13 reports are listed under the Driver Management category.
All drivers for a specific platform Displays all drivers for a specified platform.
All drivers in a specific boot image Displays all drivers in a specified boot image.
Computers that failed to install drivers for a specific Displays computers that failed to install drivers for a
collection specified collection.
Driver catalog matching repor t for a specific Displays the driver catalog matching report for a specified
collection collection.
Driver catalog matching repor t for a specific Displays the driver catalog matching report for a specified
computer computer.
Driver catalog matching repor t for a specific device Displays the driver catalog matching report for a specified
on a specific computer device on a specified computer.
REP O RT N A M E DESC RIP T IO N
Driver catalog matching repor t for computers in a Displays driver catalog matching report for computers in a
specific collection with a specific device specified collection with a specified device.
Drivers that failed to install on a specific computer Displays drivers that failed to install on a specified computer.
Suppor ted platforms for a specific Driver Displays supported platforms for a specified driver.
Endpoint Protection
The following six reports are listed under the Endpoint Protection category.
Antimalware overall status and histor y Displays the antimalware overall status and history.
Computer malware details Displays details about a specified computer and the list of
malware found on it.
Top users by threats Displays the list of users with the most number of detected
threats.
User threat list Displays the list of threats found for a specified user account.
Hardware - CD-ROM
The following four reports are listed under the Hardware - CD-ROM category.
CD-ROM information for a specific computer Displays information about the CD-ROM drives on a
specified computer.
Computers for a specific CD-ROM manufacturer Displays a list of computers that contain a CD-ROM drive
made by a manufacturer you specify.
Count CD-ROM drives per manufacturer Displays the number of CD-ROM drives inventoried per
manufacturer.
Histor y - CD-ROM histor y for a specific computer Displays the inventory history for CD-ROM drives on a
specified computer.
Hardware - Disk
The following eight reports are listed under the Hardware - Disk category.
REP O RT N A M E DESC RIP T IO N
Computers with a specific hard disk size Displays a list of computers that have hard disks of a
specified size.
Computers with low free disk space (less than Displays a list of computers in a specified collection that have
specified % free) less that the specified free disk space.
Computers with low free disk space (less that Displays a list of computers and disks where the disks are
specified MB free) low on space. The amount of free space to check for is
specified in MB.
Count physical disk configurations Displays the number of hard disks inventoried by disk
capacity.
Disk information for a specific computer - Logical Displays summary information about the logical disks on a
disks specified computer.
Disk information for a specific computer - Par titions Displays summary information about the disk partitions on
a specified computer.
Disk information for a specific computer - Physical Displays summary information about the physical disks on a
disks specified computer.
Histor y - Logical disk space histor y for a specific Displays the inventory history for logical disk drives on a
computer specified computer.
Hardware - General
The following five reports are listed under the Hardware - General category.
Computer information for a specific computer Displays summary information for a specified computer.
Inventor y classes assigned to a specific collection Displays the inventory classes that are assigned to a
specified collection.
Inventor y classes enabled on a specific computer Displays the inventory classes that are enabled on a
specified computer.
Windows AutoPilot Device Information Displays client device information that is needed for
Windows AutoPilot registration.
Hardware - Memory
The following five reports are listed under the Hardware - Memor y category.
Computers where physical memor y has changed Displays a list of computers where the amount of RAM has
changed since the last inventory cycle.
Computers with a specific amount of memor y Displays a list of computers that have a specified amount of
RAM (Total Physical Memory rounded to the nearest MB).
Computers with low memor y (less than or equal to Displays a list of computers that are low on memory. The
specified MB) amount of memory to check for is specified in MB.
Memor y information for a specific computer Displays summary information about the memory on a
specified computer.
Hardware - Modem
The following three reports are listed under the Hardware - Modem category.
Computers for a specific modem manufacturer Displays a list of computers that have a modem made by a
specified manufacturer.
Count modems by manufacturer Displays the number of modems inventoried for each
modem manufacturer.
Modem information for a specific computer Displays summary information about the modem on a
specified computer.
Computers with a specific network adapter Displays a list of computers that have a specified network
adapter.
Count network adapters by type Displays the number of inventoried network adapters cards
of each type.
Network adapter information for a specific computer Displays information about the network adapters installed
on a specified computer.
Hardware - Processor
The following five reports are listed under the Hardware - Processor category.
REP O RT N A M E DESC RIP T IO N
Computers for a specific processor speed Displays a list of computers that have a processor of a
specified speed.
Computers with fast processors (greater than or Displays a list of computers that have processors with a
equal to a specified clock speed) speed that is faster than the specified speed.
Computers with slow processors (less than or equal Displays a list of computers that have processors that run at
to a specified clock speed) or slower than a specified clock speed.
Processor information for a specific computer Displays information about the processors installed on a
specified computer.
Hardware - SCSI
The following five reports are listed under the Hardware - SCSI category.
Computers with a specific SCSI card type Displays a list of computers that have a specified SCSI card
installed.
Count SCSI card types Displays the number of inventoried SCSI cards by card type.
SCSI card information for a specific computer Displays information about the SCSI cards installed on a
specified computer.
Hardware - Security
The following one report is listed under the Hardware - Security category.
Details of firmware states on devices Displays the details of the states of UEFI, SecureBoot, and
TPM. Note : This report isn't in version 1810.
Computers with a specific sound card Displays a list of computers that have a specified sound card.
Sound card information for a specific computer Displays summary information about the sound cards on a
specified computer.
Hardware - Video card
The following three reports are listed under the Hardware - Video Card category.
Computers with a specific video card Displays a list of computers that have a specified video card.
Count video cards by type Displays a list of all of the video cards installed on
computers. It also shows the number of each type of video
card.
Video card information for a specific computer Displays summary information about the video cards
installed on a specified computer.
Migration
The following five reports are listed under the Migration category.
Clients in exclusion list Displays clients that are excluded from migration.
Dependency on a Configuration manager collection Displays the objects that depend on a collection of the
source hierarchy.
Migration job proper ties This report shows the contents of the specified migration
job.
Objects that failed to migrate Displays a list of objects that failed to migrate during the last
attempt.
Network
The following six reports are listed under the Network category.
Count IP addresses by subnet Displays the number of IP addresses inventoried for each IP
subnet.
IP - All subnets by subnet mask Displays a list of IP subnets and subnet masks.
IP - Information for a specific IP address Displays summary information about a specified IP address.
REP O RT N A M E DESC RIP T IO N
MAC - Computers for a specific MAC address Displays the computer name and IP address of computers
that have the specified MAC address.
Operating system
The following 10 reports are listed under the Operating System category.
Computer operating system version histor y Displays the inventory history for the operating system on a
specified computer.
Computers with a specific operating system Displays computers with a specified operating system.
Computers with a specific operating system and Displays computers with a specified operating system and
ser vice pack service pack.
Count operating system versions Displays the number of computers inventoried by operating
system.
Count operating systems and ser vice packs Displays the number of computers inventoried by operating
system and service pack combinations.
Ser vices - Computers running a specific ser vice Displays a list of computers running a specified service.
Ser vices - Computers running Remote Access Ser ver Displays a list of computers running Remote Access Server.
Ser vices - Ser vices information for a specific Displays summary information about the services on a
computer specified computer.
Windows Ser vicing details for a specific collection Displays general information about Windows servicing for a
specific collection.
Windows Ser ver computers Displays a list of computers that run Windows Server
operating systems.
Power management
The following 18 reports are listed under the Power Management category.
Power Management - Computer activity Displays a graph showing monitor, computer, and user
activity for a specified collection over a specified time period.
Power Management - Computer activity by Displays a graph showing monitor, computer, and user
computer activity for a specified computer on a specified date.
Power Management - Computer activity details Displays a list of the sleep and wake capabilities of
computers in the specified collection for a specified date and
time.
REP O RT N A M E DESC RIP T IO N
Power Management - Computer details Displays detailed information about the power capabilities,
power settings, and power plans applied to a specified
computer.
Power Management - Computer not repor ting Displays a list of computers not reporting any power activity
details for a specified date and time.
Power Management - Computers excluded Displays a list of computers excluded from the power plan.
Power Management - Computers with multiple Displays a list of computers that have multiple, conflicting
power plans power settings applied.
Power Management - Energy consumption Displays the total monthly energy consumption (in kWh) for
a specified collection over a specified time period.
Power Management - Energy consumption by day Displays the total energy consumption (in kWh) for a
specified collection in the last 31 days.
Power Management - Energy cost Displays the total monthly energy consumption cost for a
specified collection over a specified time period.
Power Management - Energy cost by day Displays the total energy consumption cost for a specified
collection over the past 31 days.
Power Management - Environmental impact Displays a graph showing carbon dioxide (CO2) emissions
generated by a specified collection over a specified time
period.
Power Management - Environmental impact by day Displays a graph showing CO2 emissions generated by a
specified collection over the past 31 days.
Power Management - Insomnia computer details Displays detailed information about computers that didn't
sleep or hibernate within a specified time period.
Power Management - Insomnia repor t Displays a list of common causes that prevented computers
from sleeping or hibernating. It also shows the number of
computers affected by each cause over a specified time
period.
Power Management - Power capabilities Displays the power management capabilities of computers in
the specified collection.
Power Management - Power settings Displays an aggregated list of power settings used by
computers in a specified collection.
Power Management - Power settings details Used to display further information about computers that
were specified in the Power Management - Power
settings report.
Replication traffic
The following 10 reports are listed under the Replication Traffic category.
REP O RT N A M E DESC RIP T IO N
Global Data Replication Traffic Per Link (line char t) Displays total global data replication traffic on a specified link
for a specified number of days.
Global Data Replication Traffic Per Link (pie char t) Displays total global data replication traffic on a specified link
for a specified number of days.
Hierarchy Replication Traffic By Link Displays total replication traffic for each link in the hierarchy
for a specified number of days.
Hierarchy Top Ten Replication Groups Traffic Per Link Displays the replication traffic for the top 10 replication
(pie char t) groups across the entire hierarchy identified by link.
Link Replication Traffic Displays total replication traffic for all data for a specified
number of days.
Replication group traffic per link Displays the replication group network traffic over a specified
database replication link for a specified number of days.
Site Data Replication Traffic Per Link (line char t) Displays total site data replication traffic on a specified link
for a specified number of days.
Site Data Replication Traffic Per Link (pie char t) Displays total site data replication traffic on a specified link
for a specified number of days.
Total Hierarchy Replication Traffic (line char t) Displays hierarchy aggregate global and site data replication
for each direction of every link for a specified number of
days.
Total Hierarchy Replication Traffic (pie char t) Displays hierarchy aggregate global and site data replication
for each direction of every link for a specified number of
days.
Client assignment detailed status repor t Displays detailed information about client assignment status.
Client assignment failure details Displays detailed information about client assignment
failures.
Client assignment status details Displays overview information about client assignment
status.
Client assignment success details Displays detailed information about successfully assigned
clients.
Client deployment failure repor t Displays detailed information for clients that have failed to
deploy.
REP O RT N A M E DESC RIP T IO N
Client deployment status details Displays summary information for the status of client
installations.
Client deployment success repor t Displays detailed information for clients that have
successfully deployed.
Clients incapable of HTTPS communication Displays detailed information about each client that runs the
HTTPS Communication Readiness Tool, and reports to be
incapable of communicating over HTTPS.
Computers assigned but not installed for a Displays a list of computers assigned to a specified site, but
par ticular site aren't reporting to that site.
Computers with a specific Configuration Manager Displays a list of computers running a specified version of
client version the Configuration Manager client software.
Count of clients and protocol used for Displays a summary of the communication methods used by
communication clients (HTTP or HTTPS).
Count of clients assigned and installed for each site Displays the number of computers assigned and installed for
each site. Clients with a network location associated to
multiple sites are only counted as installed if they're
reporting to that site.
Count of clients capable of HTTPS communication Displays detailed information about each client that runs the
HTTPS Communication Readiness Tool, and reports to be
either capable or incapable of communicating over HTTPS.
Count of clients for each site Displays the number of Configuration Manager clients
installed by site code.
Count of Configuration Manager clients by client Displays the number of computers discovered by
versions Configuration Manager client version.
Problem details repor ted to the fallback status point Displays detailed information for issues reported by clients in
for a specified collection a specified collection. These clients must have an assigned
fallback status point.
Problem details repor ted to the fallback status point Displays detailed information about issues reported by
for a specified site clients in a specified site. These clients must have an
assigned fallback status point.
Summar y of problems repor ted to the fallback Displays information about all the issues reported by clients.
status point These clients must have an assigned fallback status point.
Summar y of problems repor ted to the fallback Displays summary information for issues reported by clients
status point for a specific collection in a specified collection. These clients must have an assigned
fallback status point.
Clients that have not repor ted recently (in a Displays a list of clients that haven't reported discovery data,
specified number of days) hardware inventory, or software inventory in a specified
number of days.
Computers discovered by a specific site Displays a list of all computers that the specified site
discovered. It also shows the date of the most recent
discovery.
Computers discovered recently by discover y method Displays a list of computers that the site discovered within
the specified number of days. It also lists the agents that
discovered them. If multiple agents discovered a computer, it
may appear more than once in the list.
Computers not discovered recently (in a specified Displays a list of computers that the site hasn't recently
number of days) discovered. It also shows the number of days since the site
discovered the computer.
Computers not inventoried recently (in a specified Displays a list of computers that the site hasn't recently
number of days) inventoried. It also shows the last times the client
inventoried the computer.
Computers that might share the same Configuration Displays a list of computers that have changed their names.
Manager unique identifier A change in name is a possible symptom that a computer
shares a Configuration Manager Unique Identifier with
another computer.
Computers with duplicate MAC addresses Displays computers that share MAC address.
Count computers in resource domains or Displays the number of computers in each resource domain
workgroups or workgroup.
Discover y information for a specific computer Displays a list of the agents and sites that discovered a
specified computer.
Inventor y dates for a specific computer Displays the date and time inventory was last run on a
specified computer.
Site - General
The following three reports are listed under the Site - General category.
Site status for the hierarchy Displays the list of sites in the hierarchy with site version and
site status information.
Status of Configuration Manager update within Displays information about Configuration Manager site
hierarchy updates for the hierarchy.
Site system roles and site system ser vers for a Displays a list of site system server and their site system
specific site roles for a specified site.
All inventoried products for a specific software Displays a list of the inventoried software products and
company versions from a specified software company.
Computers with a specific product Displays a list of the computers that a specified product is
inventoried on, and the versions of that product.
Computers with a specific product name and version Displays a list of the computers that a specified version of a
product is inventoried on.
Computers with specific software registered in Add Displays a summary of all computers with specified software
Remove Programs registered in Add Remove Programs or Programs and
Features.
Count all inventoried products and versions Displays a list of the inventoried software products and
versions, and the number of computers each is installed on.
Count inventoried products and versions for a Displays a list of the inventoried versions of a specified
specific product product, and the number of computers each is installed on.
Count of all instances of software registered with Displays a summary of all instances of software installed and
Add or Remove Programs registered with Add or Remove Programs or Programs and
Features on computers within the specified collection.
Count of instances of specific software registered Displays a count of instances for specified software packages
with Add or Remove Programs installed and registered in Add or Remove Programs or
Programs and Features.
Default Browser counts Shows the count of clients with a specific web browser as the
Windows default.
Use the following reference for common BrowserProgIDs:
- AppXq0fevzme2pys62n3e0fbqa7peapykr8v: Microsoft
Edge
- IE.HTTP: Microsoft Internet Explorer
- ChromeHTML: Google Chrome
- OperaStable: Opera Software
- FirefoxURL-308046B0AF4A39CB: Mozilla Firefox
- Unknown: the client OS doesn't support the query, the
query hasn't run, or a user hasn't logged on
REP O RT N A M E DESC RIP T IO N
Installations of specified Windows apps This report lists all computers with a specified Windows app.
Software registered in Add Remove Programs on a Displays a summary of the software installed on a specified
specific computer computer that is registered in Add Remove Programs or
Programs and Features.
Windows apps installed to the specified user Displays all Windows apps installed to the specified user
Software - Files
The following five reports are listed under the Software - Files category.
All inventoried files for a specific product Display a summary of the files inventoried that are
associated with a specified software product.
All inventoried files on a specific computer Display a summary of all the files inventoried on a specified
computer.
Compare software inventor y on two computers Displays the differences between the software inventories
reported for two specified computers.
Computers with a specific file Displays a list of computers that have collected software
inventory for a specified file name. If a computer contains
multiple copies of the file, it might appear more than once in
the list.
Count computers with a specific file name Displays the number of computers that have collected
software inventory for a specified file.
All application deployments (advanced) Displays detailed summary information for all application
deployments.
All application deployments (basic) Displays summary information for all application
deployments.
Application deployments per asset Displays applications deployed to a specified device or user.
REP O RT N A M E DESC RIP T IO N
Application Usage Detailed Status Displays usage details for installed applications.
Application Usage Summar y Status Displays a usage summary for installed applications.
Task sequence deployments containing application Displays task sequence deployments that install a specified
application.
All resources in a specific collection Displays all the resources in a specified collection.
Maintenance windows available to a specified client Displays all maintenance windows that are applicable to the
specified client.
All active content distributions Displays all distributions points on which content is currently
being installed or removed.
All content on a specific distribution point Displays all content currently installed on a specified
distribution point.
All distribution points Displays information about the distribution points for each
site.
All status messages for a specific package on a Displays all status messages for a specified package on a
specific distribution point specified distribution point.
Application content distribution status Displays information about the distribution status for
application content.
Applications targeted to distribution point group Displays information about application content that was
deployed to a specified distribution point group.
REP O RT N A M E DESC RIP T IO N
Applications that are out of synchronization on a Displays the applications for which associated content files
specified distribution point group haven't been updated with the latest version on a specified
distribution point group.
Distribution point usage summar y Displays the distribution point usage summary for each
distribution point.
Distribution status of specified package Displays the distribution status for specified package content
on each distribution point.
Packages targeted to distribution point group Displays information about packages that target a specified
distribution point group.
Packages that are out of synchronization on a Displays packages for which associated content files haven't
specified distribution point group been updated with the latest version on a specified
distribution point group.
Peer cache source content rejection Displays the number of peer cache source rejections per
boundary group.
Peer cache source content rejection by condition Displays the peer cache sources that rejected to serve
content based on a condition.
Peer cache source content rejection details Displays the name of the content that was rejected by a peer
source.
All deployments for a specified package and Displays information about all deployments of a specified
program package and program.
All package and program deployments Displays all of the package and program deployments at this
site.
All package and program deployments to a specified Displays all of the package and program deployments to a
collection specified collection.
All package and program deployments to a specified Displays all of the package and program deployments that
computer apply to a specified computer.
All package and program deployments to a specified Displays all of the package and program deployments to a
user specified user.
All system resource package and program Displays all package and program deployments for the site
deployments with status with a summary status of each deployment.
All system resources for a specified package and Displays a list of resources that are in a specified state for a
program deployment in a specified state specified package and program deployment.
Char t - Hourly package and program deployment Displays the percentage of computers that successfully
completion status installed the package. The list organizes for every hour since
an administrator creates the package and program
deployment. It can be used to track the average time for a
package and program deployment.
Package and program deployment status for a Displays the status messages reported for a specified
specified client and deployment computer and package and program deployment.
Status of a specified package and program Displays the status summary for a specified package and
deployment program deployment.
Software metering
The following 13 reports are listed under the Software Metering category.
All software metering rules applied to this site Displays a list of all software metering rules at the site.
Computers that have a metered program installed Displays all computers with the specified metered
but haven't run the program since a specified date application, but no user has run the program since the
specified date.
Computers that have run a specific metered Displays a list of computers that have run programs
software program matching the specified software metering rule within the
specified month and year.
Concurrent usage for all metered software programs Displays the maximum number of users who concurrently
ran each metered software program during the specified
month and year.
Concurrent usage trend analysis of a specific Displays the maximum number of users who concurrently
metered software program ran the specified metered software program during each
month for the past year.
Install base for all metered software programs Displays the number of computers that have metered
software programs installed as reported by software
inventory. This report requires that the computer collects
software inventory.
Software metering summarization progress Displays the time at which the most recently summarized
metering data was processed on the site server. The software
metering reports only reflect metering data processed
before these dates.
REP O RT N A M E DESC RIP T IO N
Time of day usage summar y for a specific metered Displays the average number of usages of a particular
software program program for the past 90 days, broken down by hour and
day.
Total usage for all metered software programs Displays the number of users who ran programs within the
specified month and year, and that match each software
metering rule. These rules are for locally installed software, or
using Terminal Services.
Total usage for all metered software programs on Displays the number of users who ran programs matching
Windows Terminal Ser vers each software metering rule using Terminal Services within
the specified month and year.
Total usage trend analysis for a specific metered Displays the number of users who ran programs during each
software program month for the past year, and that match the specified
software metering rule. These rules are for locally installed
software, or using Terminal Services.
Total usage trend analysis for a specific metered Displays the number of users who ran programs during each
software program on Windows Terminal Ser vers month for the past year, and that match the specified
software metering rule. These rules are for using Terminal
Services.
Users that have run a specific metered software Displays a list of users who have run programs within the
program specified month and year, and that match the specified
software metering rule.
Compliance 1 - Overall compliance Displays the overall compliance data for a software update
group.
Compliance 2 - Specific software update Displays the compliance data for a specified software update.
Compliance 3 - Update group (per update) Displays the compliance data for software updates defined in
a software update group.
Compliance 4 - Updates by vendor month year Displays the compliance data for software updates released
by a vendor during a specified month and year.
Compliance 5 - Specific computer This report returns the software update compliance data for
a specified computer. To limit the amount of information
returned, you can specify the vendor and software update
classification.
Compliance 6 - Specific software update states Displays the count and percentage of computers in each
(secondar y) compliance state for the specified software update.
Compliance 7 - Computers in a specific compliance Displays all computers in a collection that have a specified
state for an update group (secondar y) overall compliance state against a software update group.
REP O RT N A M E DESC RIP T IO N
Compliance 8 - Computers in a specific compliance Displays all computers in a collection that have a specified
state for an update (secondar y) compliance state for a software update.
Compliance 9 - Overall health and compliance Displays the overall health and compliance data for a
software update group. (starting in version 1806)
Management 1 - Deployments of an update group Displays all deployments that include all of the software
updates defined in a specified software update group.
Management 2 - Updates required but not deployed Displays all vendor-specific software updates that clients
detect as required, but an administrator hasn't deployed to a
specified collection.
Management 3 - Updates in a deployment Displays the software updates that are contained in a
specified deployment.
Management 4 - Deployments that target a Displays all software update deployments that target a
collection specified collection.
Management 5 - Deployments that target a Displays all software update deployments that are deployed
computer to a specified computer.
Management 6 - Deployments that contain a Displays all deployments that include a specified software
specific update update and the associated target collection for the
deployment.
Management 7 - Updates in a deployment missing Displays the software updates in a specified deployment that
content don't have all of the associated content retrieved. This state
prevents clients from installing the update, which prevents
the deployment from achieving 100% compliance.
Management 8 - Computers missing content Displays all computers requiring the specified software
(secondar y) update, but the associated content isn't yet distributed to a
distribution point.
States 1 - Enforcement states for a deployment Displays the enforcement states for a specified software
update deployment, which is typically the second phase of a
deployment assessment.
REP O RT N A M E DESC RIP T IO N
States 2 - Evaluation states for a deployment Displays the evaluation state for a specified software update
deployment, which is typically the first phase of a
deployment assessment.
States 3 - States for a deployment and computer Displays the states for all software updates in the specified
deployment for a specified computer.
States 4 - Computers in a specific state for a Displays all computers in a specified state for a software
deployment (secondar y) update deployment.
States 5 - States for an update in a deployment Displays a summary of states for a specified software update
(secondar y) targeted by a specified deployment.
States 6 - Computers in a specific enforcement state Displays all computers in a specified enforcement state for a
for an update (secondar y) specified software update.
Scan 1 - Last scan states by collection Specify a collection to display the count of computers in each
compliance scan state. The clients return the state during the
last compliance scan.
Scan 2 - Last scan states by site Specify a site to display the count of computers in each
compliance scan state. The clients return the state during the
last compliance scan.
Scan 3 - Clients of a collection repor ting a specific Displays all computers for a specified collection and a
state (secondar y) specified compliance scan state during their last compliance
scan.
Scan 4 - Clients of a site repor ting a specific state Specify a site to display all computers with a specified
(secondar y) compliance scan state. The clients return the state during
their last compliance scan.
Troubleshooting 1 - Scan errors Displays scan errors at the site and a count of computers
that are experiencing each error.
Troubleshooting 2 - Deployment errors Displays the deployment errors at the site and a count of
computers that are experiencing each error.
Troubleshooting 3 - Computers failing with a Displays a list of the computers that failed a scan because of
specific scan error (secondar y) a specified error.
REP O RT N A M E DESC RIP T IO N
Troubleshooting 4 - Computers failing with a Displays a list of the computers on which the deployment of
specific deployment error (secondar y) update is failing because of a specified error.
State migration
The following three reports are listed under the State Migration category.
State migration information for a specific source Displays state migration information for a specified
computer computer.
State migration information for a specific state Displays state migration information for a specified state
migration point migration point.
State migration points for a specific site Displays the state migration points for a specified site.
Status messages
The following 12 reports are listed under the Status Messages category.
All messages for a specific message ID Displays a list of status messages that have a specified
message ID.
Clients repor ting errors in the last 12 hours for a Displays a list of computers and components reporting
specific site errors in the last 12 hours, and the number of errors
reported.
Component messages for the last 12 hours Displays a list of component messages for the last 12 hours
for a specified site code, computer, and component.
Component messages for the last hour Displays a list of the status messages created in the last hour
by a specified component on a specified computer at a
specified site.
Count component messages for the last hour for a Displays the number of status messages by component and
specific site severity reported in the last hour at a specified site.
Count errors in the last 12 hours Displays the number of server component error status
messages in the last 12 hours.
Fatal errors (by component) Displays a list of computers reporting fatal errors by
component.
Fatal errors (by computer name) Displays a list of computers reporting fatal errors by
computer name.
Last 1000 messages for a specific computer (Errors Displays a summary of the last 1000 error and warning
and Warnings) component status messages for a specified computer.
REP O RT N A M E DESC RIP T IO N
Last 1000 messages for a specific computer (Errors Displays a summary of the last 1000 error, warning, and
Warnings and Information) informational component status messages for a specified
computer.
Last 1000 messages for a specific computer (Errors) Displays a summary of the last 1000 error server
component status messages for a specified computer.
Last 1000 messages for a specific ser ver component Displays a summary of the most recent 1000 status
messages for a specified server component.
All audit messages for a specific user Displays a summary of all audit status messages for a
specified user. Audit messages describe actions taken in the
Configuration Manager console that add, modify, or delete
objects in Configuration Manager.
Remote Control - All computers remote controlled Displays a summary of status messages indicating remote
by a specific user control of client computers by a specified user.
Remote Control - All remote control information Displays a summary of status messages related to the
remote control of client computers.
All system resources for a task sequence Displays a list of the destination computers for the specified
deployment in a specific state task sequence deployment in a specified deployment state.
All system resources for a task sequence Displays a list of the destination computers for the specified
deployment that is in a specific state and that is task sequence deployment that is in the specified
available to unknown computers deployment state.
Count of system resources that have task sequence Displays the number of computers that have accepted task
deployments assigned but not yet run sequences, but haven't run the task sequence.
Histor y of a task sequence deployment on a Displays the status of each step of the specified task
computer sequence deployment on the specified destination computer.
If no record is returned, the task sequence hasn't started on
the computer.
List of computers that exceeded a specific length of Displays the list of destination computers that exceeded the
time to run a task sequence deployment specified length of time to run a task sequence.
Run time for a specific task sequence deployment on Displays the total time that it took to successfully complete a
a specific destination computer specified task sequence on a specified computer.
REP O RT N A M E DESC RIP T IO N
Run time for each step of a task sequence Displays the time that it took to complete each step of the
deployment on a specific destination computer specified task sequence deployment on the specified
destination computer.
Status of a specific task sequence deployment for a Displays the status summary of a specified task sequence
specific computer deployment on a specified computer.
Status of a task sequence deployment on an Displays the status of the specified task sequence
unknown destination computer deployment on the specified unknown destination computer.
Status summar y of a specific task sequence Displays a status summary of all resources that have been
deployment targeted by a deployment.
Status summar y of a specific task sequence Displays the status summary of all resources targeted by the
deployment available to unknown computers specified deployment that is available to a collection
containing unknown computers.
All system resources currently in a specific group or Displays a list of computers that are currently running in a
phase of a specific task sequence deployment specified group or phase of a specified task sequence
deployment.
All system resources where a task sequence Displays a list of computers that failed within a specified
deployment failed within a specific group or phase group/phase of the specified task sequence deployment.
All task sequence deployments Displays details of all task sequence deployments initiated
from the current site.
All task sequence deployments available to unknown Displays details of all the task sequence deployments
computers initiated from the site, and deployed to collections that
contain unknown computers.
Count of failures in each phase or group of a Displays the number of failures in each phase or group of
specific task sequence the specified task sequence.
Count of failures in each phase or group of a Displays the number of failures in each phase or group of
specific task sequence deployment the specified task sequence deployment.
Deployment status of all task sequence deployments Displays the overall progress of all task sequence
deployments.
Progress of a running task sequence Displays the progress of the specified task sequence.
Progress of a running task sequence deployment Displays the summary information for the specified task
sequence deployment.
Progress of all deployments for a specific task Displays the progress of all deployments for the specified
sequence task sequence.
REP O RT N A M E DESC RIP T IO N
Summar y repor t for a task sequence deployment Displays the summary information for the specified task
sequence deployment.
Char t - Weekly progress of a task sequence Displays the weekly progress of a task sequence, starting
from the deployment date.
Progress of a task sequence Displays the progress of the specified task sequence.
Progress of all task sequences Displays a summary of the progress of all task sequences.
Progress of task sequences for operating system Displays the progress of all task sequences that deploy
deployments operating systems.
Status of all unknown computers Displays a list of computers that were unknown at the time
they ran a task sequence deployment, and whether they're
now known computers.
Content referenced by a specific task sequence Displays content that is referenced by a specified task
sequence.
Pending user device affinity associations by This report shows all pending user device affinity
collection assignments based on usage data, for members of a
collection.
User device affinity associations per collection Displays all user device associations for the specified
collection, and groups the results by collection type (for
example, user or device).
Folder Redirection Health Repor t - Details Displays the health state details of folder redirection for each
of the redirected folders for a given user.
Roaming User Profiles Health Repor t - Details Displays the health state details of the roaming user profile
for a specified user.
User Data and Profiles Health Repor t - Details Displays the error or warning details of folder redirection or
roaming user profiles. This report is the details target from
the summary report.
User Data and Profiles Health Repor t - Summar y Displays the summary of health states for folder redirection
and roaming user profiles.
Users
The following three reports are listed under the Users category.
Computers for a specific user name Displays a list of the computers that were used by a specified
user.
Users in a specific domain Displays a list of users and their computers in a specified
domain.
Virtual applications
The following seven reports are listed under the Vir tual Applications category.
App-V Vir tual Environment Results Displays information about a specified virtual environment
that is in a specified state for a specified collection.
App-V Vir tual Environment Results For Asset Displays information about a specified virtual environment
for a specified asset. It also shows any deployment types for
the specified virtual environment.
App-V Vir tual Environment Status Displays compliance information for a specified virtual
environment for a specified collection.
Computers with a specific vir tual application Displays a summary of computers that have the specified
App-V application shortcut as created using the Application
Virtualization Management Sequencer.
Computers with a specific vir tual application Displays a summary of computers that have the specified
package App-V application package.
Count of all instances of vir tual application Display a count of detected App-V application packages.
packages
REP O RT N A M E DESC RIP T IO N
Count of all instances of vir tual applications Display a count of detected App-V applications.
Vulnerability assessment
The following one report is listed under the Vulnerability Assessment category.
Wake On LAN
The following seven reports are listed under the Wake On L AN category.
All computers targeted for Wake On L AN activity Specify the type of deployment to display a list of computers
targeted for Wake on LAN activity.
All objects pending wake-up activity Displays objects that are scheduled for wakeup.
All sites that are enabled for Wake On L AN Displays a list of all sites in the hierarchy that are enabled for
Wake On LAN.
Errors received while sending wake-up packets for a Displays errors received while sending wake-up packets to
defined period computers for a defined period.
Histor y of Wake On L AN activity Displays a history of the wakeup activity that has occurred
since a certain period.
Wake-Up Proxy Deployment State Details Displays information about the deployment status of Wake-
Up Proxy for each device in a specified collection.
Wake-Up Proxy Deployment State Summar y Displays a summary of the deployment status of wake-up
proxy for a specified collection.
Configure reporting in Configuration Manager
2/16/2022 • 14 minutes to read • Edit Online
NOTE
Reporting in Configuration Manager doesn't require Reporting Services Report Manager. You only need it if you
want to run reports in the browser or manage reports by using Report Manager.
IMPORTANT
The user account you use to create the reporting services point must have Read access to the site
database. If the connection test fails, a red warning icon appears. Contextual hover text on the icon has
the details of the failure. Correct the failure, and then select Test again.
Folder name : Specify the folder name to create and use for Configuration Manager reports in
Reporting Services.
Repor ting Ser vices ser ver instance : Select the instance of SQL Server for Reporting Services.
If this page doesn't list any instances, verify that SQL Server Reporting Services is installed,
configured, and started.
IMPORTANT
Configuration Manager makes a connection in the context of the current user to WMI on the selected site
system. It uses this connection to retrieve the instance of SQL Server for Reporting Services. The current
user must have Read access to WMI on the site system, or the wizard can't get the Reporting Services
instances.
Repor ting ser vices point account : Select Set , and then select an account to use. SQL Server
Reporting Services on the reporting services point uses this account to connect to the
Configuration Manager site database. This connection is to retrieve the data for a report. Select
Existing account to specify a Windows user account that you previously configured as a
Configuration Manager account. Select New account to specify a Windows user account that's
not currently configured for use. Configuration Manager automatically grants the specified user
access to the site database.
The account that runs Reporting Services must belong to the domain local security group
Windows Authorization Access Group . This grants the account Allow Read permissions on
the tokenGroupsGlobalAndUniversal attribute for all user objects within the domain. Users in
a different domain than the reporting services point account need a two-way trust between the
domains to successfully run reports.
The specified Windows user account and password are encrypted and stored in the Reporting
Services database. Reporting Services retrieves the data for reports from the site database by
using this account and password.
IMPORTANT
The account that you specify must have the Log on locally permission on the server that hosts the
Reporting Services database.
TIP
To list only site systems that host the reporting services point site role, right-click Ser vers and Site System Roles , and
select Repor ting ser vices point .
IMPORTANT
The site does these actions in the context of the account that's configured for the SMS_Executive service. Typically, this
account is the site server local System account.
Verify installation
Verify the installation of the reporting services point by looking at specific status messages and log file entries.
Use the following procedure to verify that the reporting services point installation was successful.
NOTE
If you see reports in the Repor ts subfolder of the Repor ting node in the Monitoring workspace in the Configuration
Manager console, you can skip this procedure.
NOTE
For more information about authoring reports with SQL Server Reporting Services, see Report Builder authoring
environment.
Configuration Manager automatically installs the certificate on the site server and any SMS Provider roles. You
can create or edit reports from the Configuration Manager console when you run it from one of these servers.
When you create or modify reports from a Configuration Manager console on a different computer, export the
certificate from the site server. The specific certificate's friendly name is the FQDN of the site server in the
Trusted People certificate store for the local computer. Add this certificate to the Trusted People certificate
store on the computer that runs the Configuration Manager console.
2. Select the site system that hosts the reporting services point. Then select the Repor ting ser vice point
site system roles in the details pane.
3. On the Site Role tab of the ribbon, in the Proper ties group, select Proper ties .
4. You can modify the following settings in the Repor ting Ser vices Point Proper ties :
Site database ser ver name
Database name
User account
5. Select OK to save the changes and close the properties.
For more information about these settings, see the descriptions in the section to Install the reporting services
point on a site system.
Next steps
Operations and maintenance for reporting
Operations and maintenance for reporting in
Configuration Manager
2/16/2022 • 15 minutes to read • Edit Online
NOTE
This article focuses on reports in SQL Server Reporting Services. Starting in version 2002, you can integrate reporting
with Power BI Report Server. For more information, see Integrate with Power BI Report Server.
NOTE
Report Manager is a web-based report access and management tool. You can use it to administer a single report server
instance over an HTTPS connection. Use Report Manager for operational tasks: view reports, modify report properties,
and manage associated report subscriptions. This article provides the steps to view a report and modify report properties
in Report Manager. For more information about other options in Report Manager, see What is Report Manager?
TIP
If this node doesn't list any reports, verify that the reporting services point is installed and configured. For more
information, see Configure reporting.
2. Select the report that you want to run. On the Home tab of the ribbon, in the Repor t Group section,
select Run to open the report.
3. If there are required parameters, specify them and then select View Repor t .
Run a report in a web browser
1. In your web browser, go to the Report Manager URL, for example, https://Server1/Reports . Find this
address on the Repor t Manager URL page in Reporting Services Configuration Manager.
2. In Report Manager, select the report folder for Configuration Manager, for example, ConfigMgr_CAS .
TIP
If Report Manager doesn't list any reports, verify that the reporting services point is installed and configured. For
more information, see Configure reporting.
3. Select the report category for the report that you want to run, and then select the specific report. The
report opens in Report Manager.
4. If there are required parameters, specify them and then select View Repor t .
Edit a report
When an existing Configuration Manager report doesn't retrieve the information that you want, edit it in Report
Builder. You can also use Report Builder to change the layout or design of the report. While you can directly edit
a default report, it's best to clone it. Open the report to edit, and then select Save As .
To edit a report, you need Site Modify permission and Modify Repor t permissions on the specific objects in
the report.
IMPORTANT
Site updates preserve built-in reports. If you modify a standard report, when the site updates, it renames the report with
an underscore prefix ( _ ). This behavior makes sure that the site update doesn't overwrite the modified report by the
standard report.
If you modify predefined reports, before you install a site update, back up your custom reports. After the update, restore
the report in Reporting Services. If make significant changes to a predefined report, create a new report instead. New
reports that you create before you upgrade a site are not overwritten.
Use the following procedure to edit the properties for a Configuration Manager report.
1. In the Configuration Manager console, go to the Monitoring workspace. Expand Repor ting , and then
select the Repor ts node.
2. Select the report that you want to modify. On the Home tab of the ribbon, in the Repor t Group section,
select Edit . It may prompt you to enter credentials. If Report Builder isn't installed on the computer,
Configuration Manager prompts you to install it. Report Builder is required to modify and create reports.
3. In Report Builder, modify the appropriate report settings. Select Save to save the report to the report
server.
Create reports
There are two types of reports that you can create:
A model-based repor t lets you interactively select the items you want to include in your report. For
more information about creating custom report models, see Create custom report models for
Configuration Manager in SQL Server Reporting Services.
A SQL-based repor t lets you retrieve data that's based on a report SQL statement.
IMPORTANT
To create a new report, your account needs Site Modify permission. You can only create a report in folders for which you
have Modify Repor t permissions.
You can also reference public stored procedures from the site database. These stored procedures have names
that start with sp_ .
Use the following procedure to create a SQL-based Configuration Manager report.
1. In the Configuration Manager console, go to the Monitoring workspace, expand Repor ting , and select
the Repor ts node.
2. On the Home tab of the ribbon, in the Create section, select Create Repor t . This action opens the
Create Repor t Wizard .
3. On the Information page, configure the following settings:
Type : Select SQL-based Repor t .
Name : Specify a name for the report.
Description : Specify a description for the report.
Ser ver : Displays the name of the report server where you create this report.
Path : Select Browse to specify a folder in which to store the report.
4. Complete the Create Report Wizard.
5. Open Report Builder to configure the report settings. For more information, see Edit a Configuration
Manager report.
6. In Report Builder, provide the SQL statement for the report. You can also build the SQL statement by
using columns in available views. If needed, add parameters to the report.
7. Select Run to run your report. Verify that the report provides the information that you expect. If needed,
select Design to modify the report further.
8. Select Save to save the report to the report server.
NOTE
When you create the subscription, you specify a user name and password. This account needs access to this share with
Write permissions to the destination folder.
Reporting Services can render reports in different file formats. For example, MHTML or Excel. You select the
format when you create the subscription. Although you can select any supported rendering format, some
formats work better than others when rendering to a file.
Limitations for report subscriptions to a file share
The following list includes the limitations of report subscriptions to a file share:
Unlike reports that you host and manage on a report server, Reporting Services delivers reports to a
shared folder as static files.
Interactive features of the report don't work for reports stored as files. The report represents any
interactive features as static elements.
If the report includes charts, it uses the default presentation.
If the report links through to another report, it renders the link as static text.
If you want to keep interactive features in a delivered report, use email delivery. For more information, see
Create a report subscription to deliver a report by email.
Process to create a report subscription for a file share
Use the following procedure to create a report subscription to deliver a report to a file share.
1. In the Configuration Manager console, go to the Monitoring workspace, expand Repor ting , and select
the Repor ts node.
2. Select a report folder, then select the report to which you want to subscribe. On the Home tab of the
ribbon, in the Repor t Group section, select Create Subscription . This action opens the Create
Subscription Wizard .
3. On the Subscription Deliver y page, configure the following settings:
Repor t delivered by : Select Windows File Share .
File Name : Specify the file name for the report. By default, the report file doesn't include a file
name extension. Select Add file extension when created to automatically add a file name
extension based on the format.
Path : Specify a UNC path to an existing folder where you want to deliver this report. For example,
\\server\reportfiles\operations .
Render Format : Select one of the following formats for the report file:
XML file with repor t data
CSV (comma delimited)
TIFF file
Acrobat (PDF) file
HTML 4.0
NOTE
If your report has images, the HTML 4.0 format doesn't include them.
NOTE
To enable the Email subscription option, you need to configure the email settings in Reporting Services. For more
information, see Email delivery in reporting services.
You can select one or both of the following email delivery options:
Send a notification with a link to the generated report.
Send an embedded or attached report. The rendering format and browser determine whether it embeds
or attaches the report.
If your browser supports HTML 4.0 and MHTML, and you select the MHTML (web archive) format,
the email embeds the report in the message.
All other formats deliver reports as attachments.
Reporting Services doesn't check the size of the attachment or message before it sends the report. If
the attachment or message exceeds the maximum limit allowed by your mail server, the report isn't
delivered.
Use the following procedure to create a report subscription to deliver a report by using email.
1. In the Configuration Manager console, go to the Monitoring workspace, expand Repor ting , and select
the Repor ts node.
2. Select a report folder, then select the report to which you want to subscribe. On the Home tab of the
ribbon, in the Repor t Group section, select Create Subscription . This action opens the Create
Subscription Wizard .
3. On the Subscription Deliver y page, configure the following settings:
Repor t delivered by : Select E-mail .
To : Specify a valid email address as the recipient.
NOTE
To enter multiple recipients, separate each email address with a semicolon ( ; ).
Favorites
Configuration Manager ships with several hundred reports by default, and you may have added more to that
list. Instead of continually searching for reports you commonly use, starting in version 2103, you can make a
report a favorite. This action allows you to quickly access it from the new Favorites node.
The list of favorites is per user, not per site or hierarchy.
Prerequisites for report favorites
The version of SQL Server Reporting Services on the site's reporting service point needs to be SQL Server 2017
or later.
NOTE
All instances of SQL Server Reporting Services on the server need to be version 2017 or later.
Add a favorite
1. In the Configuration Manager console, go to the Monitoring workspace. Expand the Repor ting node,
and select either the Repor ts or Power BI Repor ts node.
2. Select a report that you frequently use. Then in the ribbon, select Add to Favorites . The report's icon
changes to a yellow star, which indicates that it's a favorite.
TIP
You can select more than one report to add them all as favorites.
To remove a report from the list of favorites, select it, and then select Remove from Favorites . When
you remove a favorite, Configuration Manager doesn't delete the report.
3. Under the Repor ting node, expand the new Favorites node. To view your list of favorites, select either
the Repor ts or Power BI Repor ts node.
TIP
You can directly connect to your favorite reports in your browser. For example,
https://rsp.contoso.com/Reports/favorites .
You can manage the reports the same from the list of favorites.
Creating custom report models for Configuration
Manager in SQL Server Reporting Services
2/16/2022 • 17 minutes to read • Edit Online
NOTE
For the steps to create a more advanced report model, see the Steps for Creating an Advanced Report Model in SQL
Server Reporting Services section in this topic.
ST EP DESC RIP T IO N M O RE IN F O RM AT IO N
Verify that SQL Server Business Report models are designed and built For more information about SQL
Intelligence Development Studio is by using SQL Server Business Server Business Intelligence
installed Intelligence Development Studio. Verify Development Studio, see the SQL
that SQL Server Business Intelligence Server 2008 documentation.
Development Studio is installed on the
computer on which you are creating
the custom report model.
Create a report model project A report model project contains the For more information, see the To
definition of the data source (a .ds file), create the report model project section
the definition of a data source view (a in this topic.
.dsv file), and the report model (an
.smdl file).
Define a data source for a report After creating a report model project, For more information, see the To
model you have to define one data source define the data source for the report
from which you extract business data. model section in this topic.
Typically, this is the Configuration
Manager site database.
ST EP DESC RIP T IO N M O RE IN F O RM AT IO N
Define a data source view for a report After defining the data sources that For more information, see the To
model you use in your report model project, define the data source view for the
the next step is to define a data source report model section in this topic.
view for the project. A data source
view is a logical data model based on
one or more data sources. Data source
views encapsulate access to the
physical objects, such as tables and
views, contained in underlying data
sources. SQL Server Reporting Services
generates the report model from the
data source view.
Create a report model A report model is a layer on top of a For more information, see the To
database that identifies business create the report model section in this
entities, fields, and roles. When topic.
published, by using these models,
Report Builder users can develop
reports without having to be familiar
with database structures or
understand and write queries. Models
are composed of sets of related report
items that are grouped together under
a friendly name, with predefined
relationships between these business
items and with predefined calculations.
Models are defined by using an XML
language called Semantic Model
Definition Language (SMDL). The file
name extension for report model files
is .smdl.
Publish a report model To build a report by using the model For more information, see the To
that you just created, you must publish the report model for use in
publish it to a report server. The data SQL Server Reporting Services section
source and data source view are in this topic.
included in the model when it is
published.
Deploy the report model to Before you can use a custom report For more information, see the To
Configuration Manager model in the Create Repor t Wizard deploy the custom report model to
to create a model-based report, you Configuration Manager section in this
must deploy the report model to topic.
Configuration Manager.
NOTE
If you cannot see the Solution Explorer pane, click View , and then click Solution Explorer .
NOTE
To edit the properties of an existing data source, double-click the data source in the Data Sources folder of the
Solution Explorer pane to display the data source properties in Data Source Designer.
TIP
To help locate views in the Available objects list, click the Name heading at the top of the list to sort the objects
in alphabetical order.
5. After selecting the view, click > to transfer the object to the Included objects list.
6. If the Name Matching page is displayed, accept the default selections, and click Next .
7. When you have selected the objects that you require, click Next , and then specify a name for the data
source view. For this example, type Simple_Model .
8. Click Finish . The Simple_Model.dsv data source view is displayed in the Data Source Views folder of
Solution Explorer .
To create the report model
1. In Solution Explorer , right-click Repor t Models to select Add New Repor t Model .
2. On the Welcome to the Repor t Model Wizard page, click Next .
3. On the Select Data Source Views page, select the data source view in the Available data source
views list, and then click Next . For this example, select Simple_Model.dsv .
4. On the Select repor t model generation rules page, accept the default values, and then click Next .
5. On the Collect Model Statistics page, verify that Update model statistics before generating is
selected, and then click Next .
6. On the Completing the Wizard page, specify a name for the report model. For this example, verify that
Simple_Model is displayed.
7. To complete the wizard and create the report model, click Run .
8. To exit the wizard, click Finish . The report model is shown in the Design window.
To publish the report model for use in SQL Server Reporting Services
1. In Solution Explorer , right-click the report model to select Deploy . For this example, the report model
is Simple_Model.smdl .
2. Examine the deployment status at the lower left corner of the SQL Ser ver Business Intelligence
Development Studio window. When the deployment has finished, Deploy Succeeded is displayed. If
the deployment fails, the reason for the failure is displayed in the Output window. The new report model
is now available on your SQL Server Reporting Services website.
3. Click File , click Save All , and then close SQL Ser ver Business Intelligence Development Studio .
To deploy the custom report model to Configuration Manager
1. Locate the folder in which you created the report model project. For example,
%USERPROFILE%\Documents\Visual Studio 2008\Projects\<Project Name>.
2. Copy the following files from the report model project folder to a temporary folder on your computer:
<Model Name> .dsv
<Model Name> .smdl
3. Open the preceding files by using a text editor, such as Notepad.
4. In the file <Model Name>.dsv , locate the first line of the file, which reads as follows:
<DataSourceView xmlns="https://schemas.microsoft.com/analysisservices/2003/engine">
</Entities>
</SemanticModel>
8. Paste the contents of the file <Model Name>.dsv directly before the last line of the file
(<SemanticModel> ).
9. Save and close the file <Model Name>.smdl .
10. Copy the file <Model Name>.smdl to the folder %programfiles%\Microsoft Configuration Manager
\AdminConsole\XmlStorage\Other on the Configuration Manager site server.
IMPORTANT
After copying the report model file to the Configuration Manager site server, you must exit and restart the
Configuration Manager console before you can use the report model in the Create Repor t Wizard .
NOTE
If you cannot see the Solution Explorer pane, click View , and then click Solution Explorer .
NOTE
To edit the properties of an existing data source, double-click the data source in the Data Sources folder of the
Solution Explorer pane to display the data source properties in Data Source Designer.
TIP
To help locate views in the Available objects list, click the Name heading at the top of the list to sort the objects
in alphabetical order.
5. If the Name Matching dialog box appears, accept the default selections, and click Next .
6. When you have selected the objects you require, click Next , and then specify a name for the data source
view. For this example, type Advanced_Model .
7. Click Finish . The Advanced_Model.dsv data source view is displayed in the Data Source Views folder
of Solution Explorer .
To define relationships in the data source view
1. In Solution Explorer , double-click Advanced_Model.dsv to open the Design window.
2. Right-click the title bar of the v_R_System window to select Replace Table , and then click With New
Named Quer y .
3. In the Create Named Quer y dialog box, click the Add Table icon (typically the last icon in the ribbon).
4. In the Add Table dialog box, click the Views tab, select V_GS_OPERATING_SYSTEM in the list, and
then click Add .
5. Click Close to close the Add Table dialog box.
6. In the Create Named Quer y dialog box, specify the following information:
Name: Specify the name for the query. For this example, type Advanced_Model .
Description: Specify a description for the query. For this example, type Example Repor ting
Ser vices repor t model .
7. In the v_R_System window, select the following items in the list of objects to display in the report model:
ResourceID
ResourceType
Active0
AD_Domain_Name0
AD_SiteName0
Client0
Client_Type0
Client_Version0
CPUType0
Hardware_ID0
User_Domain0
User_Name0
Netbios_Name0
Operating_System_Name_and0
8. In the v_GS_OPERATING_SYSTEM box, select the following items in the list of objects to display in the
report model:
ResourceID
Caption0
Countr yCode0
CSDVersion0
Description0
InstallDate0
LastBootUpTime0
Locale0
Manufacturer0
Version0
WindowsDirector y0
9. To present the objects in these views as one list to the report author, you must specify a relationship
between the two tables or views by using a join. You can join the two views by using the object
ResourceID , which appears in both views.
10. In the v_R_System window, click and hold the ResourceID object and drag it to the ResourceID object
in the v_GS_OPERATING_SYSTEM window.
11. Click OK.
12. The Advanced_Model window replaces the v_R_System window and contains all of the necessary
objects required for the report model from the v_R_System and the v_GS_OPERATING_SYSTEM
views. You can now delete the v_GS_OPERATING_SYSTEM window from the Data Source View
Designer. Right-click the title bar of the v_GS_OPERATING_SYSTEM window to select Delete Table
from DSV . In the Delete Objects dialog box, click OK to confirm the deletion.
13. Click File , and then click Save All .
To create the report model
1. In Solution Explorer , right-click Repor t Models to select Add New Repor t Model .
2. On the Welcome to the Repor t Model Wizard page, click Next .
3. On the Select Data Source View page, select the data source view in the Available data source
views list, and then click Next . For this example, select Simple_Model.dsv .
4. On the Select repor t model generation rules page, do not change the default values, and click Next .
5. On the Collect Model Statistics page, verify that Update model statistics before generating is
selected, and then click Next .
6. On the Completing the Wizard page, specify a name for the report model. For this example, verify that
Advanced_Model is displayed.
7. To complete the wizard and create the report model, click Run .
8. To exit the wizard, click Finish .
9. The report model is shown in the Design window.
To modify object names in the report model
1. In Solution Explorer , right-click a report model to select View Designer . For this example, select
Advanced_Model.smdl .
2. In the report model Design view, right-click any object name to select Rename .
3. Type a new name for the selected object, and then press Enter. For example, you could rename the object
CSD_Version_0 to read Windows Ser vice Pack Version .
4. When you have finished renaming objects, click File , and then click Save All .
To publish the report model for use in SQL Server Reporting Services
1. In Solution Explorer , right-click Advanced_Model.smdl to select Deploy .
2. Examine the deployment status at the lower left corner of the SQL Ser ver Business Intelligence
Development Studio window. When the deployment has finished, Deploy Succeeded is displayed. If
the deployment fails, the reason for the failure is displayed in the Output window. The new report model
is now available on your SQL Server Reporting Services website.
3. Click File , click Save All , and then close SQL Ser ver Business Intelligence Development Studio .
To deploy the custom report model to Configuration Manager
1. Locate the folder in which you created the report model project. For example,
%USERPROFILE%\Documents\Visual Studio 2008\Projects\<Project Name>.
2. Copy the following files from the report model project folder to a temporary folder on your computer:
<Model Name> .dsv
<Model Name> .smdl
3. Open the preceding files by using a text editor, such as Notepad.
4. In the file <Model Name>.dsv , locate the first line of the file, which reads as follows:
<DataSourceView xmlns="https://schemas.microsoft.com/analysisservices/2003/engine">
</Entities>
</SemanticModel>
8. Paste the contents of the file <Model Name>.dsv directly before the last line of the file
(<SemanticModel> ).
9. Save and close the file <Model Name>.smdl .
10. Copy the file <Model Name>.smdl to the folder %programfiles%\Microsoft Endpoint
Manager\AdminConsole\XmlStorage\Other on the Configuration Manager site server.
IMPORTANT
After copying the report model file to the Configuration Manager site server, you must exit and restart the
Configuration Manager console before you can use the report model in the Create Repor t Wizard .
The data warehouse service point for Configuration
Manager
2/16/2022 • 9 minutes to read • Edit Online
Prerequisites
The data warehouse site system role is supported only at the top-tier site of your hierarchy. For example,
a central administration site (CAS) or standalone primary site.
Starting in version 2107, the server where you install this site system role requires .NET version 4.6.2, and
version 4.8 is recommended. In version 2103 and earlier, this role requires .NET 4.5.2 or later. For more
information, Site and site system prerequisites.
Grant the Repor ting Ser vices Point Account the db_datareader permission on the data warehouse
database.
To synchronize data with the data warehouse database, Configuration Manager uses the computer
account of the site system role. This account requires the following permissions:
Administrator on the computer that hosts the data warehouse database.
DB_Creator permission on the data warehouse database.
Either DB_owner or DB_reader with execute permissions to the top-tier site's database.
The data warehouse database requires the use of SQL Server 2012 or later. The edition can be Standard,
Enterprise, or Datacenter. The SQL Server version for the data warehouse doesn't need to be the same as
the site database server.
The warehouse database supports the following SQL Server configurations:
A default or named instance
SQL Server Always On availability group
SQL Server Always On failover cluster instance
If you use distributed views, install the data warehouse service point on the same server that hosts the
CAS's database.
For more information on SQL Server licensing, see the product and licensing FAQ.
Size the data warehouse database the same as your site database. While the data warehouse is smaller at first, it
will grow over time.
Install
Each hierarchy supports a single instance of this role, on any site system of the top-tier site. The SQL Server that
hosts the database for the warehouse can be local to the site system role, or remote. The data warehouse works
with the reporting services point installed at the same site. You don't need to install the two site system roles on
the same server.
To install the role, use the Add Site System Roles Wizard or the Create Site System Ser ver Wizard . For
more information, see Install site system roles. On the System Role Selection page of the wizard, select the
Data Warehouse ser vice point role.
When you install the role, Configuration Manager creates the data warehouse database for you on the instance
of SQL Server that you specify. If you specify the name of an existing database, Configuration Manager doesn't
create a new database. Instead it uses the one you specify. This process is the same as when you move the data
warehouse database to a new SQL Server.
Configure properties
General page
SQL Ser ver fully qualified domain name : Specify the full qualified domain name (FQDN) of the
server that hosts the data warehouse service point database.
SQL Ser ver instance name, if applicable : If you don't use a default instance of SQL Server, specify
the named instance.
Database name : Specify a name for the data warehouse database. Configuration Manager creates the
data warehouse database with this name. If you specify a database name that already exists on the
instance of SQL Server, Configuration Manager uses that database.
SQL Ser ver por t used for connection : Specify the TCP/IP port number used by the SQL Server that
hosts the data warehouse database. The data warehouse synchronization service uses this port to
connect to the data warehouse database. By default, it uses SQL Server port 1433 for communication.
Data warehouse ser vice point account : Set the User name that SQL Server Reporting Services uses
when it connects to the data warehouse database.
Synchronization settings page
Data Synchronization custom setting : Choose the option to Select tables . In the Database tables
window, select the table names to synchronize to the data warehouse database. Use the filter to search by
name, or select the drop-down list to choose specific groups. Select OK when complete to save.
NOTE
You can't remove tables that the role selects by default.
Star t time : Specify the time that you want the data warehouse synchronization to start.
Recurrence pattern
Daily : Specify that synchronization runs every day.
Weekly : Specify a single day each week, and weekly recurrence for synchronization.
Reporting
After you install a data warehouse service point, several reports become available on the reporting services
point for the site. If you install the data warehouse service point before installing a reporting services point, the
reports are automatically added when you later install the reporting services point.
NOTE
The data warehouse point supports alternative credentials. Specify credentials that SQL Server Reporting Services uses to
connect to the data warehouse database. Data warehouse reports don't open until you add credentials.
To specify an account, set the User name for the data warehouse service point account in the role properties. For more
information, see Configure properties.
The data warehouse site system role includes the following reports, under the Data Warehouse category:
Application Deployment - Historical : View details for application deployment for a specific
application and machine.
Endpoint Protection and Software Update Compliance - Historical : View computers that are
missing software updates.
General Hardware Inventor y - Historical : View all hardware inventory for a specific machine.
General Software Inventor y - Historical : View all software inventory for a specific machine.
Infrastructure Health Over view - Historical : Displays an overview of the health of your
Configuration Manager infrastructure.
List of Malware Detected - Historical : View malware that has been detected in the organization.
Software Distribution Summar y - Historical : A summary of software distribution for a specific
advertisement and machine.
Site expansion
Before you can install a CAS to expand an existing standalone primary site, first uninstall the data warehouse
service point role. After you install the CAS, you can then install the site system role at the CAS.
Unlike a move of the data warehouse database, this change results in a loss of the historic data you have
previously synchronized at the primary site. It isn't supported to back up the database from the primary site and
restore it at the CAS.
2. Use the Configuration Manager console to remove the data warehouse service point role from the
current server.
3. Reinstall the data warehouse service point. Specify the name of the new SQL Server and instance that
hosts the restored data warehouse database.
4. After the site system role installs, the move is complete.
Troubleshoot
Log files
Use the following logs to investigate problems with the installation of the data warehouse service point, or
synchronization of data:
DWSSMSI.log and DWSSSetup.log : Use these logs to investigate errors when installing the data
warehouse service point.
Microsoft.ConfigMgrDataWarehouse.log : Use this log to investigate data synchronization between
the site database to the data warehouse database.
Set up failure
When the data warehouse service point role is the first one that you install on a remote server, installation fails
for the data warehouse.
To work around this issue, make sure that the computer on which you install the data warehouse service point
already hosts at least one other role.
Synchronization failed to populate schema objects
Synchronization fails with the following message in Microsoft.ConfigMgrDataWarehouse.log :
failed to populate schema objects
To work around this issue, make sure that the computer account of the site system role is a db_owner on the
data warehouse database.
Reports fail to open
Data warehouse reports fail to open when the data warehouse database and reporting service point are on
different site systems.
To work around this issue, grant the Repor ting Ser vices Point Account the db_datareader permission on
the data warehouse database.
Error opening reports
When you open a data warehouse report, it returns the following error:
TIP
If this server doesn't already have IIS, install it first.
a. Manage the certificate. Open the Microsoft Management Console (MMC), and add the
Cer tificates snap-in. Select Computer account of the local machine. Expand the Personal
folder, and select Cer tificates .
a. Give the SQL Server service account read permissions to the certificate. Select the Data
Warehouse SQL Ser ver Identification Cer tificate certificate, then go to the Action
menu, select All Tasks , and select Manage Private Keys . Add the SQL Server service
account, and allow Read permission.
b. Export the Data Warehouse SQL Ser ver Identification Cer tificate as a DER encoded
binar y X.509 (.CER) file.
b. Reconfigure SQL. Open SQL Ser ver Configuration Manager .
a. Under SQL Ser ver Network Configuration , right-click to select Proper ties under
Protocols for MSSQLSERVER . Switch to the Cer tificate tab, select Data Warehouse
SQL Ser ver Identification Cer tificate as the certificate, and then save the changes.
b. Under SQL Ser ver Ser vices , restart the SQL Ser ver ser vice . If SQL Server Reporting
Services is also installed on the server that hosts the data warehouse database, restart
Repor ting Ser vice services as well.
2. On the server that hosts SQL Server Reporting Services, open the MMC, and add the Cer tificates snap-
in. Select Computer account . Under the Trusted Root Cer tificate Authorities folder, import the
Data Warehouse SQL Ser ver Identification Cer tificate .
Data flow
Data storage and synchronization
ST EP DETA IL S
1 The site server transfers and stores data in the site database.
Reporting flow
ST EP DETA IL S
About
Support Center aims to reduce the challenges and frustration when troubleshooting Configuration Manager
client computers. Previously, when working with support to address an issue with Configuration Manager
clients, you would need to manually collect log files and other information to help troubleshoot the issue. It was
easy to accidentally forget a crucial log file, causing headaches for you and the support personnel who you're
working with.
Use Support Center to streamline the support experience. It lets you:
Create a troubleshooting bundle (.zip file) that contains the Configuration Manager client log files. You
then have a single file to send to support personnel.
View Configuration Manager client log files, certificates, registry settings, debug dumps, client policies.
Real-time diagnostic of inventory (replaces ContentSpy), policy (replaces PolicySpy), and client cache.
Starting in version 2103, Support Center is split into the following tools:
Suppor t Center Client Data Collector : Collects data from a device to view in the Support Center
Viewer. This separate tool encompasses the existing Support Center action to Collect selected data.
Suppor t Center Client Tools : The other Support Center troubleshooting functionality, except for
Collect selected data .
The following tools are still a part of Support Center:
Suppor t Center Viewer
Suppor t Center OneTrace
Suppor t Center Log File Viewer
Support Center viewer
Support Center includes Support Center Viewer, a tool that support personnel use to open the bundle of files
that you create using Support Center. Support Center's data collector collects and packages diagnostic logs from
a local or remote Configuration Manager client. To view data collector bundles, use the viewer application.
Support Center log file viewer
Support Center includes a modern log viewer. This tool replaces CMTrace and provides a customizable interface
with support for tabs and dockable windows. It has a fast presentation layer, and can load large log files in
seconds.
Support Center OneTrace (Preview)
OneTrace is a new log viewer with Support Center. It works similarly to CMTrace, with improvements. For more
information, see Support Center OneTrace.
PowerShell cmdlets
Support Center also includes PowerShell cmdlets. Use these cmdlets to create a remote connection to another
Configuration Manager client, to configure the data collection options, and to start data collection. These
cmdlets are in separate PowerShell module named ConfigMgrSuppor tCenter.PS . After you install Support
Center, use the following command to import this module:
Prerequisites
Install the following components on the server or client computer on which you install Support Center:
Any Windows OS version supported by Configuration Manager. For more information, see Supported OS
versions for clients. Support Center doesn't support mobile devices or macOS.
Starting in version 2107, the all site and client components require .NET version 4.6.2, and version 4.8 is
recommended. For more information, Site and site system prerequisites. In version 2103 and earlier, this
tool requires .NET 4.5.2 or later.
Install
Find the Support Center installer on the site server at the following path:
cd.latest\SMSSETUP\Tools\SupportCenter\SupportCenterInstaller.msi .
After you install it, find the following items on the Start menu in the Microsoft Endpoint Manager group:
Support Center Client Data Collector (starting in version 2103)
Support Center Client Tools (starting in version 2103)
Support Center (version 2010 and earlier)
Support Center Log File Viewer
Support Center OneTrace
Support Center Viewer
Starting in version 2103, the Start menu group for Support Center includes these five tools:
TIP
When installing Support Center, you can install tools individually. To install only the OneTrace log viewer, use the
Advanced option when using the Support Center installer. You can also use the ADDLOCAL property, for example
supportcenterinstaller.msi ADDLOCAL=OneTraceApplication
Command line options
Starting in version 2111, the following new command-line options have been added to the Support Center Data
Collector and Client Tools:
NOTE
When using -m <machinename> , the account making the connection needs administrator access on the target machine
to collect the data.
Known issues
Remote connections must include computer name or domain as part of the user name
If you connect to a remote client from Support Center, you must provide the machine name or domain name for
the user account when establishing the connection. If you use a shorthand computer name or domain name
(such as .\administrator ), the connection succeeds, but Support Center doesn't collect data from the client.
To avoid this issue, use the following user name formats to connect to a remote client:
ComputerName\UserName
DomainName\UserName
Scripted server message block connections to remote clients might require removal
When connecting to remote clients using the New-CMMachineConnection PowerShell cmdlet, Support Center
creates a server message block (SMB) connection to each remote client. It keeps those connections after you
complete data collection. To avoid exceeding the maximum number of remote connections for Windows, use the
net use command to see the currently active set of remote connections. Then disable any unneeded
connections by using the following command: net use <connection_name> /d where <connection_name> is the
name of the remote connection.
Next steps
Support Center quickstart
Support Center quickstart guide
2/16/2022 • 3 minutes to read • Edit Online
Prerequisites
Local administrative rights to a Configuration Manager client
The Support Center installer. This file is on the site server at
cd.latest\SMSSETUP\Tools\SupportCenter\SupportCenterInstaller.msi . For more information, see Support
Center - Install.
Client configuration : Information from the Configuration Manager client. For example, the
version, the assigned site and management point, and if it's internet facing. This option is always
enabled.
Operating system : Information about the computer. For example, Windows install, network
adapters, and system services. This option is always enabled.
4. Save the troubleshooting bundle file (.zip) to a folder on the computer. By default, the file name is similar
to the following example: Support_c885cdfed3c7482bba4f9e662978ec07.zip .
Policy : Configuration Manager policy settings, including both the requested policy configuration and the
actual policy configuration.
Client WMI : Client configuration information from WMI. Support Center doesn't collect client policy.
Cer tificates : Public key information for client certificates. Support Center doesn't collect certificate
private keys.
Debug dumps : Collect a debug dump of client and related processes. Debug dumps can be large. Only
enable this option when troubleshooting issues with client performance.
WARNING
Collecting debug dumps will cause data bundles to become very large. In some cases, the size can be several
hundred MB.
Debug dumps may contain sensitive information, including passwords, cryptographic secrets, or user data. Only
collect debug dumps on the recommendation of Microsoft Support personnel. Carefully handle data bundles that
contain debug dumps to protect them from unauthorized access.
This data type isn't supported when you make a remote connection to another client.
Client registr y : Collects client configuration information from the registry. Support Center only collects
Configuration Manager registry information.
Troubleshooting : Real-time troubleshooting data to help diagnose common client problems with Active
Directory, management points, networking, policy assignments, and registration.
NOTE
This data type isn't supported when you make a remote connection to another client.
Windows Update log files : Collects log files for Windows Updates, which are necessary when
troubleshooting issues with software updates.
Next steps
User interface reference
Support Center OneTrace
2/16/2022 • 2 minutes to read • Edit Online
OneTrace is a new log viewer with Support Center. It works similarly to CMTrace, with the following
improvements:
A tabbed view
Dockable windows
Improved search capabilities
Ability to enable filters without leaving the log view
Scrollbar hints to quickly identify clusters of errors
Fast log opening for large files
Windows jump lists for recently opened files (version 2103 and later)
Status messages are displayed in an easy to read format (version 2111 and later)
Entries starting with >> are status messages that are automatically converted into a readable format
when a log is opened. Search or filter on the >> string to find status messages in the log.
Prerequisites
Starting in version 2107, the all site and client components require .NET version 4.6.2, and version 4.8 is
recommended. For more information, Site and site system prerequisites.
In version 2103 and earlier, this tool requires .NET 4.6 or later.
Install
OneTrace installs with Support Center. Find the Support Center installer on the site server at the following path:
cd.latest\SMSSETUP\Tools\SupportCenter\SupportCenterInstaller.msi .
NOTE
Support Center Log File Viewer and OneTrace use Windows Presentation Foundation (WPF). This component isn't
available in Windows PE. Continue to use CMTrace in boot images with task sequence deployments.
Log groups
OneTrace supports customizable log groups, similar to the feature in Support Center. Log groups allow you to
open all log files for a single scenario. OneTrace currently includes groups for the following scenarios:
Application management
Compliance settings (also referred to as Desired Configuration Management)
Software updates
To show log groups, go to the View menu, and select Log groups .
<LogGroups>
<LogGroup Name="Desired Configuration Management" GroupType="1" GroupFilePath="">
<LogFile>CIAgent.log</LogFile>
<LogFile>CIDownloader.log</LogFile>
<LogFile>CIStateStore.log</LogFile>
<LogFile>CIStore.log</LogFile>
<LogFile>CITaskMgr.log</LogFile>
<LogFile>ccmsdkprovider.log</LogFile>
<LogFile>DCMAgent.log</LogFile>
<LogFile>DCMReporting.log</LogFile>
<LogFile>DcmWmiProvider.log</LogFile>
</LogGroup>
</LogGroups>
The GroupFilePath property can include an explicit path for the log files. If it's blank, OneTrace relies upon the
registry configuration for the group type. For example, if you set GroupType=1 , by default OneTrace will
automatically look in C:\Windows\CCM\Logs for the logs in the group. In this example, you don't need to specify
GroupFilePath .
Next steps
User interface reference
Support Center user interface reference
2/16/2022 • 25 minutes to read • Edit Online
NOTE
In version 2010 and earlier, the Client Data Collector and Client Tools are combined into a single tool called Suppor t
Center .
The Support Center suite also includes OneTrace . For more information, see Support Center OneTrace.
NOTE
This data type isn't supported when you make a remote connection to another client.
Debug dumps : Create a debug dump of client and related processes. Debug dumps can be large. Only
enable this option when troubleshooting issues with client performance.
WARNING
Collecting debug dumps will cause data bundles to become very large. In some cases, the size can be several
hundred MB.
Debug dumps contain may contain sensitive information, including passwords, cryptographic secrets, or user data.
Only collect debug dumps on the recommendation of Microsoft Support personnel. Carefully handle data bundles
that contain debug dumps to protect them from unauthorized access.
This data type isn't supported when you make a remote connection to another client.
Operating system : Collects configuration information about the local machine. This data includes
information about the Windows installation, network adapters, and system service configuration. You
can't disable this data type.
NOTE
In version 2010 and earlier, this tool is called Suppor t Center .
Starting in version 2103, use the Support Center Client Data Collector for the Collect selected data action.
Window menu
Client tab
Policy tab
Content tab
Inventory tab
Troubleshooting tab
Logs tab
Window menu (Client Tools)
In the upper left corner of the Support Center Client Tools window, select the arrow in the blue box to open this
menu.
Local Machine Connection : Gather log files and troubleshoot the client that's running Support Center.
Remote Connection : Establish a remote connection with another Configuration Manager client. After
connecting, gather log files and troubleshoot the remote client.
About : Provides information about Support Center Client Tools, such as the version.
Options :
Reduce the movement of animated user interface elements
Change the default save location for data bundle files
Change the location of temporary files
Reset warnings. Any warning messages that you previously suppressed appear again when triggered.
Reset temporary file path to the default,
%UserProfile%\AppData\Local\Microsoft\ConfigMgrSupportCenter
Exit : Close Support Center Client Tools.
Client tab
Load or Refresh (Client)
Load or refresh details for the Configuration Manager client.
Client information
When you load client details, this tool shows the following properties:
Client ID : A unique identifier that Configuration Manager uses to identify the client.
Hardware ID : A unique identifier that Configuration Manager uses to identify the client hardware.
Approved : Indicates whether the client is approved in Configuration Manager.
Registration State : Indicates whether the client is registered with Configuration Manager.
Internet-facing : Indicates whether the client is on the internet.
Version : The version number of the installed Configuration Manager client.
Site Code : The site code for the primary site to which the client is assigned.
Assigned MP : The fully qualified domain name (FQDN) of the client's currently assigned management
point.
Resident MP : The FQDN of the resident management point.
Proxy MP : The hostname or FQDN of the proxy management point (if it exists).
Proxy Site Code : The site code for the secondary site (if it exists).
Proxy State : The state of the Configuration Manager client's proxy management point. For example,
Active or Pending .
Maintenance windows
List all maintenance windows currently defined for this client. The next maintenance window displays a different
status than future windows.
Control client agent service
Do one of the following actions for the Configuration Manager client agent service (ccmexec) on the connected
client:
Restar t client
IMPORTANT
If the client agent service doesn't successfully restart, the client isn't manageable by Configuration Manager until
the service starts.
Star t client
Stop client
IMPORTANT
The client isn't manageable by Configuration Manager until the service starts.
NOTE
In Configuration Manager versions 2103 and earlier Deployment view is named Content view .
Cache view
View the client cache configuration and details about the cache contents. When you connect Support Center
Client Tools to a local client, you can also do the following actions:
To change the cache location, select Change next to the Cache location field.
To adjust the size of the cache, select Change next to the Cache size field.
To clear the client cache, select Clear next to the Cache in use field.
This view shows the following properties:
Location : The location of each cache folder. Select the link to open the folder in Windows Explorer.
Content ID
Cache ID
Size
Last Referenced : This property is the date when the client last read from or wrote to this item in the cache.
Monitoring view
View the active progress of software update and application update deployments. This view shows state
messages raised from application and software updates event WMI messages.
For each event, the view shows the following properties:
Time : The time that the client raised the event.
Topic type : The state message type.
Topic ID : ID of the state message, used to map to events in log files.
Topic ID type : The subtype of the state message.
State ID : The result of the action that you're monitoring.
Details and Event data : More information on the state messages shown in this view. State details may
sometimes be blank.
All updates view
View details about software updates:
State
Article ID
Bulletin
Name
Update ID
Scan Time
Source Version
Source Unique ID
Inventory tab
Load or Refresh (Inventory )
Load or refresh the client inventory list for the currently selected view.
Invoke trigger (Inventory )
NOTE
For tasks other than Software metering repor t cycle :
If you request the task when another inventory task is already running, the client queues the new task to run after it
completes the current task and other queued tasks.
Track the progress of the task in Inventor yAgent.log .
The following items on this menu request client action related to inventory:
Discover y data collection cycle (hear tbeat) : Triggers the client task used to collect device discovery
information.
File collection cycle : Triggers the client task used to collect local files.
Hardware inventor y cycle : Triggers the client task used to collect hardware inventory data.
IDMIF collection cycle : Triggers the client task used to collect IDMIF data.
Software inventor y cycle : Triggers the client task used to collect software inventory data.
Software metering repor t cycle : Triggers the client task used to build a software metering report and
send it to the management point. Track the progress of this task in SWMTRRepor tGen.log .
Send unsent state messages in queue : Triggers the client task to flush the queue of state messages.
Advanced
Hardware inventor y cycle (full resynchronization)
Software inventor y cycle (full resynchronization)
Views
If a feature isn't enabled, the view doesn't display any data.
Status : Show the inventory data sets the client has collected.
DDR : Information about the client discovery data collected from the client.
HINV : Information about the hardware inventory data collected from the client.
SINV : Information about the software inventory data collected from the client.
File collection : Information about the files collected from the client.
IDMIF : Information about the IDMIF and NOIDMIF data collected from the client.
Metering : Information about the software metering data collected from the client.
Troubleshooting tab (Client Tools)
Troubleshoot some of the most common issues with Configuration Manager clients:
Issues with Active Directory
Windows networking
Configuration Manager
Management points
Policy assignment
Registration
NOTE
This tab isn't available when you connect to a remote Configuration Manager client.
Start
Starts troubleshooting the client.
Active Director y : Queries Active Directory to retrieve published Configuration Manager site information.
MPCERTIFICATE : Gets management point certificates.
MPLIST : Gets a list of management points.
MPKEYINFORMATION : Gets management point cryptographic key information.
Networking : Troubleshoots issues with networking.
Policy Assignments : Retrieves policy assignments.
Registration : Verifies that the client is registered with the site.
View selected log
After you select a row on the Troubleshooting tab, select this action to view the log file.
Keep previous results
If you troubleshoot the client, and then want to try troubleshooting again, choose this option to keep results
from your first attempt. Otherwise, it overwrites previous troubleshooting log files.
Logs tab
This tab of Support Center Client Tools is almost identical to the Log Viewer tool. The Log Viewer tool doesn't
include the Configure client logging and Log groups features. The Support Center Log File Viewer section
details the other options available on this tab.
Tasks: Configure client logging
Set the following options:
Client log level : Log verbosity and file size
Maximum file count : Allow more than one log file of a given type
Maximum file size : The size in bytes of any given log file before the client creates a new log
NOTE
If you set these values too low, the client may not log any useful information. If you set these values too high, the client
logs can consume large amounts of storage.
IMPORTANT
The Support Center configuration file is an XML-formatted file. It's essential to the operation of Support Center. Modifying
this file is only recommended for users who are familiar with XML and regular expressions.
Before you customize the Support Center configuration file, save a backup of the original. This backup allows
you to recover the original Support Center functionality if you make mistakes while editing the file. If you don't
create a backup, and Support Center doesn't function correctly after you modify the configuration file, reinstall
Support Center. You can also copy a configuration file from another installation of Support Center.
<RegistryDataCollector>
<registryKeys>
<!-- Registry keys (and all subkeys) to collect -->
<add key="software\\microsoft\\ccm"/>
<add key="software\\microsoft\\sms"/>
<add key="software\\microsoft\\ccmsetup"/>
<add key="software\\microsoft\\windows\\currentversion\\uninstall"/>
</registryKeys>
</RegistryDataCollector>
<CcmLogDataCollector>
<additionalLogFiles>
<!-- Collect these additional log files. Can pass in a wildcard for the filename. System variables are
also supported. -->
<!--
<add key="%WINDIR%\WindowsUpdate.log" />
<add key="%WINDIR%\logs\*.log" />
-->
</additionalLogFiles>
</CcmLogDataCollector>
Accessibility features in Support Center
2/16/2022 • 2 minutes to read • Edit Online
TA SK K EY B O A RD SH O RTC UT
Exit Alt + F4
Refresh a policy F5
(on the Support Center Client Policy tab, after selecting a
policy)
Load inventory F5
(on the Support Center Inventor y tab)
Start troubleshooting F5
(on the Support Center Troubleshooting tab)
Search in log files - Ctrl + F : Opens the Find dialog to enter search string
- F3 : Find the next match
- Shift + F3 : Find the previous match
Open Help F1
Next steps
Accessibility features in Configuration Manager
Configuration Manager Tools
2/16/2022 • 3 minutes to read • Edit Online
NOTE
The System Center 2012 R2 Configuration Manager Toolkit is still available from the Microsoft Download Center. For
supported versions of Configuration Manager current branch, use the versions of the tools in the CD.Latest folder on the
site server. Some tools were formerly in the toolkit but not included current branch. These legacy tools are no longer
supported.
Client tools
These tools are in the ClientTools subfolder:
Client Spy: Troubleshoot issues related to software distribution, inventory, and metering
Deployment Monitoring Tool: Troubleshoot applications, updates, and baseline deployments
Policy Spy: View policy assignments
Power Viewer Tool: View status of power management feature
Send Schedule Tool: Trigger schedules and evaluations of configuration baselines
NOTE
The ClientTools folder also includes the file Microsoft.Diagnostics.Tracing.EventSource.dll. Several client tools require
this library. You can't directly use it.
Server tools
These tools are in the ServerTools subfolder:
DP Job Queue Manager: Troubleshoots content distribution jobs to distribution points
Collection Evaluation Viewer: View collection evaluation details
IMPORTANT
Starting in Configuration Manager version 2103, this standalone tool isn't supported. The tool is no longer
included with the Configuration Manager installation source. Starting in version 2010, its functionality is built-in to
the console. For more information, see, How to view collection evaluation.
Content Library Explorer: View contents of the content library single instance store
Content Library Transfer: Transfers content library between drives
Content Ownership Tool: Changes ownership of orphaned packages. These packages exist in the site
without an owning site server.
Role-based Administration and Auditing Tool: Helps administrators audit roles configuration
NOTE
Starting in version 2107, RBAViewer has moved from <installdir>\tools\servertools\rbaviewer.exe . It's
now located in the Configuration Manager console directory. After you install the console, RBAViewer.exe will be in
the same directory. The default location is
C:\Program Files (x86)\Microsoft Endpoint Manager\AdminConsole\bin\rbaviewer.exe .
Run Meter Summarization Tool: Run metering summarization task and analyze metering data
NOTE
The ServerTools folder also includes the following files:
AdminUI.WqlQueryEngine.dll
Microsoft.ConfigurationManagement.ManagementProvider.dll
Microsoft.Diagnostics.Tracing.EventSource.dll
Several server tools require these libraries. You can't directly use them.
Other tools
Hierarchy Maintenance Tool: Use Preinst.exe in the \<SiteServerName>\SMS_<SiteCode>\bin\X64\00000409
shared folder on the site server to pass commands to the hierarchy manager component.
Microsoft Deployment Toolkit (MDT): A collection of tools, processes, and guidance for automating
desktop and server OS deployments.
System Center Updates Publisher (SCUP): A stand-alone tool to manage and import custom software
updates.
Package Conversion Manager: Convert legacy packages into applications.
CMTrace
2/16/2022 • 9 minutes to read • Edit Online
NOTE
CMTrace isn't automatically registered with Windows to open the .log file extension. For more information, see File
associations.
Configuration Manager version 2107 includes multiple performance improvements to the CMTrace log viewer.
Locations
Configuration Manager automatically installs CMTrace in the following locations:
The site server's tools directory. For example: cd.latest\SMSSETUP\Tools\CMTrace.exe
The Management point's installation directory. For example: C:\SMS_CCM\CMTrace.exe
The client installation directory. For example: C:\Windows\CCM\CMTrace.exe
OS deployment boot images. For example: X:\sms\bin\x64\CMTrace.exe
If you have a copy of CMTrace in another location, consider removing it and using a copy in one of the default
paths. If it's in a custom location that meets your business requirements, then make sure you have a process to
keep it up to date. If your custom location might be of benefit to other customers, file product feedback.
A script is available in the Community Hub to help you locate and update versions of CMTrace to the latest
version: CMTraceUpdate. For more information, see Direct links to Community hub items.
Usage
Run CMTrace.exe . The first time you run the tool, you see a prompt for file association. For more information,
see File associations.
You take most actions in CMTrace from the following menus:
File
Tools
File menu
The following actions are available in the File menu:
Open
Open on Server
Print
Preferences
The File menu also lists the last eight recent files. Quickly reopen one of these logs by selecting it from the File
menu.
Open
Displays the Open dialog box to browse for a log file.
Filter the view for files of the following types:
Log files (*.log)
Old log files (*.lo_)
All files (*.*)
The following two options aren't selected by default:
Ignore existing lines : When selected, CMTrace ignores the existing contents of the selected log file and
displays new lines only as they're added. Use this option to monitor only new actions when you don't
need the full history of the log file.
Merge selected files : If you enable this option and select more than one log file, CMTrace merges the
selected logs in the view. It displays them as if they're a single log file. The merged log updates the same,
and supports all other CMTrace features as if it's a single log file.
Open on Server
Browse the Configuration Manager logs folder on a site system computer with the standard Browse dialog box.
You can also browse the network for a remote computer.
When you select a remote computer to browse, CMTrace checks for the Configuration Manager share. If it can't
find a share with Configuration Manager log files, it displays an error message.
To connect directly to a known computer without browsing, use the Open action. Then enter a server name and
share using the UNC format.
Print
Display the standard Windows Print dialog box. This action sends the current log file to a printer. It formats the
output according to the settings on the Printing tab of CMTrace Preferences.
Preferences
Configure settings for CMTrace. The following options are available:
General tab
Update Inter val : Controls how often CMTrace checks for changes to log files and loads new lines.
By default, this value is 500 milliseconds.
Highlight : Sets the color that CMTrace uses when highlighting log lines that you choose. By
default, this color is basic yellow (Red: 255, Green: 255, Blue: 0).
Columns : Configures the columns that are visible in the log view and the order in which they
appear. By default, it displays Log Text, Component, Date/Time, and Thread.
Printing tab
Columns : Configure which columns it uses when printing log files and the order in which they
appear. By default, it prints the same columns as it displays.
Orientation : Sets the default print orientation when printing log files. Override this setting in the
Print dialog box. By default, it uses Portrait orientation.
Advanced tab
Refresh Inter val : Forces CMTrace to update the log view at a specified interval when loading a
large number of lines. By default, this option is disabled with a value of zero.
NOTE
In general, don't modify the Refresh Inter val. It can significantly increase the amount of time it takes to
open large log files.
Tools menu
The following actions are available in the Tools menu:
Find
Find Next
Copy to Clipboard
Highlight
Filter
Error Lookup
Pause
Show/Hide Details
Show/Hide Info Pane
Find
Search the open log file for a specified text string.
Find Next
Finds the next matching string, as you previously specified in the Find dialog box.
Copy to Clipboard
Copies the selected lines as plain text to the Windows clipboard. If you're examining Configuration Manager and
CCM log files, it copies the columns in the same order as the view. It separates each column by a tab character.
Use this action when copying logs into email messages or other documents.
Highlight
Enter a string that CMTrace uses to search the text of each log entry. It then highlights any log text that matches
the string you enter.
The highlight uses the color you specified in Preferences.
To turn off highlighting, clearing the string from this field.
If you enter a decimal or hexadecimal number, CMTrace tries to match the value to the Thread column.
Use this behavior to highlight the processing of a single thread, without filtering out other threads that
might interact with it.
To compare strings by case, enable the option for Case sensitive .
Filter
Show or hide log lines based on the specified criteria. Apply filters to any of the four columns regardless of
whether they're visible. These settings apply to each opened log file.
Examples:
Filter smsts.log on entry text containing "the action" or "the group".
Filter Inventor yAgent.log where entry text contains "destination".
Error Lookup
Type or paste an error code in either decimal or hexadecimal format to display a description. Possible error
sources include: Windows, WMI, or Winhttp.
Pause
Suspend or restart log monitoring. The following use cases are some of the possible reasons to use this action:
When CMTrace is displaying log file information too quickly
When you pause log monitoring, the information that CMTrace displays isn't lost if the current file rolls
over to a new log
When you want to stop CMTrace from displaying new data while you examine the log file
Show/Hide Details
Show or hide all columns other than the log text. It also expands the log text column to the width of the window.
Use this action when you're viewing logs on a computer with low display resolution. It displays more of the log
text.
NOTE
When viewing plain-text files, CMTrace automatically hides details because they're always empty.
Log pane
The log pane is at the top of the CMTrace window. It displays lines from log files.
When you select a line, it's temporarily highlighted using the Windows selection color scheme.
Highlighted lines match the criteria you define with the Highlight option in the Tools menu. The highlight uses
the color that you specify in Preferences .
CMTrace displays lines with errors using a red background and yellow text color. In CCM-format logs, log entries
have an explicit type value that indicates the entry as an error. For other log formats, CMTrace does a case-
insensitive search in each entry for any text string matching "error".
It displays lines with warnings using a yellow background. In CCM-format logs, log entries have an explicit type
value that indicates the entry as a warning. For other log formats, CMTrace does a case-insensitive search in
each entry for any text string matching "warn".
Info pane
The Info pane is at the bottom of the CMTrace window. It includes the following features:
Details about the currently selected log entry
A text box that displays the log text
It displays carriage returns so that formatted text is easier to read
Easier to read long entries that aren't fully visible in the Log pane
Show or hide the Info pane with the Show/Hide Info Pane option on the Tools menu. If the Info pane takes up
more than half of the log window, CMTrace automatically hides it.
Progress bar
When you first open a log file, CMTrace replaces the Info pane by a progress bar. This progress indicates how
much of the existing file contents it's loaded. The progress reaches 100 percent, CMTrace removes the progress
bar, and replaces it with the Info pane. When you load large files, this behavior provides you with an indication
of how long the load might take.
Status bar
For Configuration Manager-format and CCM-format log files, the status bar displays the elapsed time for the
selected log entries. If you select a single entry, the tool displays the time from the first log entry to the selected
entry. If you select multiple entries, it calculates the time from the top-most selected entry to the bottom-most
selected entry. CMTrace formats this information as follows:
Elapsed time is <hours>h <minutes>m <seconds>s <milliseconds>ms (<seconds+milliseconds> seconds)
Other tips
Last Directory registry key
By default, CMTrace saves the last log location that you opened. This behavior is useful on the site server, as it
defaults to the logs path every time.
The first time you launch it on a client, it defaults to the current working directory. This location may be the path
where you saved CMTrace, or a path like %userprofile%\Desktop .
The Last Director y value in the registry key HKEY_CURRENT_USER\Software\Microsoft\Trace32 controls this default
location. If you set this value to %windir%\CCM\Logs on your clients, then CMTrace opens files in the client log
location the first time you run it.
Next steps
Log files
Support Center log file viewer
OneTrace is the log viewer with Support Center. It works similarly to CMTrace, with improvements. For more
information, see Support Center OneTrace.
Client Spy
2/16/2022 • 5 minutes to read • Edit Online
NOTE
To improve performance, the tool only collects information for each tab when you select it. Similarly, when you click
Refresh , it only refreshes the information for the currently displayed tab.
Usage
Tools menu
The following actions are available in the Tools menu:
Connect
Retrieve information from a different computer.
By default, the tool displays information from the current computer.
Connect using the remote computer name, user name, and password for the account. The tool makes a
connection to the IPC$ share on the remote computer. It deletes the connection when either the tool exits
or you connect to another computer.
It requires an account with sufficient credentials to obtain the information.
If you don't specify a user name and password, Client Spy uses the security context of the currently
signed-in user to attempt to make the connection.
When you connect to a remote computer, all tabs that are displayed show information from the remote
computer.
Software Distribution
Displays the Software Distribution tabs and hides the other tabs. By default, Client Spy displays the Software
Distribution tabs.
Inventory
Displays the Inventory tab and hides the other tabs.
Software Metering
Displays the Software Metering tab and hides the other tabs.
Save current tab to file
Saves the information in the currently displayed tab to a text file that you specify.
Save all tabs to file
Saves the information in all tabs to a text file that you specify. It only saves information your account can see.
NOTE
It uses different icons for varying states of a run request.
NOTE
Package name information is only available for packages that have advertised policies associated to them on the
computer being viewed. Packages that no longer have available policies associated to them display the message "Package
Name No Longer Available".
Inventory tab
There's only one tab containing inventory information. The main tree contains the following five items:
Software Inventor y : Contains the date that the last cycle started, the date of the last report, and the
minor and major versions of the last report.
File Collection : Contains the date that the last cycle started, the date of the last report, and the minor
and major versions of the last report.
Hardware Inventor y : Contains the date that the last cycle started, the date of the last report, and the
minor and major versions of the last report.
IDMIF Collection : Contains the date that the last cycle started, the date of the last report, and the minor
and major versions of the last report.
DDR : Contains the date that the last cycle started, the date of the last report, and the minor and major
versions of the last report. The DDR information is also displayed in a subtree.
Features
Run it as an administrator to troubleshoot deployments on a local client.
Troubleshoot deployments on a remote client. Launch the tool and connect to a remote machine as an
administrator.
Export to XML all the data collected in the tool. Share the XML file with others, and use it as a common
platform for talking about troubleshooting deployments.
Import previously exported data to a different machine, and use it to run the tool in offline mode.
Usage
The Deployment Monitoring Tool supports graphical user interface only. To launch the tool, run
DeploymentMonitoringTool.exe as an administrator. There are three views:
Client Proper ties : A list of useful attributes about the device and the Configuration Manager client. This
view is the default.
Deployments : View all of the currently targeted deployments. Select a deployment in the results pane to
view more information in the details pane.
All Updates : View all of the software updates and their status.
To copy data in any view, select a cell, and press CTRL + C .
Actions menu
The following actions are available in the Actions menu:
Connect to remote machine : Select a computer to connect to. When you don't specify a user name
and password, it uses the current credentials. Click Save to connect to remote computer.
Expor t Data : Select the file to write the data into, and click Save . Use the exported XML file for remote
troubleshooting on a different computer.
Impor t Data : Select a file to import into the tool.
View Log : Opens an associated log file, depending upon the view:
Client Properties: \\<hostname>\c$\Windows\CCM\Logs\PolicyAgent.log
Deployments: \\<hostname>\c$\Windows\CCM\Logs\PolicyAgent.log
All Updates: C:\Windows\WindowsUpdate.log
See also
Deploy applications
Deploy software updates
Deploy configuration baselines
Policy Spy
2/16/2022 • 5 minutes to read • Edit Online
IMPORTANT
Run Policy Spy as an administrator. If you don't Run as administrator , you see the following error in Client Info:
There is no client installed on this machine. Connection to client policy failed with error 80041003
Command-line syntax
Policy Spy is primarily intended for use through its user interface. It does provide limited command-line options
to support automation and batch processing.
PolicySpy.exe [/export <ExportFilename> [<computername>]]
Option: /export
This option silently exports the policy of the local or remote computer. <ExportFilename> is the file name to
which the tool saves the XML exported policy. If you specify the <computername> option, Policy Spy exports the
policy of that computer instead of the local computer.
NOTE
This command-line option doesn't provide a way to specify user credentials. To use alternative credentials to access a
remote computer, use the runas command to open a new command prompt with the required security credentials.
Usage
Tools menu
The following actions are available in the Tools menu:
Open Remote : Connects to the Configuration Manager client policy on a remote computer. Use the
Connect dialog box to retrieve the name of the remote computer and optional user credentials. If the
connection fails, it displays error information in the Client Info pane. If the connection fails again, try
connecting by selecting Refresh on the Edit menu, or by pressing F5.
Open File : Opens a policy export file (XML) created by the Expor t Policy option. The tool displays the
exported policy exactly the same as a live policy. It disables some features that only apply when you
connect to an actual client.
Request Machine Assignments : Triggers a request for machine policy assignments on the target
computer. This feature is disabled when viewing exported policy.
Evaluate Machine Policy : Triggers a machine policy evaluation on the target computer. This feature is
disabled when viewing an exported policy.
Request User Assignments : Triggers a request for user policy assignments for the currently signed-in
user. This feature is only available when viewing a policy on the local computer.
Evaluate User Policy : Triggers a user policy evaluation for the currently signed-in user. This feature is
only available when viewing a policy on the local computer.
Reset Policy : Removes all non-default policies and resets the policy cookies for the site. It then triggers a
request for machine policy assignments. This feature is disabled when viewing an exported policy.
Expor t Policy : Exports the target computer's policy to an XML file. View this file on any computer with
Policy Spy. To open the export file, select Open File on the Tools menu. This feature is disabled when
viewing an exported policy.
Edit menu
The following actions are available in the Edit menu:
Delete : Deletes the instance selected in the Results pane. This action is only supported for policy
instances. If you try to delete anything other than policy instances, the tool displays an error message.
This feature is disabled when viewing an exported policy.
Refresh : Refreshes all results to view the latest information. All tree nodes that are expanded before
refreshing are automatically expanded afterward. If Policy Spy hasn't successfully connected to the target
computer's policy, it tries to connect again. This feature is disabled when viewing an exported policy.
Clear Events : Clears all items from the Events tab.
Results pane
The results pane displays different views of the policy system on the target computer. Access these views by
clicking on one of the following four tabs:
Actual
Requested
Default
Events
Actual
This tab displays the current policy of the client. The current policy determines a client's behavior and the
behavior of its client agents, such as software distribution and inventory. The tab displays results in a tree format
with a root node for the computer namespace and each user-specific namespace. Expand a namespace node to
display a list of classes. Expand a class to display a list of its instances. The class list includes only classes that
have instances.
Requested
This tab displays the policy assignments that the client retrieved from its assigned site. The tab displays results
in tree format with a root node for the Machine namespace and each user-specific namespace. Expanding a
namespace node displays the following nodes:
Configuration : Displays a list of configuration classes derived from CCM_Policy_Config, which includes
policy object, assignments, and others.
Settings : Displays all active settings generated by policies. Settings are displayed under the
Configuration node.
NOTE
Multiple instances can exist with the same name because the client hasn't merged these settings into a final resultant set.
Policy Spy displays instances under this node by using the RealKey properties instead of their true policy keys. Correlate
these instances to the resultant set displayed on the Actual tab.
Default
This tab displays the same information as the Requested tab. It also includes contents of the DefaultMachine
and DefaultUser namespaces.
Events
This tab displays policy agent events as they happen. The view creates a WMI event subscription for all events
derived from CCM_PolicyAgent_Event. The view shows a maximum of 200 events. It removes the oldest events
from the top of the list, as necessary. If you select the last item in the list, the list automatically scrolls down as it
adds new events. Otherwise, the view maintains its current position, and you must scroll down or press the End
key to view new events. This view is always empty when viewing an exported policy.
Details pane
The Details pane displays detailed information about the current selection. If no selection is active, it displays
information about Policy Spy itself, including the version. Otherwise, it displays a Manage Object Format (MOF)
representation of the selected item.
Policy Spy uses its own MOF-generation routine to create a more user-friendly HTML display than the plain-text
MOF generated by WMI. This behavior allows Policy Spy to add the following features to make the MOF more
legible:
Syntax highlighting
Indented objects and arrays
Properties are arranged into system, inherited, and local groups. By default, it collapses the system and
inherited groups. You can immediately see which properties the instance actually uses.
Copy MOF or copy plain-text MOF to the clipboard. This feature is useful for pasting the MOF into other
applications by directly calling the MofComp tool.
For instances of Policy objects derived from CCM_Policy_Policy, the details pane displays the policy body below
the MOF that displays. If the client hasn't downloaded the policy body, Policy Spy displays a hyperlink. Click the
link to download the policy body directly from the client's management point. If the tool successfully downloads
the policy body, it replaces the hyperlink with the contents of the reply. Otherwise, Policy Spy updates the
display indicating that the request failed.
Power Viewer Tool
2/16/2022 • 2 minutes to read • Edit Online
Usage
Run SendSchedule.exe as an administrator.
SendSchedule /L [Computer Name] SendSchedule "<Message GUID | DCM UID>" [Computer Name]
After you trigger a message (GUID), see SMSClientMethodProvider.log . For more information about
available message GUIDs, see Message IDs.
After you trigger the evaluation of a configuration baseline (DCM UID), see DCMAgent.log .
Command-line options
Option: /L
List all Message GUID or DCM UID available for sending. Display the meaningful name of messages in the data
table for each one. If the computer name is absent, it uses the local computer. If you specify a message without a
machine name, then it sends the message to the local machine.
Examples
List the available messages on the local machine
SendSchedule /L
Message IDs
M ESSA GE ID DISP L AY N A M E
Usage
Run DPJobMgr.exe . The main menu of the tool contains the following tabs:
Connect: Establish the initial connection to the primary site server
Overview: Summarizes in a single view all the jobs that are running on all distribution points
Distribution Point Info: Multi-select distribution points to track them, and manage a single job of interest
Manage Jobs: Shows in one flat view a list of all the jobs and their statuses. Manipulate jobs, move them
up, cancel, or manually start.
Connect tab
Use this tab to establish the initial connection to the primary site server. It uses the currently signed-in user's
credentials. You can't connect to the central administration site or secondary sites. The connection requires the
Full Administrator security role.
Once the tool successfully establishes a connection, a notification at the bottom of the tool confirms that it's
connected to the site server.
Overview tab
Shows a summary of all the jobs on all distribution points. See the following columns:
Distribution Point : Lists the names of the distribution points
Running Jobs : Shows the number of concurrent jobs that are running on a particular distribution point.
TIP
The number of concurrent software distributions is a site setting. Modified this setting in the Software Distribution
Component Properties.
Total Jobs : Shows the number of all the jobs targeted to a particular distribution point. This number
includes the jobs that are running, retrying, or waiting to be executed.
Total Retries : Shows the number of times jobs have been retrying in a particular distribution point. A
higher number may represent a general problem with that particular distribution point.
TIP
To sort each column in this tab, click on the column name
Manually refresh the information in this tab by clicking Refresh
Automatically refresh the information in this tab by clicking Star t Auto Refresh and setting the auto refresh
interval. The default refresh interval is two minutes.
TIP
To sort each column in this tab, click on the column name
Manually refresh the information in this tab by clicking Refresh
Automatically refresh the information in this tab by clicking Star t Auto Refresh and setting the auto refresh
interval. The default refresh interval is two minutes.
If you need to modify a particular job, right-click the job in this view, and select Manage Job . This action opens
the Manage Jobs tab.
Manage Jobs tab
Shows in one flat view a list of all the jobs and their statuses. It contains the same eight columns as the
Distribution Point Info tab. In this view, right-click the jobs for the following actions:
Run : Starts a job that's in any state other than running
Move To Top : Moves one or more jobs to the top of the queue. This action may result in the jobs running
immediately. A lower priority job may pause because of this action.
Move Up : Moves a particular job one row above. A lower priority job may pause running because of this
action.
Move Down : Moves a particular job one row below.
Move To Bottom : Moves one or more jobs to the bottom of the queue.
TIP
Drag-and-drop jobs in the list to move them.
NOTE
You can't cancel jobs near their final completion time. If the site server is also a distribution point, you can't cancel
jobs on the site server.
See also
Fundamental concepts for content management
Package transfer manager
Collection Evaluation Viewer
2/16/2022 • 5 minutes to read • Edit Online
IMPORTANT
Starting in Configuration Manager version 2103, this standalone tool isn't supported. The tool is no longer included with
the Configuration Manager installation source. Starting in version 2010, its functionality is built-in to the console. For
more information, see, How to view collection evaluation.
Requirements
Run the tool on the site server
Run the tool by an administrative user with at least the Read-Only Analyst role
The user also requires Read permission to the site database in SQL
SQL must be on the default port
Usage
Run CEViewer.exe . The main menu of the tool contains the following tabs:
Connect: Establish the initial connection to the primary site server and SQL Server
Full Evaluation: Lists the detailed information about all past full evaluations
Incremental evaluation: Lists the detailed information about all past incremental evaluations
All Queues: Summarizes the current collection evaluations for all four queues
Manual Queue: Lists the detailed information about the current collection evaluation in the manual queue
New Queue: Lists the detailed information about the current collection evaluation in the new queue
Full Queue: Lists the detailed information about the current collection evaluation in the full queue
Incremental Queue: Lists the detailed information about the current collection evaluation in the
incremental queue
Connect tab
This tab allows you to establish the initial connection to the primary site server. The tool also establishes a
connection to the SQL Server that hosts the site database.
The connections to both primary site server and SQL Servers use the current signed-in user credential.
Connections to the central administration site or a secondary site aren't supported. No collection evaluation
process runs on those sites.
Once the tool successfully establishes a connection, see a notification at the bottom of the Collection Evaluation
Viewer that confirms the tool's connection to the SQL Server.
Full Evaluation tab
Shows detailed information about past full collection evaluations. There are eight columns:
Collection Name : Name of the collection
Site ID : Site ID of the collection
Run Time : How long the last collection evaluation ran, in seconds
Last Evaluation Completion Time : When the last collection evaluation completed
Next Evaluation Time : When the next full evaluation starts
Member Changes : The member changes in the last collection evaluation. These changes are either plus
(members added) or minus (members removed).
Last Member Change Time : The most recent time that there was a membership change in the
collection evaluation
Percent : The percentage of evaluation time for this collection over the total (all collections) evaluation
time
Incremental evaluation tab
Shows detailed information about past incremental collection evaluations. There are seven columns:
Collection Name : Name of the collection
Site ID : Site ID of the collection
Run Time : How long the last collection evaluation ran, in seconds
Last Evaluation Completion Time : When the last collection evaluation completed
Member Changes : The member changes in the last collection evaluation. These changes are either plus
(members added) or minus (members removed).
Last Member Change Time : The most recent time that there was a membership change in the
collection evaluation
Percent : The percentage of evaluation time for this collection over the total (all collections) evaluation
time
All Queues tab
Summarizes the live collection evaluations for all four queues. There are six sections:
Summar y : Lists the total collection number and the queue length for all collections in all four queues
Running Evaluation : Lists which collection is currently being evaluated in each queue, and how long it
has been running
Manual Update : Shows a brief summary of the collections being evaluated, the estimated completion
time, and the order of the evaluation in the manual queue
New Collection : Shows a brief summary of the collections being evaluated, the estimated completion
time, and the order of the evaluation in the new collection queue
Full Evaluation : Shows a brief summary of the collections being evaluated, the estimated completion
time, and the order of the evaluation in the full evaluation queue
Incremental Evaluation : Shows a brief summary of the collections being evaluated, the estimated
completion time, and the order of the evaluation in the incremental evaluation queue
Manual Queue tab
Shows information about the manual collection evaluation currently being evaluated. The order in the list is the
order in which the collection will be evaluated. There are four columns:
Collection Name : Name of the collection
Site ID : Site ID of the collection
Estimated Completion Time : When the evaluation is estimated to complete
Estimated Run Time : How long the evaluation is estimated to run, in day:hour:minute:second format
New Queue tab
Shows the live information about the new collection evaluation being evaluated. The order in the list is the order
in which the collection will be evaluated. There are four columns:
Collection Name : Name of the collection
Site ID : Site ID of the collection
Estimated Completion Time : When the evaluation is estimated to complete
Estimated Run Time : How long the evaluation is estimated to run, in day:hour:minute:second format
Full Queue tab
Shows information about the full collection evaluation currently being evaluated. The order in the list is the
order in which the collection will be evaluated. There are four columns:
Collection Name : Name of the collection
Site ID : Site ID of the collection
Estimated Completion Time : When the evaluation is estimated to complete
Estimated Run Time : How long the evaluation is estimated to run, in day:hour:minute:second format
Incremental Queue tab
Shows information about the incremental collection evaluation currently being evaluated. The order in the list is
the order in which the collection will be evaluated. There are four columns:
Collection Name : Name of the collection
Site ID : Site ID of the collection
Estimated Completion Time : When the evaluation is estimated to complete
Estimated Run Time : How long the evaluation is estimated to run, in day:hour:minute:second format
Content Library Explorer
2/16/2022 • 3 minutes to read • Edit Online
Requirements
Run the tool using an account that has administrative access to:
The target distribution point
The WMI provider on the site server
The Configuration Manager provider
Only the Full Administrator and Read-Only Analyst roles have sufficient rights to view all
information from this tool.
Other roles, such as Application Administrator , can view partial information. For more
information, see Disabled packages.
The Read-Only Analyst can't redistribute packages from this tool.
Run the tool from any computer, as long as it can connect to:
The target distribution point
The primary site server
The Configuration Manager provider
If the distribution point is colocated with the site server, it's still necessary to have administrative access
to the site server.
Usage
When you start ContentLibrar yExplorer.exe , enter the fully qualified domain name (FQDN) of the target
distribution point. It then connects to the distribution point. If the distribution point is part of a secondary site, it
prompts you for the FQDN of the primary site server, and the primary site code.
In the left pane, view the packages that are distributed to this distribution point. Expand the packages, and
explore their folder structure. This structure matches the folder structure from which you created the package.
When you select a folder, it displays in the right pane any files within the folder. This view includes the following
information:
File name
File size
Which drive it's on
Other packages that use the same file on the drive
When the file was last changed on the distribution point
The tool also connects to the Configuration Manager provider. This connection is to determine which packages
are distributed to the distribution point, and whether they're actually in the distribution point's content library.
For instance, a package that's pending distribution may not yet exist in the content library. Such a package
would appear as "PENDING" in the tool, and no actions are enabled for this package.
Disabled packages
Some packages are present on the distribution point but not visible in the Configuration Manager console.
These packages are marked with an asterisk (*). No actions may be performed on these packages. Other
packages may also be marked with an asterisk and have actions disabled.
There are three primary reasons for disabled packages:
The package is the Configuration Manager client upgrade. This package includes "ccmsetup.exe".
Your user account can't access the package, likely due to role-based administration. For instance, the
Application Author role can't see driver packages in the console, so any driver packages on the
distribution point are marked as disabled.
The package is orphaned on the distribution point.
Validate packages
Validate packages by using Package > Validate on the toolbar. First select a package node in the left pane Don't
select a content or a folder. The tool connects to the WMI provider on the distribution point for this action. When
the tool starts, packages that are missing one or more contents are marked invalid. Validating the package
reveals which content is missing. If all content is present but the data is corrupted, validation detects the
corruption.
Redistribute packages
Redistribute packages using Package > Redistribute on the toolbar. First select a package node in the left
pane. This action requires permissions to redistribute packages.
Other actions
Use Edit > Copy to copy packages, contents, folders, and files out of the content library to a specified folder. You
can't copy the content library itself. Select more than one file, but you can't select multiple folders.
Search for packages using Edit > Find Package . This action searches for your query in the package name and
package ID.
Limitations
The tool can't manipulate the content library directly in any way. Changes to the content library may
result in malfunctions.
The tool can redistribute packages, but only to the target distribution point.
When you colocate the distribution point with the site server, you can't validate package data. Use the
Configuration Manager console instead. The tool still inspects the package to make sure that all the
content is present, though not necessarily intact.
You can't delete content with this tool.
See also
Fundamental concepts for content management
The content library
Content Library Transfer tool
2/16/2022 • 2 minutes to read • Edit Online
Usage
Run ContentLibrar yTransfer.exe as a user with administrative permissions on the distribution point.
Syntax
ContentLibraryTransfer.exe –SourceDrive <drive letter of source drive> –TargetDrive <drive letter of
destination drive>
Example
ContentLibraryTransfer –SourceDrive E –TargetDrive G
Limitations
Run the tool locally on the distribution point. You can't run it from a remote computer.
Only use it when clients aren't actively accessing the distribution point. If you run the tool while clients
are accessing content, the content library on the destination drive may have incomplete data. The data
transfer might fail altogether leading to an unusable content library.
Don't distribute content to the distribution point when you run the tool. If you run the tool while content
is being written to the distribution point, the content library on the destination drive may have
incomplete data. The data transfer might fail altogether leading to an unusable content library.
See also
Fundamental concepts for content management
The content library
Content Ownership Tool
2/16/2022 • 2 minutes to read • Edit Online
TIP
Use ContentLibrar yCleanup.exe in CD.Latest\SMSSETUP\TOOLS\ContentLibraryCleanup to remove orphaned
content from a distribution point. For more information, see Content library cleanup tool.
Features
Display all orphaned packages
Display all packages, even if they're not orphaned
View the status of the connection to a site
Filter packages by name, site code, or package type
Sort by any displayed column
Change assignment of one or more packages with a single action
View progress of the ownership transfer activity
Usage
Run ContentOwnershipTool.exe to start the tool. Local administrator permissions on the computer aren't
required to run the tool.
There are no command-line parameters.
IMPORTANT
This tool changes the ownership of an orphaned package. The package itself doesn't move from the distribution point
that it's stored on. This ownership change doesn't cause the package to update on distribution points. It also doesn't
cause clients to reevaluate policy for deployment of the package. After the ownership changes, make sure that the new
site server can access the source files. It should have at least Read permissions to the source files of each package.
See also
Fundamental concepts for content management
The content library
Extend and migrate an on-premises site to
Microsoft Azure
2/16/2022 • 6 minutes to read • Edit Online
Prerequisites
An Azure subscription
Starting in version 2010, it supports environments with virtual networks other than ExpressRoute. In
version 2006 and earlier, it requires an Azure virtual network with ExpressRoute gateway.
Starting in version 2010, you can use the tool in a hierarchy or a standalone primary site. In version 2006
and earlier, it only works with a standalone primary site.
Starting in version 2010, it supports a site with a collocated site database. In version 2006 and earlier, it
requires the database to be on a remote SQL Server.
Your user account needs to be a Configuration Manager Full Administrator and have administrator
rights on the primary site server.
To add a site server in passive mode, the site server must meet the high availability requirements. For
example, it requires a remote content library.
Required Azure permissions
You'll need the following permissions in Azure when you run the tool:
Microsoft.Resources/subscriptions/resourceGroups/read
Microsoft.Resources/subscriptions/resourceGroups/write
Microsoft.Resources/deployments/read
Microsoft.Resources/deployments/write
Microsoft.Resources/deployments/validate/action
Microsoft.Compute/virtualMachines/extensions/read
Microsoft.Compute/virtualMachines/extensions/write
Microsoft.Compute/virtualMachines/read
Microsoft.Compute/virtualMachines/write
Microsoft.Network/virtualNetworks/read
Microsoft.Network/virtualNetworks/subnets/read
Microsoft.Network/virtualNetworks/subnets/join/action
Microsoft.Network/networkInterfaces/read
Microsoft.Network/networkInterfaces/write
Microsoft.Network/networkInterfaces/join/action
Microsoft.Network/networkSecurityGroups/write
Microsoft.Network/networkSecurityGroups/read
Microsoft.Network/networkSecurityGroups/join/action
Microsoft.Storage/storageAccounts/write
Microsoft.Storage/storageAccounts/read
Microsoft.Storage/storageAccounts/listkeys/action
Microsoft.Storage/storageAccounts/listServiceSas/action
Microsoft.Storage/storageAccounts/blobServices/containers/write
Microsoft.Storage/storageAccounts/blobServices/containers/read
Microsoft.KeyVault/vaults/deploy/action
Microsoft.KeyVault/vaults/read
For more information about permissions and assigning roles, see Add or remove Azure role assignments using
the Azure portal.
Virtual network support
Starting in version 2010, to support other virtual networks other than ExpressRoute, make the following
configurations:
In the configuration of the virtual network, go to the DNS ser vers settings. Add a Custom DNS server
with the IP address of a domain controller.
On the site server where you'll run the tool, set the following registry value:
HKCU\Software\Microsoft\ConfigMgr10\ExtendToAzure, SkipVNetCheck = 1
2. Review the information on the General tab, and then switch to the Azure Information tab.
3. On the Azure Information tab, choose your Azure environment , and then Sign in .
TIP
You may need to add https://*.microsoft.com to your trusted websites list to correctly sign in.
4. After you sign in, select your Subscription ID and Vir tual network .
NOTE
In version 2006 and earlier, the tool only lists networks with an ExpressRoute gateway.
Operating system Read only. The tool uses Windows Server 2019.
NAME DESC RIP T IO N
Disk type Read only. The tool uses Premium SSD for best
performance.
Machine name Enter the name of the passive site server VM in Azure.
It's the same name shown in the Azure portal.
Local admin username Enter the name of the local administrative user that the
Azure VM creates before it joins the domain.
Local admin password The password of the local administrative user. To protect
the password during Azure deployment, store the
password as a secret in Azure Key Vault. Then, use the
reference here. If needed, create a new one from the
Azure portal.
Domain FQDN The fully qualified domain name for the Active Directory
domain to join. By default, the tool gets this value from
your current machine.
Domain username The name of the domain user allowed to join the
domain. By default, the tool uses the name of the
currently signed in user.
Domain password The password of the domain user to join the domain.
The tool verifies it after you select Star t . To protect the
password during Azure deployment, store the password
as a secret in Azure Key Vault. Then, use the reference
here. If needed, create a new one from the Azure portal.
Domain DNS IP Used for joining the domain. By default, the tool uses the
current DNS from your current machine.
IMPORTANT
By default the virtual machines are set to No for Use existing Windows Ser ver license . If you want to utilize
your on-premises Windows Server licenses with Software Assurance, configure this setting in the Azure portal
after the virtual machines are provisioned. For more information, see Azure Hybrid Benefit for Windows Server.
3. To start provisioning the Azure VM, select Star t . To monitor the deployment status, switch to the
Deployments in Azure tab in the tool. To get the latest status, select Refresh deployment status .
TIP
You can also use the Azure portal to check the status, find errors, and determine potential fixes.
4. When the deployment finishes, go to your SQL Servers, and grant permissions for the new Azure VM. For
more information, see Site server high availability - Prerequisites.
5. To add the Azure VM as a site server in passive mode, select Add site ser ver in passive mode .
6. Once the site adds the site server in passive mode, the Site Ser ver High Availability tab shows the
status.
Site database
The tool doesn't currently have any tasks to migrate the database from on-premises to Azure. You can choose to
move the database from an on-premises SQL Server to an Azure SQL Server VM. The tool lists the following
articles on the Site Database tab to help:
Backup and restore the database
Configure a SQL Server Always On availability group and allow the data to replicate
Migrate a SQL Server database to an Azure SQL Server VM
TIP
You can also use the Azure portal to check the status, find errors, and determine potential fixes.
Deployments in Azure
1. Once Azure creates the VM, switch to the Deployments in Azure tab in the tool. Select Deploy to
configure the role with the default settings.
2. Select Run to start the PowerShell script.
3. Repeat this process to configure more roles.
Next steps
Review your changes in the Azure portal
Role-based administration and auditing tool
2/16/2022 • 2 minutes to read • Edit Online
Requirements
Run it on the same computer as the Configuration Manager site server
You have the Full Administrator , Read-only Analyst , or Security Administrator role
Assign your account to the All security scope and all collections
(Optional) To analyze report folder security, you need SQL Server access
(Optional) To analyze report drill-through, run this tool on the site system server with the reporting
services point role
Procedures
Model permissions for a new role
Use the following procedure to model permissions for a new role that you want to create:
1. Run RBAViewer.exe .
2. Select the base security roles you want to build on, or start from an empty permission set. Select the
necessary permissions.
3. Select Analyze to see the user interface this custom role will see.
NOTE
To see whether there's an existing security role that meets your requirements, switch to the Similarity tab.
4. Select Expor t to save the role as an XML file. Then import it to the Configuration Manager console. For
more information, see Create custom security roles.
Audit existing security scopes
Use the following procedure to audit all existing administrative users, collections, and security scopes in
Configuration Manager:
1. Run RBAViewer.exe .
2. Select the Audit RBA button in the toolbar.
a. To view the collection-limited relationships in a tree view, switch to the Collection Summar y tab.
b. To view objects assigned to a security role, switch to the Scope Summar y tab.
Audit a specific user
Use the following procedure to audit the role-based administration configuration for a specific user:
1. Run RBAViewer.exe .
2. Select the Run As button in the toolbar.
3. Input the specific user name to check the permissions for that account.
4. The tool displays the security roles assigned to the user or the security group the user belongs to. It also
displays the objects this user can see and the actions they can take in the console.
See also
Fundamentals of role-based administration
Configure role-based administration
Run Meter Summarization Tool
2/16/2022 • 2 minutes to read • Edit Online
Usage
Command Line
runmetersumm [sms database name] <delay in hours for summarization <default=0>>
Options
Database name
The name of the site database on the SQL Server.
Delay in hours for summarization
The tool summarizes the software metering usage generated before the delay. By default, this delay is zero.
Example
Summarize the software metering usage generated 12 hours ago
runmetersumm CCM_ABC <12>
See also
Maintenance tasks
Monitor app usage with software metering
Settings to manage high-risk deployments for
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
WARNING
If you use PXE deployments, and configure device hardware with the network adapter as the first boot device, these
devices can automatically start an OS deployment task sequence without user interaction. Deployment verification doesn't
manage this configuration. While this configuration may simplify the process and reduce user interaction, it puts the
device at greater risk for accidental reimage.
Next steps
Manage task sequences - high-impact settings
Configure sites and hierarchies
Client installation methods in Configuration
Manager
2/16/2022 • 3 minutes to read • Edit Online
Manual installation
Suppor ted client platform : Windows, macOS X
Advantages
Doesn't require computers to be discovered before the client can be installed.
Can be useful for testing purposes.
Supports using command-line properties for CCMSetup.
Disadvantages
No automation, therefore time consuming.
For more information about how to manually install the client on each of platform, see the following articles:
How to deploy clients to Windows computers
How to deploy clients to Macs
NOTE
The software version numbers shown in this article only list the minimum version numbers required.
Use the following information to determine the prerequisites for when you install the Configuration Manager
client on Windows devices.
C O M P O N EN T DESC RIP T IO N
Windows Installer Required to support the use of Windows Installer files for
applications and software updates.
Background Intelligent Transfer Service (BITS) Required to allow throttled data transfers between the client
computer and Configuration Manager site systems.
Remote Differential Compression (RDC) Required to optimize data transmission over the network.
SHA-2 code signing support Clients require support for the SHA-2 code signing
algorithm. For more information, see SHA-2 code signing
support.
TIP
If you don't use automatic client update, and update clients with another mechanism, make sure to update the version of
ccmsetup. An older version of ccmsetup may not properly validate the new SHA-2 code signing certificate on client
binaries. For example, if you copy ccmsetup.exe to a file share, or use ccmsetup.msi with group policy.
The following client update mechanisms aren't affected:
Client push installation: It uses the client package from the site.
Software update-based installation: The site update republishes to WSUS.
Intune MDM-managed Windows devices: The supported version for this mechanism already supports SHA-2 code
signing, but it's still important to use the latest ccmsetup.msi.
C O M P O N EN T DESC RIP T IO N
Microsoft Visual C++ 2015-2019 Redistributable version (Version 2107 and later) Required to support client
14.28.29914.0 ( vcredist_x*.exe ) operations. When you install this update on client
computers, it might require a restart to complete the
installation.
Microsoft Visual C++ 2013 Redistributable version (Version 2103 and earlier) Required to support client
12.0.40660.0 ( vcredist_x*.exe ) operations. When you install this update on client
computers, it might require a restart to complete the
installation.
Windows Imaging APIs 6.0.6001.18000 or later ( Required to allow Configuration Manager to manage
wimgapi.msi ) Windows image (.wim) files.
Microsoft Policy Platform 1.2.3514.0 or later ( Required to allow clients to evaluate compliance settings.
MicrosoftPolicyPlatformSetup.msi )
Microsoft .NET Framework version 4.6.2 or later ( Version 2107 and later: Required to support client
NDP462-KB3151800-x86-x64-AllOS-ENU.exe ) operations. Automatically installed on the computer if it
doesn't have this version installed. For more information, see
More details about Microsoft .NET.
Microsoft .NET Framework version 4.5.2 or later ( Version 2103 and earlier: Required to support client
NDP452-KB2901907-x86-x64-AllOS-ENU.exe ) operations. Automatically installed on the computer if it
doesn't have this version installed. For more information, see
More details about Microsoft .NET.
Microsoft SQL Server Compact Edition (CE) 4.0 SP1 Required to store information related to client operations.
components
C O M P O N EN T DESC RIP T IO N
Microsoft Monitoring Agent version 10.20.18053.0 ( Installed as needed by devices that you onboard to
MMASetup-*.exe ) Microsoft Defender for Endpoint.
Microsoft WebView2 ( Installed as needed when you use Software Center custom
Microsoft.WebView2.FixedVersionRuntime.x86.cab ) tabs.
NOTE
.NET Framework version 4.6.2 is preinstalled with Windows Server 2016 and Windows 10 version 1607. Later versions of
Windows are preinstalled with a later version of the .NET Framework.
.NET Framework version 4.8 isn't supported on some OS versions, such as Windows 10 2015 LTSB.
For more information, see .NET Framework system requirements.
Whether you update .NET before updating the Configuration Manager client, or CCMSetup updates it, .NET may
require a restart to complete its installation. CCMSetup suppresses a restart if necessary. The user sees a
Restar t required notice in the Windows notification area.
IMPORTANT
When the Configuration Manager client updates to version 2111 or later, client notifications are dependent upon .NET
4.6.2 or later. Until you update .NET to version 4.6.2 or later, and restart the device, users won't see notifications from
Configuration Manager. Other client-side functionality may be affected until the device is updated and restarted.
The following scenarios are common reasons why .NET requires the computer to restart:
.NET applications or services are running on the computer.
One or more software updates required for .NET installation are missing.
The computer is pending a restart from prior installation of .NET framework software updates.
After .NET Framework is installed, it may require other updates. These updates may also require the computer to
restart.
If you need to manage the device restarts before you update the Configuration Manager client, use the
following recommended process:
1. Install the latest baseline .NET version. For example, starting in version 2107, install .NET version 4.8.
2. Restart the device.
3. Scan for software updates and install the latest .NET cumulative update.
4. Restart the device.
5. Install the latest Configuration Manager client version.
K n o w n i ssu e w i t h .N E T v e r si o n 4 .6 .2 o n W i n d o w s Se r v e r 2 0 0 8 SP 2
The release of .NET version 4.6.2 that Configuration Manager redistributes doesn't install on Windows Server
2008 SP2. This version of the OS is covered under the Extended Security Updates (ESU) program. While
products under this program are no longer supported for use with Configuration Manager, you can use the
latest released version of Configuration Manager current branch to deploy and install Windows security updates
released under the ESU program.
Microsoft recommends updating the OS to a later version that's fully supported. If your business requirements
necessitate use of this OS version, download the latest release of .NET version 4.6.2 published on 6/23/2021 or
later. For more information, see The .NET Framework 4.6.2 offline installer for Windows. This .NET release does
install on Server 2008 SP2. Manually update .NET on devices with this OS version before you update the
Configuration Manager client to version 2107.
C O M P O N EN T DESC RIP T IO N
Fallback status point The fallback status point is an optional, but recommended
site system role for client deployment. The fallback status
point tracks client deployment and enables computers in the
Configuration Manager site to send state messages when
they can't communicate with a management point.
Manual installation
To download the source files, the client computer needs to communicate with a distribution point or a
management point. Unless you specified CCMSetup.exe with the following command-line parameter:
ccmsetup /source
Firewall requirements
If there's a firewall between the site system servers and the computers onto which you want to install the
Configuration Manager client, see Windows Firewall and port settings for clients.
Next steps
Windows firewall and port settings for clients
Prerequisites for deploying clients to mobile devices
Prerequisites for deploying clients to mobile devices
in Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
IMPORTANT
On-premises MDM and the Configuration Manager client for macOS are both deprecated.
Migrate management of macOS and mobile devices to Microsoft Intune. For more information, see Supported clients and
devices.
Deploying Configuration Manager clients in your environment has the following external dependencies and
dependencies within the product.
For more information on the minimum hardware and OS requirements for the Configuration Manager client,
see Supported configurations.
NOTE
The software version numbers shown in this article only list the minimum version numbers required.
When you install the Configuration Manager client on mobile devices and enroll them, use this information to
determine the prerequisites.
Firewall requirements
Intervening network devices such as routers and firewalls, and Windows Firewall if applicable, must allow the
traffic associated with mobile device enrollment.
Between mobile devices and the enrollment proxy point: HTTPS (by default, TCP 443)
Between the enrollment proxy point and the enrollment point: HTTPS (by default, TCP 443)
If you use a proxy web server, configure it for SSL tunneling. SSL bridging isn't supported for mobile devices.
Next steps
Windows firewall and port settings for clients
Windows Firewall and port settings for clients in
Configuration Manager
2/16/2022 • 8 minutes to read • Edit Online
IMPORTANT
These are default port numbers that can be changed in Configuration Manager. For more information, see How to How to
configure client communication ports. If these ports have been changed from the default values, you must also configure
matching exceptions on the Windows Firewall.
Client Notification
For the management point to notify client computers about an action that it must take when an administrative
user selects a client action in the Configuration Manager console, such as download computer policy or initiate a
malware scan, add the following as an exception to the Windows Firewall:
Outbound: TCP Port 10123
If this communication does not succeed, Configuration Manager automatically falls back to using the existing
client-to-management point communication port of HTTP, or HTTPS:
Outbound: TCP Port 80 (for HTTP communication)
Outbound: TCP Port 443 (for HTTPS communication)
IMPORTANT
These are default port numbers that can be changed in Configuration Manager. For more information, see How to
configure client communication ports. If these ports have been changed from the default values, you must also configure
matching exceptions on the Windows Firewall.
Remote Control
To use Configuration Manager remote control, allow the following port:
Inbound: TCP Port 2701
Remote Assistance and Remote Desktop
To initiate Remote Assistance from the Configuration Manager console, add the custom program Helpsvc.exe
and the inbound custom port TCP 135 to the list of permitted programs and services in Windows Firewall on
the client computer. You must also permit Remote Assistance and Remote Desktop . If you initiate Remote
Assistance from the client computer, Windows Firewall automatically configures and permits Remote
Assistance and Remote Desktop .
Wake -Up Proxy
If you enable the wake-up proxy client setting, a new service named ConfigMgr Wake-up Proxy uses a peer-to-
peer protocol to check whether other computers are awake on the subnet and to wake them up if necessary.
This communication uses the following ports:
Outbound: UDP Port 25536
Outbound: UDP Port 9
These are the default port numbers that can be changed in Configuration Manager by using the Power
Management clients settings of Wake-up proxy por t number (UDP) and Wake On L AN por t number
(UDP) . If you specify the Power Management : Windows Firewall exception for wake-up proxy client
setting, these ports are automatically configured in Windows Firewall for clients. However, if clients run a
different firewall, you must manually configure the exceptions for these port numbers.
In addition to these ports, wake-up proxy also uses Internet Control Message Protocol (ICMP) echo request
messages from one client computer to another client computer. This communication is used to confirm whether
the other client computer is awake on the network. ICMP is sometimes referred to as TCP/IP ping commands.
For more information about wake-up proxy, see Plan how to wake up clients.
Windows Event Viewer, Windows Performance Monitor, and Windows Diagnostics
To access Windows Event Viewer, Windows Performance Monitor, and Windows Diagnostics from the
Configuration Manager console, enable File and Printer Sharing as an exception on the Windows Firewall.
IMPORTANT
If there is a firewall between the site system servers and the client computer, confirm whether the firewall permits traffic
for the ports that are required for the client installation method that you choose. For example, firewalls often prevent
client push installation from succeeding because they block Server Message Block (SMB) and Remote Procedure Calls
(RPC). In this scenario, use a different client installation method, such as manual installation (running CCMSetup.exe) or
Group Policy-based client installation. These alternative client installation methods do not require SMB or RPC.
For information about how to configure Windows Firewall on the client computer, see Modifying the Ports and
Programs Permitted by Windows Firewall.
Ports that are used for all installation methods
DESC RIP T IO N UDP TC P
Ports that are used with manual installation and logon script-based installation
DESC RIP T IO N UDP TC P
Notes
1 Alternate Por t Available In Configuration Manager, you can define an alternate port for this value. If a
custom port has been defined, substitute that custom port when you define the IP filter information for IPsec
policies or for configuring firewalls.
2 Windows Ser ver Update Ser vices You can install Windows Server Update Service (WSUS) either on the
default Web site (port 80) or a custom Web site (port 8530).
After installation, you can change the port. You do not have to use the same port number throughout the site
hierarchy.
If the HTTP port is 80, the HTTPS port must be 443.
If the HTTP port is anything else, the HTTPS port must be 1 higher. For example, 8530 and 8531.
Determine the site system roles for Configuration
Manager clients
2/16/2022 • 4 minutes to read • Edit Online
Management point
By default, all Windows client computers use a distribution point to install the Configuration Manager client.
They can fall back to a management point when a distribution point is unavailable. However, you can install
Windows clients on computers from an alternative source when you use the CCMSetup command-line property
/source:<Path> . For example, you might do this action if you install clients on the internet. Another scenario is
when you want to avoid sending network packets between the computer and the management point during
client installation. This scenario is because a firewall blocks the required ports or because you have a low-
bandwidth connection. However, all clients must communicate with a management point to assign to a site and
to be managed by Configuration Manager.
For more information about client command-line properties, see About client installation properties.
When you install more than one management point in the hierarchy, clients automatically connect to one point
based on their forest membership and network location. You can't install more than one management point in a
secondary site.
Mac computer clients and mobile device clients that you enroll with Configuration Manager always require a
management point for client installation. This management point must be in a primary site, must be configured
to support mobile devices, and must accept client connections from the Internet. These clients can't use
management points in secondary sites or connect to management points in other primary sites.
Distribution point
You don't need a distribution point to install Configuration Manager clients on Windows computers. By default,
Configuration Manager uses a distribution point to install the client source files on Windows computers. It can
fall back to downloading these files from a management point. Distribution points aren't used to install mobile
device clients that are enrolled by Configuration Manager, but are used if you install the mobile device legacy
client. If you install the Configuration Manager client as part of an OS deployment, the OS image is stored and
retrieved from a distribution point.
Although you might not need distribution points to install most Configuration Manager clients, you'll need them
to install software such as applications and software updates on the clients.
Configuration Manager requires the enrollment point and the enrollment proxy point to enroll mobile devices
and to enroll certificates for Mac computers. You don't need these site system roles in the following situations:
You plan to manage mobile devices by using the Exchange Server connector
You install the mobile device legacy client
You request and install the client certificate on Mac computers independently from Configuration Manager
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
Automatically approve client computers from trusted domains and manually check and approve other
computers
When you can't use PKI authentication, approval identifies a computer that you trust to be managed by
Configuration Manager. The hierarchy has the following options to configure client approval:
Manual
Automatic for computers in trusted domains
Automatic for all computers
The most secure approval method is to automatically approve clients that are members of trusted domains. This
option includes cloud-domain joined clients from connected Azure Active Directory (Azure AD) tenants. Then
manually check and approve all other computers. Automatically approving all clients isn't recommended, unless
you have other access controls to prevent untrustworthy computers from accessing your network.
For more information about how to manually approve computers, see Manage clients from the devices node.
Don't rely on blocking to prevent clients from accessing the Configuration Manager hierarchy
Blocked clients are rejected by the Configuration Manager infrastructure. If clients are blocked, they can't
communicate with site systems to download policy, upload inventory data, or send state or status messages.
Blocking is designed for the following scenarios:
To block lost or compromised boot media when you deploy an OS to clients
When all site systems accept HTTPS client connections
When site systems accept HTTP client connections, don't rely on blocking to protect the Configuration Manager
hierarchy from untrusted computers. In this scenario, a blocked client could rejoin the site with a new self-signed
certificate and hardware ID.
Certificate revocation is the primary line of defense against potentially compromised certificates. A certificate
revocation list (CRL) is only available from a supported public key infrastructure (PKI). Blocking clients in
Configuration Manager offers a second line of defense to protect your hierarchy.
For more information, see Determine whether to block clients.
Use the most secure client installation methods that are practical for your environment
For domain computers, group policy client installation and software update-based client installation
methods are more secure than client push installation.
If you apply access controls and change controls, use imaging and manual installation methods.
Use Kerberos mutual authentication with client push installation.
Of all the client installation methods, client push installation is the least secure because of the many
dependencies it has. These dependencies include local administrative permissions, the Admin$ share, and
firewall exceptions. The number and type of these dependencies increase your attack surface.
When using client push, the site can require Kerberos mutual authentication by not allowing fallback to NTLM
before establishing the connection. This enhancement helps to secure the communication between the server
and the client. For more information, see How to install clients with client push.
For more information about the different client installation methods, see Client installation methods.
Wherever possible, select a client installation method that requires the least security permissions in
Configuration Manager. Restrict the administrative users that are assigned security roles with permissions that
can be used for purposes other than client deployment. For example, configuring automatic client upgrade
requires the Full Administrator security role, which grants an administrative user all security permissions.
For more information about the dependencies and security permissions required for each client installation
method, see Prerequisites for computer clients.
If you must use client push installation, secure the client push installation account
The client push installation account must be a member of the local Administrators group on each computer
that installs the Configuration Manager client. Never add the client push installation account to the Domain
Admins group. Instead, create a global group, and then add that global group to the local Administrators
group on your clients. Create a group policy object to add a Restricted Group setting to add the client push
installation account to the local Administrators group.
For greater security, create multiple client push installation accounts, each with administrative access to a limited
number of computers. If one account is compromised, only the client computers to which that account has
access are compromised.
Remove certificates before imaging clients
When you deploy clients by using OS images, always remove certificates before capturing the image. These
certificates include PKI certificates for client authentication, and self-signed certificates. If you don't remove
these certificates, clients might impersonate each other. You can't verify the data for each client.
For more information, see Create a task sequence to capture an OS.
Make sure that Configuration Manager client gets an authorized copy of certificates
The Configuration Manager trusted root key certificate
When both of the following statements are true, clients rely on the Configuration Manager trusted root key to
authenticate valid management points:
You haven't extended the Active Directory schema for Configuration Manager
Clients don't use PKI certificates when they communicate with management points
In this scenario, clients have no way to verify that the management point is trusted for the hierarchy unless they
use the trusted root key. Without the trusted root key, a skilled attacker could direct clients to a rogue
management point.
When clients don't use PKI certificates and can't download the trusted root key from the Active Directory global
catalog, pre-provision the clients with the trusted root key. This action makes sure that they can't be directed to a
rogue management point. For more information, see Planning for the trusted root key.
The site server signing certificate
Clients use the site server signing certificate to verify that the site server signed the policy downloaded from a
management point. This certificate is self-signed by the site server and published to Active Directory Domain
Services.
When clients can't download this certificate from the Active Directory global catalog, by default they download it
from the management point. If the management point is exposed to an untrusted network like the internet,
manually install the site server signing certificate on clients. This action makes sure that they can't download
tampered client policies from a compromised management point.
To manually install the site server signing certificate, use the CCMSetup client.msi property SMSSIGNCERT.
If the client downloads the trusted root key from the first management point it contacts, don't use automatic
site assignment
To avoid the risk of a new client downloading the trusted root key from a rogue management point, only use
automatic site assignment in the following scenarios:
The client can access Configuration Manager site information that's published to Active Directory Domain
Services.
You pre-provision the client with the trusted root key.
You use PKI certificates from an enterprise certification authority to establish trust between the client and
the management point.
For more information about the trusted root key, see Planning for the trusted root key.
Make sure that maintenance windows are large enough to deploy critical software updates
Maintenance windows for device collections restrict the times that Configuration Manager can install software
on these devices. If you configure the maintenance window to be too small, the client may not install critical
software updates. This behavior leaves the client vulnerable to any attack that the software update mitigates.
Take security precautions to reduce the attack surface on Windows Embedded devices with write filters
When you enable write filters on Windows Embedded devices, any software installations or changes are only
made to the overlay. These changes don't persist after the device restarts. If you use Configuration Manager to
disable the write filters, during this period the embedded device is vulnerable to changes to all volumes. These
volumes include shared folders.
Configuration Manager locks the computer during this period so that only local administrators can sign in.
Whenever possible, take other security precautions to help protect the computer. For example, enable
restrictions on the firewall.
If you use maintenance windows to persist changes, plan these windows carefully. Minimize the time that write
filters are disabled, but make them long enough to allow software installations and restarts to complete.
Use the latest client version with software update -based client installation
If you use software update-based client installation, and install a later version of the client on the site, update the
published software update. Then clients receive the latest version from the software update point.
When you update the site, the software update for client deployment that's published to the software update
point isn't automatically updated. Republish the Configuration Manager client to the software update point and
update the version number.
For more information, see How to install Configuration Manager clients by using software update-based
installation.
Only suspend BitLocker PIN entry on trusted and restricted-access devices
Only configure the client setting to Suspend BitLocker PIN entr y on restar t to Always for computers that
you trust and that have restricted physical access.
When you set this client setting to Always , Configuration Manager can complete the installation of software.
This behavior helps install critical software updates and resume services. If an attacker intercepts the restart
process, they could take control of the computer. Use this setting only when you trust the computer, and when
physical access to the computer is restricted. For example, this setting might be appropriate for servers in a data
center.
For more information on this client setting, see About client settings.
Don't bypass PowerShell execution policy
If you configure the Configuration Manager client setting for PowerShell execution policy to Bypass , then
Windows allows unsigned PowerShell scripts to run. This behavior could allow malware to run on client
computers. When your organization requires this option, use a custom client setting. Assign it to only the client
computers that must run unsigned PowerShell scripts.
For more information on this client setting, see About client settings.
3. In the Keychain Access dialog box, in the Keychains section, select System . Then in the Categor y
section, select Cer tificates .
4. Locate and open the root CA certificate for the Mac client certificate.
5. In the dialog box for the root CA certificate, expand the Trust section, and then make the following
changes:
a. When using this cer tificate : Change the Always Trust setting to Use System Defaults .
b. Secure Sockets Layer (SSL) : Change no value specified to Always Trust .
6. Close the dialog box. When prompted, enter the administrator's password, and then select Update
Settings .
After you complete this procedure, the root certificate is only trusted to validate the SSL protocol. Other
protocols that are now untrusted with this root certificate include Secure Mail (S/MIME), Extensible
Authentication (EAP), or code signing.
NOTE
Also use this procedure if you installed the client certificate independently from Configuration Manager.
Planning
Use a phased rollout to manage CPU usage
To minimize the effect of the CPU processing requirements on the site server, use a phased rollout of clients.
Deploy clients outside of business hours. This practice allows other services to have more available bandwidth
during the day. It also doesn't disrupt user productivity if their computer slows down or requires a restart.
Prepare required PKI certificates in advance
PKI certificates enable the following scenarios:
HTTPS-enabled client communication
Manage devices on the internet
Enroll mobile devices for on-premises MDM
Enroll macOS devices
You need certificates on certain site systems and the client devices. The most common site systems are
management points and distribution points. On production networks, you might require change management
approval to use new certificates or restart site system servers. Users may also need to sign out of Windows to
get new group membership. Make sure to allow sufficient time for replication of security permissions and new
certificate templates.
For more information, see PKI certificate requirements.
Installation
If you install the client with client.msi properties, use SMSMP and FSP
The SMSMP property specifies the initial management point for the client. It removes the dependency on
service location solutions such as Active Directory Domain Services and DNS.
Use the FSP property and install a fallback status point. It allows you to better monitor client installation and
assignment, and identify any communication problems.
For more information about these options, see About client installation properties.
Use software update -based client installation for Active Directory computers
This client deployment method has the following benefits:
Uses existing Windows technologies
Integrates with your Active Directory infrastructure
Requires the least configuration in Configuration Manager
Is the easiest to configure for firewalls
Is the most secure
By using security groups and WMI filtering for the group policy configuration, you also have flexibility to control
which computers install the Configuration Manager client.
For more information, see How to install Configuration Manager clients by using software update-based
installation.
Enable automatic upgrade after your main client deployment finishes
Performance improvements in Configuration Manager can allow you to use automatic upgrades as a primary
client upgrade method. However, performance will depend on your hierarchy infrastructure, such as the number
of clients.
If you use another client installation method as the primary upgrade method, use automatic client upgrade to
catch computers that it missed. For example, devices that were offline during the main deployment.
For more information, see Automatic client upgrades.
Assign site systems as clients to the same site
If you install the Configuration Manager client on site systems, assign them to the same site. Roles like the
management point and distribution point have shared binary files between the role and the client. These
collocated clients should always be the same version as the site system role.
For example, for a management point in site XYZ, assign the client installed on this site system server to site
XYZ.
IMPORTANT
For Windows computers that you plan to protect with a unified write filter (UWF), configure the device for UWF before
you install the client. This configuration enables Configuration Manager to install the client with a custom credential
provider that locks out low-rights users from signing in to the device during maintenance mode.
Next steps
How to deploy clients to Windows computers
Determine whether to block clients in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
IMPORTANT
Although blocking in Configuration Manager can help to secure the Configuration Manager site, do not rely on this
feature to protect the site from untrusted computers or mobile devices if you allow clients to communicate with site
systems by using HTTP, because a blocked client could rejoin the site with a new self-signed certificate and hardware ID.
Instead, use the blocking feature to block lost or compromised boot media that you use to deploy operating systems, and
when site systems accept HTTPS client connections.
Clients that access the site by using the ISV Proxy certificate cannot be blocked. For more information about the
ISV Proxy certificate, see the Configuration Manager Software Development Kit (SDK).
If your site systems accept HTTPS client connections and your public key infrastructure (PKI) supports a
certificate revocation list (CRL), always consider certificate revocation to be the primary line of defense against
potentially compromised certificates. Blocking clients in Configuration Manager offers a second line of defense
to protect your hierarchy.
NOTE
The same client could register with a different Configuration Manager hierarchy.
NOTE
You can further protect site systems that run IIS from unknown clients by configuring a certificate trust list (CTL)
in IIS.
Planning for client deployment to Mac computers in
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
IMPORTANT
Starting in January 2022, this feature of Configuration Manager is deprecated. For more information, see Mac computers.
You can install the Configuration Manager client on Mac computers that run macOS X and use the following
management capabilities:
Hardware inventor y
You can use Configuration Manager hardware inventory to collect information about the hardware and
installed applications on Mac computers. This information can then be viewed in Resource Explorer in the
Configuration Manager console and used to create collections, queries and reports. For more
information, see How to use Resource Explorer to view hardware inventory.
Configuration Manager collects the following hardware information from Mac computers:
Processor
Computer System
Disk Drive
Disk Partition
Network Adapter
Operating System
Service
Process
Installed Software
Computer System Product
USB Controller
USB Device
CDROM Drive
Video Controller
Desktop Monitor
Portable Battery
Physical Memory
Printer
IMPORTANT
You cannot extend the hardware information that is collected from Mac computers during hardware inventory.
Compliance settings
You can use Configuration Manager compliance settings to view the compliance of and remediate macOS
X preference (.plist) settings. For example, you could enforce settings for the home page in the Safari web
browser or ensure that the Apple firewall is enabled. You can also use shell scripts to monitor and
remediate settings in macOS X.
Application management
Configuration Manager can deploy software to Mac computers. You can deploy the following software
formats to Mac computers:
Apple disk image (.DMG)
Meta package file (.MPKG)
macOS X installer package (.PKG)
macOS X application (.APP)
When you install the Configuration Manager client on Mac computers, you cannot use the following
management capabilities that are supported by the Configuration Manager client on Windows-based
computers:
Client push installation
Operating system deployment
Software updates
NOTE
You can use Configuration Manager application management to deploy required macOS X software updates to
Mac computers. In addition, you can use compliance settings to make sure that computers have any required
software updates.
Maintenance windows
Remote control
Power management
Client status client check and remediation
For more information about how to install and configure the Configuration Manager Mac client, see How
to deploy clients to Macs.
Planning for client deployment to Windows
Embedded devices in Configuration Manager
2/16/2022 • 4 minutes to read • Edit Online
Write filters control how the operating system on the embedded device is updated when you make changes,
such as when you install software. When write filters are enabled, instead of making the changes directly to the
operating system, these changes are redirected to a temporary overlay. If the changes are only written to the
overlay, they are lost when the embedded device shuts downs. However, if the write filters are temporarily
disabled, the changes can be made permanent so that you do not have to make the changes again (or reinstall
software) every time that the embedded device restarts. However, temporarily disabling and then re-enabling
the write filters requires one or more restarts, so that you typically want to control when this happens by
configuring maintenance windows so that restarts occur outside business hours.
You can configure options to automatically disable and re-enable the write filters when you deploy software
such as applications, task sequences, software updates, and the Endpoint Protection client. The exception is for
configuration baselines with configuration items that use automatic remediation. In this scenario, the
remediation always occurs in the overlay so that it is available only until the device is restarted. The remediation
is applied again at the next evaluation cycle, but only to the overlay, which is cleared at restart. To force
Configuration Manager to commit the remediation changes, you can deploy the configuration baseline and then
another software deployment that supports committing the change as soon as possible.
If the write filters are disabled, you can install software on Windows Embedded devices by using Software
Center. However, if the write filters are enabled, the installation fails and Configuration Manager displays an
error message that you have insufficient permissions to install the application.
WARNING
Even if you do not select the Configuration Manager options to commit the changes, the changes might be committed if
another software installation or change is made that commits changes. In this scenario, the original changes will be
committed in addition to the new changes.
When Configuration Manager disables the write filters to make changes permanent, only users who have local
administrative rights can log on and use the embedded device. During this period, low-rights users are locked
out and see a message that the computer is unavailable because it is being serviced. This helps protect the
device while it is in a state where changes can be permanently applied, and this servicing mode lockout
behavior is another reason to configure a maintenance window for a time when users will not log on to these
devices.
Configuration Manager supports managing the following types of write filters:
File-Based Write Filter (FBWF) - For more information, see File-Based Write Filter.
Enhanced Write Filter (EWF) RAM - For more information, see Enhanced Write Filter.
Unified Write Filter (UWF) - For more information, see Unified Write Filter.
Configuration Manager does not support write filter operations when the Windows Embedded device is
in EWF RAM Reg mode.
IMPORTANT
If you have the choice, use File-Based Write Filters (FBWF) with Configuration Manager for increased efficiency and higher
scalability.
For devices that use FBWF only: Configure the following exceptions to persist client state and inventory data
between device restarts:
CCMINSTALLDIR\*.sdf
CCMINSTALLDIR\ServiceData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CCM\StateSystem
Devices that run Windows Embedded 8.0 and later do not support exclusions that contain wildcard characters. On
these devices, you must configure the following exclusions individually:
All files in CCMINSTALLDIR with the extension .sdf, typically:
UserAffinityStore.sdf
InventoryStore.sdf
CcmStore.sdf
StateMessageStore.sdf
CertEnrollmentStore.sdf
CCMINSTALLDIR\ServiceData
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CCM\StateSystem
For devices that use FBWF and UWF only: When clients in a workgroup use certificates for authentication to
management points, you must also exclude the private key to ensure the client continues to communicate with the
management point. On these devices, configure the following exceptions:
c:\Windows\System32\Microsoft\Protect
c:\ProgramData\Microsoft\Crypto
HKEY_LOCAL_MACHINE\Software\Microsoft\SystemCertificates\SMS\Certificates
NOTE
No additional exceptions are needed by the Configuration Manager client other than those documented in the above
Impor tant box. Adding additional Configuration Manager or WMI (WBEM) related exceptions may lead to failures of the
Configuration Manager including devices getting stuck in servicing mode or devices experiencing reboot loops. Unneeded
exceptions include the Configuration Manager client directory, the CCMcache directory, the CCMSetup directory, the Task
Sequence cache directory, the WBEM directory, and Configuration Manager related registry keys.
For an example scenario to deploy and manage write-filter-enabled Windows Embedded devices in
Configuration Manager see Example scenario for deploying and managing Configuration Manager clients on
Windows Embedded devices.
For more information about how to build images for Windows Embedded devices and configure write filters,
see your Windows Embedded documentation, or contact your OEM.
NOTE
When you select the applicable platforms for software deployments and configuration items, these display the Windows
Embedded families rather than specific versions.
Example scenario for deploying and managing
Configuration Manager clients on Windows
Embedded devices
2/16/2022 • 11 minutes to read • Edit Online
NOTE
The restarts that are required to install the Endpoint Protection client are a one-time occurrence, which happen
during the setup period for the devices and before the visitor center is operational. Unlike the periodic
deployment of applications or software definition updates, the next time the Endpoint Protection client is installed
on the same device will probably be when the company upgrades to the next version of Configuration Manager.
NOTE
Unlike software installations for applications, software update definitions for Endpoint Protection can occur
very frequently, even multiple times a day. They are often small files. For these types of security-related
deployments, it can often be beneficial to always install to the overlay rather than wait until the
maintenance window. The Configuration Manager client will quickly re-install the software definition
updates if the device restarts because this action initiates an evaluation check and does not wait until the
next scheduled evaluation.
The Admin selects the Windows Embedded devices collection for the automatic deployment rule.
For more information, see
Step 3: Configure Configuration Manager Software Updates to Deliver Definition Updates to Client
Computers in Configuring Endpoint Protection
10. The Admin decides to configure a maintenance task that periodically commits all changes on the overlay.
This task is to support the software update definitions deployment, to reduce the number of updates that
accumulate and must be installed again, each time the device restarts. In the Admin's experience, this
helps the antimalware programs run more efficiently.
NOTE
These software update definitions would be automatically committed to the image if the embedded devices ran
another management task that supported committing the changes. For example, installing a new version of the
interactive presentation software would also commit the changes for software update definitions. Or, installing
standard software updates every month that install during the maintenance window could also commit the
changes for software update definitions. However, in this scenario, where standard software updates do not run
and the interactive presentation software is unlikely to be updated very often, it might be months before the
software definition updates are automatically committed to the image.
The Admin first creates a custom task sequence that has no settings other than the name. They run the
Create Task Sequence Wizard:
a. On the Create a New Task Sequence page, the Admin selects Create a new custom task
sequence , and then clicks Next .
b. On the Task Sequence Information page, the Admin enters Maintenance task to commit
changes on embedded devices for the task sequence name, and then clicks Next .
c. On the Summar y page, the Admin selects Next , and completes the wizard.
The Admin then deploys this custom task sequence to the Windows Embedded devices collection,
and configures the schedule to run every month. As part of the deployment settings, they select
the Commit changes at deadline or during a maintenance window (requires restar ts)
check box to persist the changes after a restart. To configure this deployment, the Admin selects
the custom task sequence that they just created, and then on the Home tab, in the Deployment
group, they click Deploy to start the Deploy Software Wizard:
d. On the General page, the Admin selects the Windows Embedded devices collection, and then
clicks Next .
e. On the Deployment Settings page, the Admin selects the Purpose of Required , and then clicks
Next .
f. On the Scheduling page, the Admin clicks New to specify a weekly schedule during the
maintenance window, and then clicks Next .
g. The Admin completes the wizard without any further changes.
For more information, see
Manage task sequences to automate tasks.
11. For the kiosks to run automatically, the Admin writes a script to configure the devices for the following
settings:
Automatically log on, using a guest account that has no password.
Automatically run the interactive presentation software on startup.
The Admin uses packages and programs to deploy this script to the Windows Embedded devices
collection. When the Admin runs the Deploy Software Wizard, they again select the Commit
changes at deadline or during a maintenance window (requires restar ts) check box to
persist the changes after a restart.
For more information, see Packages and programs.
12. The following morning, the Admin checks the Windows Embedded devices. They confirm the following:
The kiosk is automatically logged on by using the guest account.
The interactive presentation software is running.
The Endpoint Protection client is installed and has the latest software update definitions.
That the device restarted during the maintenance window.
For more information, see:
How to monitor Endpoint Protection
Monitor applications with Configuration Manager
13. The Admin monitors the kiosks and reports the successful management of them to their manager. As a
result, 20 kiosks are ordered for the visitor center.
To avoid the manual installation of the Configuration Manager client, which requires manually disabling
and then enabling the write filters, the Admin ensures that the order includes a customized image that
already includes the installation and site assignment of the Configuration Manager client. In addition, the
devices are named according to the company naming format.
The kiosks are delivered to the visitor center a week before it opens. During this time, the kiosks are
connected to the network, all device management for them is automatic, and no local administrator is
required. The Admin confirms that the kiosks are functioning as required:
The clients on the kiosks complete site assignment and download the trusted root key from Active
Directory Domain Services.
The clients on the kiosks are automatically added to the Windows Embedded devices collection
and configured with the maintenance window.
The Endpoint Protection client is installed and has the latest software update definitions for
antimalware protection.
The interactive presentation software is installed and runs automatically, ready for visitors.
14. After this initial setup, any restarts that might be required for updates occur only when the visitor center
is closed.
Plan how to wake up clients in Configuration
Manager
2/16/2022 • 7 minutes to read • Edit Online
NOTE
This article describes how an older version of Wake on LAN functions. This functionality still exists in Configuration
Manager version 1810, which also includes a newer version of Wake on LAN too. Both versions of Wake on LAN can, and
in many cases will, be enabled simultaneously. For more information about how the new version of Wake on LAN
functions starting in 1810 and enabling either or both versions, see How to configure Wake on LAN.
WARNING
During this process, the IP-to-MAC mapping for the sleeping computer remains the same. Wake-up proxy works
by informing the network switch that a different network adapter is using the port that was registered by another
network adapter. However, this behavior is known as a MAC flap and is unusual for standard network operation.
Some network monitoring tools look for this behavior and can assume that something is wrong. Consequently,
these monitoring tools can generate alerts or shut down ports when you use wake-up proxy.
Do not use wake-up proxy if your network monitoring tools and services do not allow MAC flaps.
4. When a manager computer sees a new TCP connection request for a sleeping computer and the request
is to a port that the sleeping computer was listening on before it went to sleep, the manager computer
sends a wake-up packet to the sleeping computer, and then stops redirecting traffic for this computer.
5. The sleeping computer receives the wake-up packet and wakes up. The sending computer automatically
retries the connection and this time, the computer is awake and can respond.
Wake-up proxy has the following prerequisites and limitations:
IMPORTANT
If you have a separate team that is responsible for the network infrastructure and network services, notify and include this
team during your evaluation and testing period. For example, on a network that uses 802.1X network access control,
wake-up proxy will not work and can disrupt the network service. In addition, wake-up proxy could cause some network
monitoring tools to generate alerts when the tools detect the traffic to wake-up other computers.
All Windows operating systems listed as supported clients in Supported operating systems for clients
and devices are supported for Wake On LAN.
Guest operating systems that run on a virtual machine are not supported.
Clients must be enabled for wake-up proxy by using client settings. Although wake-up proxy operation
does not depend on hardware inventory, clients do not report the installation of the wake-up proxy
service unless they are enabled for hardware inventory and submitted at least one hardware inventory.
Network adapters (and possibly the BIOS) must be enabled and configured for wake-up packets. If the
network adapter is not configured for wake-up packets or this setting is disabled, Configuration Manager
will automatically configure and enable it for a computer when it receives the client setting to enable
wake-up proxy.
If a computer has more than one network adapter, you cannot configure which adapter to use for wake-
up proxy; the choice is non-deterministic. However, the adapter chosen is recorded in the
SleepAgent_<DOMAIN>@SYSTEM_0.log file.
The network must allow ICMP echo requests (at least within the subnet). You cannot configure the five-
second interval that is used to send the ICMP ping commands.
Communication is unencrypted and unauthenticated, and IPsec is not supported.
The following network configurations are not supported:
802.1X with port authentication
Wireless networks
Network switches that bind MAC addresses to specific ports
IPv6-only networks
DHCP lease durations less than 24 hours
If you want to wake up computers for scheduled software installation, you must configure each primary site to
use wake-up packets.
To use wake-up proxy, you must deploy Power Management wake-up proxy client settings in addition to
configuring the primary site.
Decide whether to use subnet-directed broadcast packets, or unicast packets, and what UDP port number to use.
By default, traditional wake-up packets are transmitted by using UDP port 9, but to help increase security, you
can select an alternative port for the site if this alternative port is supported by intervening routers and firewalls.
Unicast More secure solution than subnet- Wake-up packets do not find
directed broadcasts because the destination computers that have
packet is sent directly to a computer changed their subnet address after the
instead of to all computers on a last hardware inventory schedule.
subnet.
Switches might have to be configured
Might not require reconfiguration of to forward UDP packets.
routers (you might have to configure
the ARP cache). Some network adapters might not
respond to wake-up packets in all
Consumes less network bandwidth sleep states when they use unicast as
than subnet-directed broadcast the transmission method.
transmissions.
Subnet-Directed Broadcast Higher success rate than unicast if you Less secure solution than using unicast
have computers that frequently because an attacker could send
change their IP address in the same continuous streams of ICMP echo
subnet. requests from a falsified source
address to the directed broadcast
No switch reconfiguration is required. address. This causes all of the hosts to
reply to that source address. If routers
High compatibility rate with computer are configured to allow subnet-
adapters for all sleep states, because directed broadcasts, the additional
subnet-directed broadcasts were the configuration is recommended for
original transmission method for security reasons:
sending wake-up packets.
- Configure routers to allow only IP-
directed broadcasts from the
Configuration Manager site server, by
using a specified UDP port number.
- Configure Configuration Manager to
use the specified non-default port
number.
WARNING
There are security risks associated with subnet-directed broadcasts: An attacker could send continuous streams of
Internet Control Message Protocol (ICMP) echo requests from a falsified source address to the directed broadcast
address, which cause all the hosts to reply to that source address. This type of denial of service attack is commonly called
a smurf attack and is typically mitigated by not enabling subnet-directed broadcasts.
Manage Configuration Manager clients in a virtual
desktop infrastructure (VDI)
2/16/2022 • 2 minutes to read • Edit Online
Personal VMs
Configuration Manager treats personal VMs the same as a physical computer. You can preinstall the
Configuration Manager client on the VM image or after you provision it.
For more information, see Support for virtualization environments.
Pooled VMs/Non-Persistent
When you decommission a pooled virtual machine, any changes made by Configuration Manager are lost.
Because the VM might only be operational for a short length of time, some Configuration Manager features
may not return relevant data. For example, hardware inventory, software inventory, and software metering.
Consider excluding pooled VM from inventory tasks.
Other considerations
Because virtualization supports running multiple Configuration Manager clients on the same physical computer,
many client operations have a built-in randomized delay for scheduled actions. For example, hardware and
software inventory, antimalware scans, software installations, and software update scans. This delay helps
distribute the CPU processing and data transfer for a server that has multiple VMs that run the Configuration
Manager client.
Except for Windows Embedded clients in servicing mode, Configuration Manager clients not in virtualized
environments also use this randomized delay. This behavior helps avoid peaks in network bandwidth. It also
reduces the CPU processing on site systems, such as the management point and site server. The delay interval
varies according to the Configuration Manager capability. For example, see About client settings - Disable
deadline randomization.
To help with Configuration Manager client performance in virtual environments that support multiple user
sessions, it disables user policy by default. Starting in version 1910, you can enable user policy in this scenario.
For more information, see About client settings - Enable user policy for multiple user sessions.
How to configure client communication ports in
Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
IMPORTANT
Don't change the port numbers in Configuration Manager without understanding the consequences. For example:
If you change the port numbers for the client request services as a site configuration, and existing clients aren't
reconfigured to use the new port numbers, these clients will be unmanaged.
Before you configure a non-default port number, make sure that firewalls and all intervening network devices support
this configuration. If you will manage clients on the internet, and change the default HTTPS port number of 443,
routers and firewalls on the internet might block this communication.
To make sure that clients don't become unmanaged after you change the request port numbers, configure
clients to use the new request port numbers. When you change the request ports on a primary site, any
attached secondary sites automatically inherit the same port configuration.
IMPORTANT
For existing and new clients that are currently on the internet, configure the non-default port numbers by using the
CCMSetup.exe client.msi properties of CCMHTTPPORT and CCMHTTPSPORT .
After changing the request ports on the site, when you install new clients with the site-wide client push
installation method, they're automatically configured with the current port numbers for the site.
6. Specify the port number and description for the item, and then select OK .
7. If you want to use the custom website SMSWeb for site systems that run IIS, select Use custom web
site . For more information, see Websites for site system servers.
8. Select OK to save the configuration and close the site properties window.
Repeat this procedure for all primary sites in the hierarchy.
Configure client computers to find management
points by using DNS publishing
2/16/2022 • 2 minutes to read • Edit Online
NOTE
You can also use configuration items to manage clients to assess, track, and remediate the configuration compliance of
devices. For more information, see Ensure device compliance.
TIP
Configuration Manager configures clients with these settings when they next download policy. To start policy retrieval for
a single client, see Start policy retrieval for a Configuration Manager client.
TIP
Configuration Manage configures clients with these settings when they next download policy. To start policy retrieval for a
single client, see Start policy retrieval for a Configuration Manager client.
NOTE
To view the client settings, your account needs Read access to client settings.
Next steps
About client settings
About client settings in Configuration Manager
2/16/2022 • 46 minutes to read • Edit Online
TIP
If you set Configure BranchCache to No , then Configuration Manager doesn't configure any BranchCache settings.
To disable BranchCache, set Configure BranchCache to Yes , and then set Enable BranchCache to No .
Configure client cache size
The Configuration Manager client cache on Windows computers stores temporary files used to install
applications and programs. If this option is set to No , the default size is 5,120 MB.
If you choose Yes , then specify:
Maximum cache size (MB)
Maximum cache size (percentage of disk) : The client cache size expands to the maximum size in
megabytes (MB), or the percentage of the disk, whichever is less.
Enable as peer cache source
Enables peer cache for Configuration Manager clients. Choose Yes , and then specify the port through which the
client communicates with the peer computer.
Por t for initial network broadcast (default UDP 8004): Configuration Manager uses this port in
Windows PE or the full Windows OS. The task sequence engine in Windows PE sends the broadcast to get
content locations before it starts the task sequence.
Por t for content download from peer (default TCP 8003): Configuration Manager automatically
configures Windows Firewall rules to allow this traffic. If you use a different firewall, you must manually
configure rules to allow this traffic.
For more information, see Ports used for connections.
Minimum duration before cached content can be removed (minutes)
Specify the minimum time for the Configuration Manager client to keep cached content. This client setting
defines the minimum amount of time Configuration Manager agent should wait before it can remove content
from the cache in case more space is needed.
By default this value is 1,440 minutes (24 hours). The maximum value for this setting is 10,080 minutes (one
week).
This setting gives you greater control over the client cache on different types of devices. You might reduce the
value on clients that have small hard drives and don't need to keep existing content before another deployment
runs.
Client policy
Client policy polling interval (minutes)
Specifies how frequently the following Configuration Manager clients download client policy:
Windows computers (for example, desktops, servers, laptops)
Mobile devices that Configuration Manager enrolls
Mac computers
This value is 60 minutes by default. Reducing this value causes clients to poll the site more frequently. With
many clients, this behavior can have a negative impact on the site performance. The size and scale guidance is
based on the default value. Increasing this value causes clients to poll the site less often. Any changes to client
policies, including new deployments, take longer for clients to download and process.
Enable user policy on clients
When you set this option to Yes , and use user discovery, then clients receive applications and programs
targeted to the signed-in user.
If this setting is No , users don't receive required applications that you deploy to users. Users also don't receive
any other management tasks in user policies.
This setting applies to users when their computer is on either the intranet or the internet. It must be Yes if you
also want to enable user policies on the internet.
Enable user policy requests from internet clients
Set this option to Yes for users to receive the user policy on internet-based computers. The following
requirements also apply:
The client and site are configured for internet-based client management or a cloud management gateway.
The Enable user policy on clients setting is Yes .
The internet-based management point successfully authenticates the user by using Windows
authentication (Kerberos or NTLM). For more information, see Considerations for client communications
from the internet.
The cloud management gateway successfully authenticates the user by using Azure Active Directory. For
more information, see Prerequisites to deploy user-available applications.
If you set this option to No , or any of the previous requirements aren't met, then a computer on the internet
only receives computer policies. If this setting is No , but Enable user policy on clients is Yes , users don't
receive user policies until the computer is connected to the intranet.
NOTE
For internet-based client management, application approval requests from users don't require user policies or user
authentication. The cloud management gateway doesn't support application approval requests.
Cloud services
Allow access to cloud distribution point
Set this option to Yes for clients to obtain content from a content-enabled CMG. This setting doesn't require the
device to be internet-based.
Automatically register new Windows 10 or later domain joined devices with Azure Active Directory
When you configure Azure Active Directory (Azure AD) to support hybrid join, Configuration Manager
configures Windows 10 or later devices for this functionality. For more information, see How to configure hybrid
Azure AD joined devices.
Enable clients to use a cloud management gateway
By default, all internet-roaming clients use any available cloud management gateway. An example of when to
configure this setting to No is to scope usage of the service, such as during a pilot project or to save costs.
Compliance settings
Enable compliance evaluation on clients
Set this option to Yes to configure the other settings in this group.
Schedule compliance evaluation
Select Schedule to create the default schedule for configuration baseline deployments. This value is
configurable for each baseline in the Deploy Configuration Baseline dialog box.
Enable User Data and Profiles
Choose Yes if you want to deploy user data and profiles configuration items.
Computer agent
User notifications for required deployments
For more information about the following three settings, see User notifications for required deployments:
Deployment deadline greater than 24 hours, remind user ever y (hours)
Deployment deadline less than 24 hours, remind user ever y (hours)
Deployment deadline less than 1 hour, remind user ever y (minutes)
Legacy settings for the application catalog
The following client settings still appear in the Computer Agent group, but the functionality is no longer
supported:
Default Application Catalog website point
Add default Application Catalog website to Internet Explorer trusted sites zone
Allow Silverlight applications to run in elevated trust mode
For more information, see Removed and deprecated features.
Organization name displayed in Software Center
Type the name that users see in Software Center. This branding information helps users to identify this
application as a trusted source. For more information about the priority of this setting, see Branding Software
Center.
Use new Software Center
The default setting is Yes .
The previous version of Software Center and the application catalog are no longer supported.
Enable communication with Health Attestation Service
Set this option to Yes for Windows 10 or later devices to use Health attestation. When you enable this setting,
the following setting is also available for configuration.
Use on-premises Health Attestation Service
Set this option to Yes for devices to use an on-premises service. Set to No for devices to use the Microsoft
cloud-based service.
Install permissions
Configure how users can install software, software updates, and task sequences:
All Users : Users with any permission except Guest.
Only Administrators : Users must be a member of the local Administrators group.
Only Administrators and primar y users : Users must be a member of the local Administrators group,
or a primary user of the computer.
No Users : No users signed in to a client computer can install software, software updates, and task
sequences. Required deployments for the computer always install at the deadline. Users can't install
software from Software Center.
Suspend BitLocker PIN entry on restart
If computers require BitLocker PIN entry, then this option bypasses the requirement to enter a PIN when the
computer restarts after a software installation.
Always : Configuration Manager temporarily suspends BitLocker after it has installed software that
requires a restart, and it restarts the computer. This setting only applies when Configuration Manager
restarts the computer. This setting doesn't suspend the requirement to enter the BitLocker PIN when the
user restarts the computer. The BitLocker PIN entry requirement resumes after Windows startup.
Never : Configuration Manager doesn't suspend BitLocker after it has installed software that requires a
restart. In this scenario, the software installation can't finish until the user enters the PIN to complete the
standard startup process and load Windows.
Additional software manages the deployment of applications and software updates
Enable this option only if one of the following conditions applies:
You use a vendor solution that requires this setting to be enabled.
You use the Configuration Manager software development kit (SDK) to manage client agent notifications,
and the installation of applications and software updates.
WARNING
If you choose this option when neither of these conditions apply, the client doesn't install software updates and required
applications. This setting doesn't prevent users from installing available software from Software Center, including
applications, packages, and task sequences.
When you enable this setting, toast notifications for new software or required software don't occur on clients.
IMPORTANT
Disabling randomization only applies to manual software update deployments. The setting doesn't apply to automatic
deployment rules for software updates or for other deployments such as applications.
Computer restart
For more information about these settings, see Device restart notifications.
Delivery Optimization
You use Configuration Manager boundary groups to define and regulate content distribution across your
corporate network and to remote offices. Windows Delivery Optimization is a cloud-based, peer-to-peer
technology to share content between Windows devices. Configure Delivery Optimization to use your boundary
groups when sharing content among peers.
NOTE
Delivery Optimization is only available on Windows 10 or later clients.
Internet access to the Delivery Optimization cloud service is a requirement to utilize its peer-to-peer functionality. For
information about the needed internet endpoints, see Frequently asked questions for Delivery Optimization.
When using a CMG for content storage, the content for third-party updates won't download to clients if the
Download delta content when available client setting is enabled.
NOTE
Microsoft recommends allowing the client to configure this setting via local policy rather than group policy. This allows the
boundary group identifier to be set as the Delivery Optimization group identifier on the client. For more information, see
Delivery Optimization.
Enable devices managed by Configuration Manager to use Microsoft Connected Cache servers for content
download
Choose Yes to allow clients to download content from an on-premises distribution point that you enable as a
Microsoft Connected Cache server. For more information, see Microsoft Connected Cache in Configuration
Manager.
Endpoint Protection
TIP
In addition to the following information, you can find details about using Endpoint Protection client settings in Example
scenario: Using Endpoint Protection to protect computers from malware.
Allow Endpoint Protection client installation and restarts outside maintenance windows. Maintenance
windows must be at least 30 minutes long for client installation
Set this option to Yes to override typical installation behaviors with maintenance windows. This setting meets
business requirements for the priority of system maintenance for security purposes.
For Windows Embedded devices with write filters, commit Endpoint Protection client installation (requires
restarts)
Choose Yes to disable the write filter on the Windows Embedded device, and restart the device. This action
commits the installation on the device.
If you choose No , the client installs on a temporary overlay that clears when the device restarts. In this scenario,
the Endpoint Protection client doesn't fully install until another installation commits changes to the device. This
configuration is the default.
Suppress any required computer restarts after the Endpoint Protection client is installed
Choose Yes to suppress a computer restart after the Endpoint Protection client installs.
IMPORTANT
If the Endpoint Protection client requires a computer restart and this setting is No , then the computer restarts regardless
of any configured maintenance windows.
Allowed period of time users can postpone a required restart to complete the Endpoint Protection
installation (hours)
If a restart is necessary after the Endpoint Protection client installs, this setting specifies the number of hours
that users can postpone the required restart. This setting requires that you disable the following setting:
Suppress any required computer restar ts after the Endpoint Protection client is installed .
Disable alternate sources (such as Microsoft Windows Update, Microsoft Windows Server Update Services,
or UNC shares) for the initial definition update on client computers
Choose Yes if you want Configuration Manager to install only the initial definition update on client computers.
This setting can be helpful to avoid unnecessary network connections, and reduce network bandwidth, during
the initial installation of the definition update.
Enrollment
Polling interval for mobile device legacy clients
Select Set Inter val to specify the length of time, in minutes or hours, that legacy mobile devices poll for policy.
These devices include macOS.
Polling interval for modern devices (minutes)
Enter the number of minutes that modern devices poll for policy. This setting is for Windows devices that are
managed through on-premises mobile device management (MDM).
Allow users to enroll mobile devices and Mac computers
To enable user-based enrollment of legacy devices, set this option to Yes , and then configure the following
setting:
Enrollment profile : Select Set Profile to create or select an enrollment profile. For more information, see
Configure client settings for enrollment.
Allow users to enroll modern devices
To enable user-based enrollment of modern devices, set this option to Yes , and then configure the following
setting:
Modern device enrollment profile : Select Set Profile to create or select an enrollment profile. For more
information, see Create an enrollment profile that allows users to enroll modern devices.
Hardware inventory
Enable hardware inventory on clients
By default, this setting is Yes . For more information, see Introduction to hardware inventory.
Hardware inventory schedule
Select Schedule to adjust the frequency that clients run the hardware inventory cycle. By default, this cycle
occurs every seven days.
Maximum random delay (minutes)
Specify the maximum number of minutes for the Configuration Manager client to randomize the hardware
inventory cycle from the defined schedule. This randomization across all clients helps load-balance inventory
processing on the site server. You can specify any value between 0 and 480 minutes. By default, this value is set
to 240 minutes (4 hours).
Maximum custom MIF file size (KB )
Specify the maximum size, in kilobytes (KB), allowed for each custom Management Information Format (MIF) file
that the client collects during a hardware inventory cycle. The Configuration Manager hardware inventory agent
doesn't process any custom MIF files that exceed this size. You can specify a size of 1 KB to 5,120 KB. By default,
this value is set to 250 KB. This setting doesn't affect the size of the regular hardware inventory data file.
NOTE
This setting is available only in the default client settings.
NOTE
This setting is available only in the default client settings.
Metered internet connections
Manage how Windows 8 and later computers use metered internet connections to communicate with
Configuration Manager. Internet providers sometimes charge by the amount of data that you send and receive
when you're on a metered internet connection.
NOTE
The configured client setting isn't applied in the following scenarios:
If the computer is on a roaming data connection, the Configuration Manager client doesn't perform any tasks that
require data to be transferred to Configuration Manager sites.
If the Windows network connection properties are configured as non-metered, the Configuration Manager client
behaves as if the connection is non-metered, and so transfers data to the site.
NOTE
On an application deployment, enable the option to Allow clients on a metered Internet
connection to download content after the installation deadline . This option is only available for
deployments with a purpose of Required . For more information, see Deploy applications.
If the client reaches the data transfer limit for the metered internet connection, the client no longer
communicates with the site.
Block : When the device is on a metered internet connection, the Configuration Manager client doesn't try
to communicate with the site. This option is the default.
IMPORTANT
The client always permits software installations from Software Center, regardless of the metered internet connection
settings. If the user requests a software installation while the device is on a metered network, Software Center honors the
user's intent.
Client install and update both work when you configure this client setting to Allow or Limit . This behavior
allows the client to stay current, but still manage the client communication on a metered network. You can
control this behavior during client install with the ccmsetup parameter /AllowMetered . For more information,
see About client installation parameters and properties.
Power management
Allow power management of devices
Set this option to Yes to enable power management on clients. For more information, see Introduction to power
management.
Allow users to exclude their device from power management
Choose Yes to let users of Software Center exclude their computer from any configured power management
settings.
Allow network wake -up
When you enable this setting, the client configures the power settings on the computer to allow the network
adapter to wake up the device. If you disable this setting, the computer's network adapter can't wake up the
device.
Enable wake -up proxy
Specify Yes to supplement the site's Wake On LAN setting, when it's configured for unicast packets.
For more information about wake-up proxy, see Plan how to wake up clients.
WARNING
Don't enable wake-up proxy in a production network without first understanding how it works and evaluating it in a test
environment.
IMPORTANT
This number must match the number in the site Proper ties . If you change this number in one place, it isn't
automatically updated in the other place.
Windows Defender Firewall exception for wake-up proxy : The Configuration Manager client
automatically configures the wake-up proxy port number on devices that run Windows Defender
Firewall. Select Configure to specify the firewall profiles.
If clients run a different firewall, manually configure it to allow the Wake-up proxy por t number
(UDP) .
IPv6 prefixes if required for DirectAccess or other inter vening network devices. Use a
comma to specify multiple entries : Enter the necessary IPv6 prefixes for wake-up proxy to function
on your network.
Remote tools
Enable Remote Control on clients, and Firewall exception profiles
Select Configure to enable the Configuration Manager remote control feature. Optionally, configure firewall
settings to allow remote control to work on client computers.
Remote control is disabled by default.
IMPORTANT
If you don't configure firewall settings, remote control might not work correctly.
NOTE
The user at the client computer must always grant permission for a Remote Assistance session to occur.
Software Center
Select the user portal
If you deploy the Company Portal to co-managed devices, configure this setting to Company Por tal . This
setting makes sure that notifications from Configuration Manager and Intune both launch the Company Portal.
If a Configuration Manager notification is for a scenario that the Company Portal doesn't support, selecting the
notification launches Software Center.
If you install the Company Portal on a co-managed device, but configure this setting to Software Center , then
notifications from Configuration Manager launch Software Center. Notifications from Intune launch the
Company Portal. This behavior may be confusing to users to interact with different portals.
The behavior of the Company Portal depends upon your co-management workload configuration. For more
information, see Use the Company Portal app on co-managed devices.
Select these new settings to specify company information
Set this option to Yes , and then select Customize to configure Software Center settings for your organization.
This action opens the Software Center Customization window.
Software Center settings
Software Center Customization - General
Company name : Specify the organization name that users see in Software Center.
Color scheme for Software Center : Select the primary color that Software Center uses. You can
choose from 48 basic colors, or define a custom color. By default, this color is Microsoft blue (Red: 0,
Green: 120, Blue: 212).
Foreground color for Software Center : Starting in version 2103, configure a custom color for the
foreground font. By default, this color is white (Red: 255, Green: 255, Blue: 255). For some customers,
their brand color doesn't work well with the default white font color for a selected item. This setting better
supports these customers and improves accessibility.
Select a logo for Software Center : Enable this setting, and then Browse to select an image to appear
in Software Center. The logo for Software Center has the following requirements:
A JPG, PNG, or BMP file.
Dimensions of 400 x 100 pixels.
A maximum file size of 750 KB.
No spaces in the file name.
Select a logo for notifications : Starting in version 2111, enable this setting to display a logo with
notifications on devices running Windows 10 or later. Because of how the image is used, it's separate
from the Software Center logo. The logo for notifications has the following requirements:
A JPG, PNG, or BMP file.
Square aspect ratio. For example, 100 x 100 pixels.
A maximum file size of 2 MB.
No spaces in the file name.
Hide unapproved applications in Software Center : When you enable this option, user-available
applications that require approval are hidden in Software Center.
Hide installed applications in Software Center : When you enable this option, applications that are
already installed no longer show in the Applications tab. This option is enabled by default. Installed
applications are still available for review under the Installation Status tab.
Hide Application Catalog link in Software Center : Enable this setting. The application catalog is no
longer supported. This link would appear on the Installation Status tab of Software Center.
Software Center Customization - Tabs
Choose which tabs should be visible in Software Center. To move a tab to Visible tabs list, select Add . To move
it to the Hidden tabs list, select Remove . To change the order of the tabs in Software Center, select Move Up
or Move Down .
Default tabs:
Applications
Updates
Operating Systems
Installation Status
Device Compliance
Options
You can also add up to five custom tabs:
1. Select Add tab .
2. Specify the Tab name and Content URL for your custom tab. Configuration Manager doesn't validate this
URL.
Select Delete Tab to remove a custom tab. Select Edit tab to change the configuration of a custom tab.
IMPORTANT
Some website features may not work in a custom tab in Software Center. Make sure to test the results before deploying
this to clients.
Specify only trusted or intranet website addresses when you add a custom tab.
D i sp l a y c u st o m t a b s w i t h M i c r o so ft Ed g e W e b Vi e w 2 r u n t i m e
NOTE
If the client device isn't running .NET Framework version 4.6.2 or later, it falls back to use the Internet Explorer browser
control. Starting in version 2107, the client requires .NET version 4.6.2, and version 4.8 is recommended. For more
information, see Prerequisites for deploying clients to Windows computers.
When using custom tabs in certain circumstances, you may encounter the following exception:
Could not load type 'System.Runtime.InteropServices.Architecture' from assembly 'mscorlib
Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089'
. To work around the issue, update .NET Framework to version 4.7.1 or later for the client.
If you don't enable this option, Software Center uses the Windows built-in Internet Explorer browser control.
Software Center Customization - Defaults
Configure the Default application filter as either All or only Required applications. By default, it
shows all applications.
Software Center always uses your default setting. Users can change this filter, but Software Center doesn't
persist their preference.
Set the Default application view as either Tile view or List view . By default, it uses the tile view.
If a user changes this configuration, Software Center persists the user's preference in the future.
For more information on the appearance of these settings, see the Software Center user guide.
Software deployment
Schedule re -evaluation for deployments
Configure a schedule for when Configuration Manager reevaluates the requirement rules for all deployments.
The default value is every seven days.
IMPORTANT
This setting is more invasive to the local client than it is to the network or site server. A more aggressive reevaluation
schedule negatively affects the performance of your network and client computers. Microsoft doesn't recommend setting
a lower value than the default. If you change this value, closely monitor performance.
Start this action from a client as follows: in the Configuration Manager control panel, from the Actions tab,
select Application Deployment Evaluation Cycle .
Software inventory
Enable software inventory on clients
This option is set to Yes by default. For more information, see Introduction to software inventory.
Schedule software inventory and file collection
Select Schedule to adjust the frequency that clients run the software inventory and file collection cycles. By
default, this cycle occurs every seven days.
Inventory reporting detail
Specify one of the following levels of file information to inventory:
File only
Product only
Full details (default)
Inventory these file types
If you want to specify the types of file to inventory, select Set Types , and then configure the following options:
NOTE
If multiple custom client settings are applied to a computer, the inventory that each setting returns is merged.
Select New to add a new file type to inventory. Then specify the following information in the
Inventoried File Proper ties dialog box:
Name : Provide a name for the file that you want to inventory. Use an asterisk ( * ) wildcard to
represent any string of text, and a question mark ( ? ) to represent any single character. For
example, if you want to inventory all files with the extension .doc, specify the file name *.doc .
Location : Select Set to open the Path Proper ties dialog box. Configure software inventory to
search all client hard disks for the specified file, search a specified path (for example, C:\Folder ),
or search for a specified variable (for example, %windir% ). You can also search all subfolders under
the specified path.
Exclude encr ypted and compressed files : When you choose this option, any compressed or
encrypted files aren't inventoried.
Exclude files in the Windows folder : When you choose this option, any files in the Windows
folder and its subfolders aren't inventoried.
Select OK to close the Inventoried File Proper ties dialog box. Add all the files that you want to
inventory, and then select OK to close the Configure Client Setting dialog box.
Collect files
If you want to collect files from client computers, select Set Files , and then configure the following settings:
NOTE
If multiple custom client settings are applied to a computer, the inventory that each setting returns is merged.
In the Configure Client Setting dialog box, select New to add a file to be collected.
In the Collected File Proper ties dialog box, provide the following information:
Name : Provide a name for the file that you want to collect. Use an asterisk ( * ) wildcard to
represent any string of text, and a question mark ( ? ) to represent any single character.
Location : Select Set to open the Path Proper ties dialog box. Configure software inventory to
search all client hard disks for the file that you want to collect, search a specified path (for example,
C:\Folder ), or search for a specified variable (for example, %windir% ). You can also search all
subfolders under the specified path.
Exclude encr ypted and compressed files : When you choose this option, any compressed or
encrypted files aren't collected.
Stop file collection when the total size of the files exceeds (KB) : Specify the file size, in
kilobytes (KB), after which the client stops collecting the specified files.
NOTE
The site server collects the five most recently changed versions of collected files, and stores them in the
<ConfigMgr installation directory>\Inboxes\Sinv.box\Filecol directory. If a file hasn't changed since the
last software inventory cycle, the file isn't collected again.
Software inventory doesn't collect files larger than 20 MB.
The value Maximum size for all collected files (KB) in the Configure Client Setting dialog box shows the
maximum size for all collected files. When this size is reached, file collection stops. Any files already collected are
retained and sent to the site server.
IMPORTANT
If you configure software inventory to collect many large files, this configuration might negatively affect the
performance of your network and site server.
For information about how to view collected files, see How to use Resource Explorer to view software
inventory.
Select OK to close the Collected File Proper ties dialog box. Add all the files that you want to collect,
and then select OK to close the Configure Client Setting dialog box.
Set Names
The software inventory agent retrieves manufacturer and product names from file header information. These
names aren't always standardized in the file header information. When you view software inventory in Resource
Explorer, different versions of the same manufacturer or product name can appear. To standardize these display
names, select Set Names , and then configure the following settings:
Name type : Software inventory collects information about both manufacturers and products. Choose
whether you want to configure display names for a Manufacturer or a Product .
Display name : Specify the display name that you want to use in place of the names in the Inventoried
names list. To specify a new display name, select New .
Inventoried names : To add an inventoried name, select New . This name is replaced in software
inventory by the name chosen in the Display name list. You can add multiple names to replace.
Software Metering
Enable software metering on clients
This setting is set to Yes by default. For more information, see Software metering.
Schedule data collection
Select Schedule to adjust the frequency that clients run the software metering cycle. By default, this cycle
occurs every seven days.
Software updates
Enable software updates on clients
Use this setting to enable software updates on Configuration Manager clients. When you disable this setting,
Configuration Manager removes existing deployment policies from clients. When you re-enable this setting, the
client downloads the current deployment policy.
IMPORTANT
When you disable this setting, compliance policies that rely on software updates will no longer function.
NOTE
If you specify an interval of less than one day, Configuration Manager automatically defaults to one day.
WARNING
The actual start time on client computers is the start time plus a random amount of time, up to two hours. This
randomization prevents client computers from initiating the scan and simultaneously connecting to the active software
update point.
NOTE
If you specify an interval of less than one day, Configuration Manager automatically defaults to one day.
NOTE
This client setting replaces Por t used to download content for Express installation files .
If content is unavailable from distribution points in the current boundary group, immediately fallback to a
neighbor or the site default
(Introduced in version 2010)
If delta content is unavailable from distribution points in the current boundary group, you can allow immediate
fallback to a neighbor or the site default boundary group distribution points. This setting is useful when using
delta content for software updates since the timeout setting per download job is 5 minutes. The following
options are available:
Yes : For delta content, the client doesn't wait to reach the fallback time (in minutes) defined by the
Boundary Group relationship. Clients immediately fall back to a neighbor or the site default content
distribution points when both of the following conditions are met: - Delta content is unavailable from
distribution points in the current boundary group. - The software update deployment allows fallback.
No (default): The client honors the fallback time (in minutes) defined by the Boundary Group relationship
when it's allowed on the software update deployment. Delta download content may fail with a timeout
even if the update content is available on a neighbor or the site default distribution point group.
NOTE
This setting is for delta content only.
Enable update notifications from User receives notifications from No notifications from Software Center
Microsoft 365 Apps: Yes Software Center
No notifications from Microsoft 365
User receives notifications from Apps
Microsoft 365 Apps
Enable update notifications from User receives notifications from No notifications from Software Center
Microsoft 365 Apps: No Software Center
No notifications from Microsoft 365
No notifications from Microsoft 365 Apps
Apps
Enable installation of software updates in "All deployments" maintenance window when "Software Update"
maintenance window is available
When you set this option to Yes , and the client has at least one "Software Update" maintenance window defined,
software updates will install during an "All deployments" maintenance window.
By default, this setting is set to No . This value uses the same behavior as before: if both types exist, it ignores the
window.
NOTE
This setting also applies to maintenance windows that you configure to apply to Task sequences .
If the client only has an All deployments window available, it still installs software updates or task sequences in that
window.
State Messaging
State message reporting cycle (minutes)
Specifies how often clients report state messages. This setting is 15 minutes by default.
NOTE
For example, you specify User device affinity usage threshold (minutes) as 60 minutes, and User device affinity
usage threshold (days) as 5 days. Then the user must use the device for 60 minutes over a period of 5 days to create
automatic affinity with the device.
Automatically configure user device affinity from usage data
Choose Yes to create automatic user device affinity based on the usage information that Configuration Manager
collects.
Allow user to define their primary devices
When this setting is Yes , users can identify their own primary devices in Software Center. For more information,
see the Software Center user guide.
NOTE
Default values are:
User device affinity usage threshold (minutes): 2880
User device affinity usage threshold (days): 30
Automatically configure user device affinity from usage data: No
Allow user to define their primary devices: No
NOTE
By default, Windows 11 enables focus assist for the first hour after a user signs on for the first time. For more
information, see Reaching the Desktop and the Quiet Period.
Software Center notifications are currently suppressed during this time. For more information, see Turn Focus assist on or
off in Windows.
Starting in version 1906, the user won't see a progress bar in the restart notification until the pending restart is
less than 24 hours away.
Software Center notification before deadline
If the user proactively installs required software before the deadline, and it requires a restart, they'll see a
different notification. The following notification occurs when both the user experience setting allows
notifications and you don't use toast notifications for the deployment. For more information about configuring
these settings, see Deployment User Experience settings and User notifications for required deployments.
Available apps
When you don't use toast notifications, the dialog for software marked as Available is similar to proactively
installed software. For Available software, the notification doesn't have a deadline for the restart and the user
can choose their own snooze interval. For more information, see Approval settings.
NOTE
By default, Configuration Manager can still force devices to restart.
Client settings
To control the client restart behaviors, configure the following device client settings in the Computer Restar t
group. For more information, see How to configure client settings.
Configuration Manager can force a device to restart
Starting in version 2006, you can configure client settings to prevent devices from automatically restarting
when a deployment requires it. Configuration Manager enables this setting by default.
IMPORTANT
This client setting applies to all application, software update, and package deployments to the device. Until a user
manually restarts the device:
Software updates and app revisions may not be fully installed
Additional software installs may not happen
When you disable this setting, you can't specify the amounts of time after the deadline that the device is
restarted or the user is presented a final countdown notification.
NOTE
To take full advantage of new Configuration Manager features, after you update the site, also update clients to the latest
version. While new functionality appears in the Configuration Manager console when you update the site and console, the
complete scenario isn't functional until the client version is also the latest.
Specify the amount of time after the deadline before a device gets restarted (minutes)
This setting must be shorter in duration than the shortest maintenance window applied to the computer. For
more information about maintenance windows, see How to use maintenance windows.
The default value is 90 minutes. Starting in version 1906, the maximum value increased from 1440 minutes (24
hours) to 20160 minutes (two weeks).
NOTE
This setting was previously titled Display a temporar y notification to the user that indicates the inter val
before the user is logged off or the computer restar ts (minutes) .
Specify the amount of time that a user is presented a final countdown notification before a device gets
restarted (minutes)
This setting must be shorter in duration than the shortest maintenance window applied to the computer. For
more information about maintenance windows, see How to use maintenance windows.
The default value is 15 minutes.
NOTE
This setting was previously titled Display a dialog box that the user cannot close, which displays the
countdown inter val before the user is logged off or the computer restar ts (minutes) .
Specify the frequency of reminder notifications presented to the user, after the deadline, before a device
gets restarted (minutes)
Starting in version 1906
This frequency duration value should be less than the value of Specify the amount of time after the
deadline before a device gets restar ted (minutes) minus the value of Specify the amount of time that
a user is presented a final countdown notification before a device gets restar ted (minutes) .
Otherwise, the reminder notifications won't work.
The default value is 240 minutes.
NOTE
This setting was previously titled Specify the snooze duration for computer restar t countdown notifications
(minutes) .
When a deployment requires a restart, show a dialog window to the user instead of a toast notification
To change the user experience to be more intrusive, configure this setting to Yes . This setting applies to all
deployments of applications, task sequences, and software updates. For more information, see User
notifications.
When a deployment requires a restart, allow low-rights users to restart a device running Windows Server
For a low-rights user on a device that runs Windows Server, by default they aren't assigned the user rights to
restart Windows. When you target a deployment to this device, this user can't manually restart. For example,
they can't restart Windows to install software updates. Starting in version 2010, you can now control this
behavior as needed.
IMPORTANT
Allowing low-rights users to restart a server can potentially impact other users or services.
If the restart is less than 24 hours away, it shows a progress bar. The timing of this notification is
based on the setting: Specify the amount of time after the deadline before a device gets
restar ted (minutes) .
If the user selects Snooze , another temporary notification shows after the snooze period elapses. This behavior
assumes it hasn't yet reached the final countdown. The timing of the next notification is based on the setting:
Specify the frequency of reminder notifications presented to the user, after the deadline, before a
device gets restar ted (minutes) . If the user selects Snooze , and your snooze interval is one hour, then
Software Center notifies the user again in 60 minutes. This behavior assumes it hasn't yet reached the final
countdown.
When it reaches the final countdown, Software Center shows the user a notification they can't close. The
progress bar is in red and the user can't Snooze it.
Proactively install required software before the deadline
If the user proactively installs required software that needs restart before the deadline, they'll see a different
notification. For more information about configuring these settings, see Deployment User Experience settings
and User notifications for required deployments.
The following notification occurs when both the user experience setting allows notifications and you don't use
toast notifications for the deployment:
Once the deployment reaches its deadline, Software Center follows the behavior to Install required software at
or after the deadline.
Example configurations
The following examples describe how to configure the client settings to achieve specific behaviors.
NOTE
If the user puts the device to sleep, it doesn't pause or interrupt a countdown. For example, a restart countdown is
halfway into a four-hour timer, and the user puts the device to sleep. 12 hours later the user wakes up the device. The
device restarts, as it's past the deadline.
Specify the amount of time after the deadline before a device 180
gets restarted (minutes)
The device will restart three hours (180 minutes) after the deployment deadline. One hour (60 minutes) before
it restarts, the user sees a countdown that they can't close or snooze. The first reminder notification is set to start
four hours (240 minutes) after the deadline, which is after the restart. So the user doesn't see any reminders.
Low reminder frequency
SET T IN G VA L UE
Specify the amount of time after the deadline before a device 7200
gets restarted (minutes)
The device will restart five days (7200 minutes) after the deployment deadline. Two hours (120 minutes) before
it restarts, the user sees a countdown that they can't close or snooze. This configuration allows for 118 hours to
show reminders ( (7200 - 120) / 60 ). 15 hours (900 minutes) after the deadline, Software Center displays the
first reminder. It displays a maximum of six additional reminders every 15 hours (900 minutes ). The user sees
the reminder as a window on the screen, instead of a notification that disappears in a few seconds.
High reminder frequency
SET T IN G VA L UE
Specify the amount of time after the deadline before a device 2880
gets restarted (minutes)
The device will restart two days (2880 minutes) after the deployment deadline. One hour (60 minutes) before it
restarts, the user sees a countdown that they can't close or snooze. This configuration allows for 47 hours to
show reminders ( (2880 - 60) / 60 ). 30 minutes after the deadline, Software Center displays the first reminder.
It displays a maximum of 92 additional reminders every 30 minutes . The user sees the reminder as a window
on the screen, instead of a notification that disappears in a few seconds.
Log files
To troubleshoot device restarts, use the RebootCoordinator.log and SCNotify.log files on the client. Based on
the specific type of deployment, you may also have to use additional client log files.
Next steps
How to configure client settings
Application deployment User Experience settings
User notifications for required app deployments
How to configure Wake on LAN in Configuration
Manager
2/16/2022 • 9 minutes to read • Edit Online
To wake up all sleeping clients in a collection: Right-click on the device collection, go to Client
Notification , then select Wake up .
This action can't be run on built-in collections.
When you have a mix of asleep and awake clients in a collection, only the clients that are asleep are
sent a Wake on LAN request.
Starting in Configuration Manager 2002, this action is available from a console connected to a Central
Administration site, a stand-alone site, or child primary site.
In versions 1910 and earlier, this action is only active when the Configuration Manager console is
connected to a stand-alone or child primary site. When connected to a Central Administration Site, the
action isn't available.
Wake machine at deployment deadline using peer clients on the same remote subnet
(Introduced in version 2010)
Starting in Configuration Manager version 2010, you can allow the site to wake devices at the deadline of a
deployment, using the client notification channel. Instead of the site server issuing the magic packet directly, the
site uses the client notification channel to find an online machine in the last known subnet of the target device(s)
and instructs the online client to issue the WoL packet for the target device.
Prerequisites for waking a client at deadline using the client notification channel
Target computer prerequisites:
Offline
Updated to latest Configuration Manager client version
Targeted with a Required deployment with a Deadline and the Send wake-up packages option enabled.
Prerequisites for the computer sending the WoL magic packet to the target computer:
Online
Updated to latest client version
On the same subnet as the target computer
Enable waking a client at deadline using the client notification channel
1. At the site level, enable Wake on LAN:
a. In the Configuration Manager console, go to Administration > Site Configuration > Sites .
b. Select the primary site to configure, and then choose Proper ties .
c. In the Wake on L AN tab, select Enable Wake On L AN for this site and send the wake-up packets
Using client notification channel .
d. Select OK and repeat the procedure for all primary sites in the hierarchy.
2. Verify Allow network wake-up under the Power Management client settings is enabled.
3. Create a deployment as Required with the Send wake-up packages option and a Deadline . Clients
are sent a notification when a deadline is received on deployments such as task sequences, software
distribution, or software updates installation.
What to expect when only the new version of Wake on LAN is
enabled
When you have only the new version of Wake on LAN enabled, only the Wake Up client notification is enabled.
Clients aren't sent a notification when a deadline is received on deployments such as task sequences, software
distribution, or software updates installation. Once a sleeping machine is back online, it will be reflected in the
console when it checks in with the Management Point.
Starting in Configuration Manager version 1902, you can specify the Wake on LAN port. This setting is
shared by both the new and older version of Wake on LAN.
Starting in Configuration Manager version 2010, you can use the client notification channel to wake
clients when a deadline is received on deployments such as task sequences, software distribution, or
software updates installation. For more information, see Use the client notification channel to wake a
client when a deployment deadline occurs.
WARNING
To avoid unexpected disruption to your network services, first evaluate wake-up proxy on an isolated and representative
network infrastructure. Then use custom client settings to expand your test to a selected group of computers on several
subnets. For more information about how wake-up proxy works, see Plan how to wake up clients.
To configure Wake on LAN for a site for version 1806 and earlier
To use Wake on LAN, you need to enable it for each site in a hierarchy.
1. In the Configuration Manager console, go to Administration > Site Configuration > Sites .
2. Select the primary site to configure, and then choose Proper ties .
3. In the Wake on L AN tab, and configure the options that you require for this site. To support wake-up proxy,
make sure you select Use wake-up packets only and Unicast . For more information, see Plan how to
wake up clients.
4. Select OK and repeat the procedure for all primary sites in the hierarchy.
To configure wake -up proxy client settings
1. In the Configuration Manager console, go to Administration > Client Settings .
2. Select Default Client Settings , and then choose Proper ties .
3. Select Power Management and then choose Yes for Enable wake-up proxy .
4. Review and if necessary, configure the other wake-up proxy settings. For more information on these settings,
see Power management settings.
5. Select OK to close the dialog box, and then OK to close the Default Client Settings dialog box.
You can use the following Wake On LAN reports to monitor the installation and configuration of wake-up proxy:
Wake-Up Proxy Deployment State Summary
Wake-Up Proxy Deployment State Details
TIP
To test whether wake-up proxy is working, test a connection to a sleeping computer. For example, connect to a shared
folder on that computer, or try connecting to the computer using Remote Desktop. If you use Direct Access, check that
the IPv6 prefixes work by trying the same tests for a sleeping computer that is currently on the Internet.
How to deploy clients to Windows computers in
Configuration Manager
2/16/2022 • 25 minutes to read • Edit Online
IMPORTANT
Client push only succeeds if all prerequisites are met. For more information, see Installation method dependencies.
Configure the site to automatically use client push for discovered computers
1. In the Configuration Manager console, go to the Administration workspace, expand Site
Configuration , and select the Sites node.
2. Select the site for which you want to configure automatic site-wide client push installation.
3. On the Home tab of the ribbon, in the Settings group, select Client Installation Settings , and then
select Client Push Installation .
4. On the General tab of the Client Push Installation Properties window, select Enable automatic site-
wide client push installation .
5. Starting in version 1806, when you update the site, a Kerberos check for client push is enabled. The
option to Allow connection fallback to NTLM is enabled by default, which is consistent with previous
behavior. If the site can't authenticate the client by using Kerberos, it retries the connection by using
NTLM. The recommended configuration for improved security is to disable this setting, which requires
Kerberos without NTLM fallback.
NOTE
When it uses client push to install the Configuration Manager client, the site server creates a remote connection
to the client. Starting in version 1806, the site can require Kerberos mutual authentication by not allowing fallback
to NTLM before establishing the connection. This enhancement helps to secure the communication between the
server and the client.
Depending on your security policies, your environment might already prefer or require Kerberos over the older
NTLM authentication. For more information on the security considerations of these authentication protocols, read
about the Windows security policy setting to restrict NTLM.
To use this feature, clients must be in a trusted Active Directory forest. Kerberos in Windows relies on Active
Directory for mutual authentication.
6. Select the system types to which Configuration Manager should push the client software. Select whether
you want to install the client on domain controllers.
7. On the Accounts tab, specify one or more accounts for Configuration Manager to use when it connects
to the target computer. Select the Create icon, enter the User name and Password (no more than 38
characters), confirm the password, and then select OK . Specify at least one client push installation
account. This account must have local administrator rights on the target computer to install the client. If
you don't specify a client push installation account, Configuration Manager tries to use the site system
computer account. Cross-domain client push fails when using the site system computer account.
NOTE
To use client push from a secondary site, specify the account at the secondary site that initiates the client push.
For more information about the client push installation account, see the next procedure, Use the Client Push
Installation Wizard.
8. Specify any required installation properties on the Installation Proper ties tab.
If you've extended the Active Directory schema for Configuration Manager, the site publishes the
specified client installation properties to Active Directory Domain Services. When CCMSetup runs
without installation properties, it reads these properties from Active Directory.
NOTE
If you enable client push installation on a secondary site, set the SMSSITECODE property to the Configuration
Manager site code of its parent primary site. If you've extended the Active Directory schema for Configuration
Manager, to automatically find the correct site assignment, set this property to AUTO .
NOTE
Use this wizard to install clients even if the site isn't configured for client push.
IMPORTANT
For software update-based installation, use the same Windows Server Update Services (WSUS) server for client
installation and software updates. This server must be the active software update point in a primary site. For more
information, see Install a software update point.
If the Configuration Manager client isn't installed on a computer, configure and assign a Group Policy Object. The
Group Policy specifies the server name of the software update point.
You can't add command-line properties to a software update-based client installation. If you've extended the
Active Directory schema for Configuration Manager, the client installation automatically queries Active Directory
Domain Services for the installation properties.
If you haven't extended the Active Directory schema, use Group Policy to provision client installation settings.
These settings are automatically applied to any software update-based client installation. For more information,
see the section on How to provision client installation properties and the article on How to assign clients to a
site.
Use the following procedures to configure computers without a Configuration Manager client to use the
software update point. There's also a procedure for publishing the client software to the software update point.
TIP
If computers are in a pending restart state following a previous software installation, a software update-based client
installation might cause the computer to restart.
TIP
To determine the port number, see How to determine the port settings used by WSUS.
5. Set the intranet statistics ser ver : This setting is typically configured with the same server name.
6. Assign the Group Policy Object to the computers on which you want to install the client and receive
software updates.
Publish the Configuration Manager client to the software update point
1. In the Configuration Manager console, go to the Administration workspace, expand Site
Configuration , and select the Sites node.
2. Select the site for which you want to configure software update-based client installation.
3. On the Home tab of the ribbon, in the Settings group, select Client Installation Settings , and then
select Software Update-Based Client Installation .
4. Select Enable software update-based client installation .
5. If the site's client version is more recent than the version on the software update point, the Later Version
of Client Package Detected dialog box opens. Select Yes to publish the most recent version.
NOTE
If you haven't already published the client software to the software update point, this dialog box is blank.
The software update for the Configuration Manager client isn't automatically updated when there's a new
version. When you update the site, repeat this procedure to update the client.
IMPORTANT
You must have administrator permissions to access the client installation files.
If you've extended the Active Directory schema for Configuration Manager, and you selected the domain
on the Publishing tab of the Site Proper ties dialog box, client computers automatically search Active
Directory Domain Services for installation properties. For more information, see About client installation
properties published to Active Directory Domain Services.
If you haven't extended the Active Directory schema, see the section on provisioning client installation
properties for information about storing installation properties in the Windows registry of computers.
The client uses these installation properties when it installs.
For more information, see How to use Group Policy to remotely install software.
Manual installation
Manually install the client software on computers by using CCMSetup.exe. You can find this program and its
supporting files in the Client folder in the Configuration Manager installation folder on the site server. The site
shares this folder to the network as:
\\<site server name>\SMS_<site code>\Client\
<site server name> is the primary site server name. <site code> is the primary site code to which the client is
assigned. To run CCMSetup.exe from the command line on the client, connect to this network location, and then
run the command.
IMPORTANT
You must have administrator permissions to access the client installation files.
CCMSetup.exe copies all necessary prerequisites to the client computer and calls the Windows Installer package
(Client.msi) to install the client. You can't run Client.msi directly.
To modify the behavior of the client installation, specify command-line options for both CCMSetup.exe and
Client.msi. Make sure that you specify CCMSetup parameters that begin with / before you specify Client.msi
properties. For example:
CCMSetup.exe /mp:SMSMP01 /logon SMSSITECODE=AUTO FSP=SMSFP01
For more information, see About client installation parameters and properties.
TIP
For the procedure to install the Configuration Manager client on a modern Windows device by using Azure Active
Directory (Azure AD) identity, see Install and assign Configuration Manager clients using Azure AD for authentication.
That procedure is for clients on an intranet or the internet.
This command installs the client with no additional parameters or properties. The client is automatically
configured with the client installation properties published to Active Directory Domain Services, including these
settings:
Site code: This setting requires the client's network location to be included in a boundary group that you've
configured for client assignment.
Management point.
Fallback status point.
Communicate using HTTPS only.
For more information, see About client installation properties published to Active Directory Domain Services.
Manual example 2
CCMSetup.exe /MP:mpserver.contoso.com /UsePKICert SMSSITECODE=ABC CCMHOSTNAME=server05.contoso.com
CCMFIRSTCERT=1 FSP=server06.constoso.com
This command overrides the automatic configuration that Active Directory Domain Services provides. It doesn't
require that you include the client's network location in a boundary group that's configured for client
assignment. Instead, the installation specifies these settings:
Site code
Intranet management point
Internet-based management point
Fallback status point that accepts connections from the internet
Use a client public key infrastructure (PKI) certificate (if available) that has the longest validity period
NOTE
You can't upgrade Configuration Manager 2007 clients by using this method. Instead, use automatic client upgrade,
which automatically creates and deploys a package that contains the latest version of the client. For more information, see
Upgrade clients.
For more information about how to migrate from older versions of the Configuration Manager client, see Planning a client
migration strategy.
NOTE
The computer on which the Configuration Manager deployment runs must have access to the specified network
folder. Otherwise, the client installation fails.
To change any of the client installation properties, modify the CCMSetup.exe command line on the
General tab of the Configuration Manager agent silent upgrade Proper ties program dialog box.
The default installation properties are /noservice SMSSITECODE=AUTO .
6. Distribute the package to all distribution points that you want to host the client upgrade package. Then
deploy the package to device collections that contain clients that you want to upgrade.
NOTE
You can use other client installation methods to install the Configuration Manager client on an Intune-managed device.
For example, if an Intune-managed device is on the intranet, and joined to the Active Directory domain, you can use
group policy to install the Configuration Manager client.
OS image installation
Preinstall the Configuration Manager client on a reference computer that you use to create an OS image.
IMPORTANT
When you use the Configuration Manager task sequence to deploy an OS image, the Prepare ConfigMgr Client step
completely removes the Configuration Manager client.
IMPORTANT
Don't specify a Configuration Manager site code for the client in the CCMSetup.exe command-line properties.
2. At a command prompt, type net stop ccmexec to stop the SMS Agent Host service (CcmExec.exe) on the
reference computer.
3. Delete the SMSCFG.INI file from the Windows folder on the reference computer.
4. Remove the certificates from the local computer's SMS certificate store.
5. Remove any other valid client authentication certificates that are stored in the local computer store on the
reference computer. For example, if you use PKI certificates, before you image the computer, remove the
certificates in the Personal store for Computer and User .
6. If the clients are installed in a different Configuration Manager hierarchy than the hierarchy of the
reference computer, remove the trusted root key from the reference computer.
NOTE
If clients can't query Active Directory Domain Services to locate a management point, they use the trusted root
key to determine trusted management points. If you deploy all imaged clients in the same hierarchy as that of the
master computer, leave the trusted root key in place.
If you deploy the clients in different hierarchies, remove the trusted root key. Also provision these clients with the
new trusted root key. For more information, see Planning for the trusted root key.
Workgroup computers
Configuration Manager supports client installation for computers in workgroups. Install the client on workgroup
computers by using the method specified in How to install Configuration Manager clients manually.
Prerequisites
Manually install the client on each workgroup computer. During installation, the interactive user must
have local administrator rights.
To access resources in the Configuration Manager site server domain, configure the network access
account for the site. Specify this account in the software distribution site component. For more
information, see Site components.
Limitations
Workgroup clients can't locate management points from Active Directory Domain Services. Instead, they
use DNS or another management point.
Global roaming isn't supported. Workgroup clients can't query Active Directory Domain Services for site
information.
Active Directory discovery methods can't discover computers in workgroups.
You can't deploy software to users of workgroup computers.
You can't use the client push installation method to install the client on workgroup computers.
Workgroup clients can't use Kerberos for authentication, and they might require manual approval.
You can't configure a workgroup client as a distribution point. Configuration Manager requires that
distribution point computers be members of a domain.
Install the client on workgroup computers
Check the prerequisites, and then follow the directions in the section How to install Configuration Manager
clients manually.
Workgroup example 1
This example does the following actions:
Installs the client for intranet client management
Specifies the site code
Specifies the DNS suffix to locate a management point
CCMSetup.exe SMSSITECODE=ABC DNSSUFFIX=constoso.com
Workgroup example 2
This example requires the client to be on a network location that's configured in a boundary group. If this
requirement isn't met, automatic site assignment won't work. The command includes a fallback status point on
server FSPSERVER. This property helps to track client deployment and to identify any client communication
issues.
CCMSetup.exe FSP=fspserver.constoso.com
When the Configuration Manager site supports internet-based client management for clients that are
sometimes on an intranet and sometimes on the internet, you have two options when you install clients on the
intranet:
Include the Client.msi property CCMHOSTNAME=<internet FQDN of the internet-based management point>
when you install the client, by using manual installation or client push, for example. When you use this
method, directly assign the client to the site. You can't use automatic site assignment. See the How to
install Configuration Manager clients manually section, which provides an example of this configuration
method.
Install the client for intranet client management, and then assign an internet-based client management
point to the client. Change the management point by using the client properties on the Configuration
Manager page in Control Panel, or by using a script. When you use this method, you can use automatic
client assignment. For more information, see the How to configure clients for internet-based client
management after client installation section.
To install clients that are on the internet, choose one of the following supported methods:
Provide a mechanism for these clients to temporarily connect to the intranet with a VPN. Then install the
client by using any appropriate client installation method.
Use an installation method that's independent of Configuration Manager. For example, package the client
installation source files onto removable media and send the media to users. The client installation source
files are located in the <installation path>\Client folder on the Configuration Manager site server. On
the media, include a script to manually copy over the client folder. From this folder, install the client by
using CCMSetup.exe and all the appropriate CCMSetup command-line properties.
NOTE
Configuration Manager doesn't support installing a client directly from the internet-based management point or from the
internet-based software update point.
Clients that are managed over the internet must communicate with internet-based site systems. Ensure that
these clients also have public key infrastructure (PKI) certificates before you install the client. Install these
certificates independently from Configuration Manager. For more information, see PKI certificate requirements.
Install clients on the internet by specifying CCMSetup command-line properties
1. Follow the directions in the section How to install Configuration Manager clients manually. Always
include the following options:
CCMSetup command-line parameter /source:<local path of the copied Client folder>
NOTE
If the site has more than one internet-based management point, it doesn't matter which one you specify for the
CCMHOSTNAME property. When a Configuration Manager client connects to the specified internet-based
management point, it sends the client a list of available internet-based management points in the site. The client
randomly selects one from the list.
2. If you don't want the client to check the certificate revocation list (CRL), specify the CCMSetup command-
line parameter /NoCRLCheck .
3. If you're using an internet-based fallback status point, specify the Client.msi property
FSP=<internet FQDN of the internet-based fallback status point> .
4. If you're installing the client for internet-only client management, specify the Client.msi property
CCMALWAYSINF=1 .
5. Determine whether you have to specify additional CCMSetup command-line parameters. For example, if
the client has more than one valid PKI certificate, you might have to specify a certificate selection
criterion. For a list of available properties, see About client installation parameters and properties.
Internet-based example
CCMSetup.exe /source: D:\Clients /UsePKICert CCMHOSTNAME=server1.contoso.com SMSSIGNCERT=siteserver.cer
SMSSITECODE=ABC FSP=server2.contoso.com CCMALWAYSINF=1 CCMFIRSTCERT=1
NOTE
The Internet tab is available only if the client has a client PKI certificate.
3. If the client accesses the internet by using a proxy server, enter the proxy server settings.
Configure clients for internet-based client management after client installation by using a script
P o w e r Sh e l l
1. Open a PowerShell in-line editor, like PowerShell ISE or Visual Studio Code. You can also use a text editor,
like Notepad.
2. Copy and insert the following lines of code into the editor. Replace 'mp.contoso.com' with the internet
FQDN of your internet-based management point.
$newInternetBasedManagementPointFQDN = 'mp.contoso.com'
$client = New-Object -ComObject Microsoft.SMS.Client
$client.SetInternetManagementPointFQDN($newInternetBasedManagementPointFQDN)
Restart-Service CcmExec
$client.GetInternetManagementPointFQDN()
NOTE
The last line is there only to verify the new internet management point value.
To delete a specified internet-based management point, remove the server FQDN value inside the quotation
marks. The line becomes $newInternetBasedManagementPointFQDN = '' .
NOTE
If any installation properties are supplied on the CCMSetup.exe command line, installation properties provisioned on
computers aren't used.
TIP
By default, ConfigMgrInstallation.adm doesn't support strings larger than 255 characters. This configuration can
impact adding multiple parameters or parameters with long values, such as CCMCERTISSUERS.
To workaround this issue:
1. Edit ConfigMgrInstallation.adm in Notepad.
2. For the property VALUENAME SetupParameters , change the MAXLEN value to a larger integer. For example,
MAXLEN 511 .
Configure and assign client installation properties by using a group policy object
1. Import the ConfigMgrInstallation.adm administrative template into a new or existing group policy object
(GPO) by using an editor like Windows Group Policy Object Editor. You can find this file in the
TOOLS\ConfigMgrADMTemplates folder on the Configuration Manager installation media.
2. Open the properties of the imported setting Configure Client Deployment Settings .
3. Select Enabled .
4. In the CCMSetup box, enter the required CCMSetup command-line properties. For a list of all CCMSetup
command-line properties and examples of their use, see About client installation parameters and
properties.
5. Assign the GPO to the computers that you want to provision with Configuration Manager client
installation properties.
About client installation parameters and properties
in Configuration Manager
2/16/2022 • 27 minutes to read • Edit Online
About CCMSetup.exe
The CCMSetup.exe command downloads needed files to install the client from a management point or a source
location. These files might include:
The Windows Installer package client.msi that installs the client software
Client prerequisites
Updates and fixes for the Configuration Manager client
NOTE
You can't directly install client.msi.
CCMSetup.exe provides command-line parameters to customize the installation. Parameters are prefixed with a
slash ( / ) and are generally lower case. You specify the value of a parameter when necessary using a colon ( : )
immediately followed by the value. For more information, see CCMSetup.exe command-line parameters.
You can also supply properties at the CCMSetup.exe command line to modify the behavior of client.msi.
Properties by convention are upper case. You specify a value for a property using an equal sign ( = )
immediately followed by the value. For more information, see Client.msi properties.
IMPORTANT
Specify CCMSetup parameters before you specify properties for client.msi.
CCMSetup.exe and the supporting files are on the site server in the Client folder of the Configuration Manager
installation folder. Configuration Manager shares this folder to the network under the site share. For example,
\\SiteServer\SMS_ABC\Client .
At the command prompt, the CCMSetup.exe command uses the following format:
CCMSetup.exe [<Ccmsetup parameters>] [<client.msi setup properties>]
For example:
CCMSetup.exe /mp:SMSMP01 /logon SMSSITECODE=S01 FSP=SMSFSP01
TIP
If a parameter value has spaces, surround it with quotation marks.
If you extend the Active Directory schema for Configuration Manager, the site publishes many client installation
properties in Active Directory Domain Services. The Configuration Manager client automatically reads these
properties. For more information, see About client installation properties published to Active Directory Domain
Services
/AllowMetered
Starting in version 2006, use this parameter to control the client's behavior on a metered network. This
parameter takes no values. When you allow client communication on a metered network for ccmsetup, it
downloads the content, registers with the site, and downloads the initial policy. Any further client
communication follows the configuration of the client setting from that policy. For more information, see About
client settings.
If you reinstall the client on an existing device, it uses the following priority to determine its configuration:
1. Existing local client policy
2. The last command line stored in the Windows registry
3. Parameters on the ccmsetup command line
/AlwaysExcludeUpgrade
This parameter specifies whether or not a client will auto upgrade when you enable Automatic client
upgrade .
Supported values:
TRUE : The client won't automatically upgrade
FALSE : The client automatically upgrades (default)
For example:
CCMSetup.exe /AlwaysExcludeUpgrade:TRUE
NOTE
When using the /AlwaysExcludeUpgrade parameter, the auto upgrade still runs. However when CCMSetup runs to
perform the upgrade, it will note that /AlwaysExcludeUpgrade parameter has been set and will log the following line in
the ccmsetup.log :
Client is stamped with /alwaysexcludeupgrade. Stop proceeding.
CCMSetup will then immediately exit and not perform the upgrade.
/BITSPriority
When the device downloads client installation files over an HTTP connection, use this parameter to specify the
download priority. Specify one of the following possible values:
FOREGROUND
HIGH
NORMAL (default)
LOW
/config
This parameter specifies a text file that lists client installation properties.
If CCMSetup runs as a service, place this file in the CCMSetup system folder: %Windir%\Ccmsetup .
If you specify the /noser vice parameter, place this file in the same folder as CCMSetup.exe.
Example: CCMSetup.exe /config:"configuration file name.txt"
To provide the correct file format, use the mobileclienttemplate.tcf file in the \bin\<platform> folder in the
Configuration Manager installation directory on the site server. This file has comments about the sections and
how to use them. Specify the client installation properties in the [Client Install] section, after the following
text: Install=INSTALL=ALL .
Example [Client Install] section entry: Install=INSTALL=ALL SMSSITECODE=ABC SMSCACHESIZE=100
/downloadtimeout
If CCMSetup fails to download the client installation files, this parameter specifies the maximum timeout in
minutes. After this timeout, CCMSetup stops trying to download the installation files. The default value is 1440
minutes (one day).
Use the /retr y parameter to specify the interval between retry attempts.
Example: ccmsetup.exe /downloadtimeout:100
/ExcludeFeatures
This parameter specifies that CCMSetup.exe doesn't install the specified feature.
Example: CCMSetup.exe /ExcludeFeatures:ClientUI doesn't install Software Center on the client.
NOTE
ClientUI is the only value that the /ExcludeFeatures parameter supports.
/forceinstall
Specify that CCMSetup.exe uninstalls any existing client, and installs a new client.
/forcereboot
Use this parameter to force the computer to restart if necessary to complete the installation. If you don't specify
this parameter, CCMSetup exits when a restart is necessary. It then continues after the next manual restart.
Example: CCMSetup.exe /forcereboot
/logon
If any version of the client is already installed, this parameter specifies that the client installation should stop.
Example: ccmsetup.exe /logon
/mp
Specifies a source management point for computers to connect to. Computers use this management point to
find the nearest distribution point for the installation files. If there are no distribution points, or computers can't
download the files from the distribution points after four hours, they download the files from the specified
management point.
For more information on how ccmsetup downloads content, see Boundary groups - client installation. That
article also includes details of ccmsetup behavior if you use both /mp and /source parameters.
IMPORTANT
This parameter specifies an initial management point for computers to find a download source, and can be any
management point in any site. It doesn't assign the client to the specified management point.
Computers download the files over an HTTP or HTTPS connection, depending on the site system role
configuration for client connections. The download can also use BITS throttling if you configure it. If you
configure all distribution points and management points for HTTPS client connections only, verify that the client
computer has a valid client certificate.
You can use the /mp command-line parameter to specify more than one management point. If the computer
fails to connect to the first one, it tries the next in the specified list. When you specify multiple management
points, separate the values by semicolons.
If the client connects to a management point using HTTPS, specify the FQDN not the computer name. The value
must match the management point PKI certificate's Subject or Subject Alternative Name . Although
Configuration Manager supports using a computer name in the certificate for connections on the intranet, using
an FQDN is recommended.
Example with the computer name: ccmsetup.exe /mp:SMSMP01
This parameter can also specify the URL of a cloud management gateway (CMG). Use this URL to install the
client on an internet-based device. To get the value for this parameter, use the following steps:
Create a CMG. For more information, see Set up a CMG.
On an active client, open a Windows PowerShell command prompt as an administrator.
Run the following command:
IMPORTANT
When specifying the URL of a cloud management gateway for the /mp parameter, it must start with https:// .
/NoCRLCheck
Specifies that a client shouldn't check the certificate revocation list (CRL) when it communicates over HTTPS with
a PKI certificate. When you don't specify this parameter, the client checks the CRL before it establishes an HTTPS
connection. For more information about client CRL checking, see Planning for PKI certificate revocation.
Example: CCMSetup.exe /UsePKICert /NoCRLCheck
/noservice
This parameter prevents CCMSetup from running as a service, which it does by default. When CCMSetup runs
as a service, it runs in the context of the Local System account of the computer. This account might not have
sufficient rights to access required network resources for the installation. With /noser vice , CCMSetup.exe runs
in the context of the user account that you use to start the installation.
Example: ccmsetup.exe /noservice
/regtoken
Use this parameter to provide a bulk registration token. An internet-based device uses this token in the
registration process through a cloud management gateway (CMG). For more information, see Token-based
authentication for CMG.
When you use this parameter, also include the following parameters and properties:
/mp
CCMHOSTNAME
SMSSITECODE
SMSMP
The following example command line includes the other required setup parameters and properties:
ccmsetup.exe /mp:https://CONTOSO.CLOUDAPP.NET/CCM_Proxy_MutualAuth/72186325152220500 CCMHOSTNAME=CONTOSO.CLOUDAPP.NET/CCM_Proxy_MutualAuth/72186325152220500 SMSSITECODE=A
/regtoken:eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6Ik9Tbzh2Tmd5VldRUjlDYVh5T2lacHFlMDlXNCJ9.eyJTQ0NNVG9rZW5DYXRlZ29yeSI6IlN7Q01QcmVBdXRoVG9rZW4iLCJBdXRob3JpdHkiOiJTQ0N
gvQQZiE5NSgJ63LCp5KtqFCZe8vlZxnOloErFIrebjFikxqAgwOO4i5ukJdl3KQ07YPRhwpuXmwxRf1vsiawXBvTMhy40SOeZ3mAyCRypQpQNa7NM3adCBwUtYKwHqiX3r1jQU0y57LvU_brBfLUL6JUpk3ri-LSpwPFarRXzZ
TIP
If CCMSetup returns error 0x87d0027e, try removing the /mp parameter from the command line.
/retry
If CCMSetup.exe fails to download installation files, use this parameter to specify the retry interval in minutes.
CCMSetup continues to retry until it reaches the limit specified in the /downloadtimeout parameter.
Example: ccmsetup.exe /retry:20
/service
Specifies that CCMSetup should run as a service that uses the Local System account.
TIP
If you're using a script to run CCMSetup.exe with the /ser vice parameter, CCMSetup.exe exits after the service starts. It
might not correctly report installation details to the script.
/skipprereq
This parameter specifies that CCMSetup.exe doesn't install the specified prerequisite. You can enter more than
one value. Use the semicolon character ( ; ) to separate each value.
Examples:
CCMSetup.exe /skipprereq:filename.exe
CCMSetup.exe /skipprereq:filename1.exe;filename2.exe
TIP
You can use the /source parameter more than once in a command line to specify alternative download locations.
/uninstall
Use this parameter to uninstall the Configuration Manager client. For more information, see Uninstall the client.
Example: ccmsetup.exe /uninstall
NOTE
Starting in version 2111, when you uninstall the client it also removes the client bootstrap, ccmsetup.msi, if it exists.
/UsePKICert
Specify this parameter for the client to use a PKI client authentication certificate. If you don't include this
parameter, or if the client can't find a valid certificate, it filters out all HTTPS management points, including cloud
management gateways (CMG). The client uses an HTTP connection with a self-signed certificate.
Example: CCMSetup.exe /UsePKICert
If a device uses Azure Active Directory (Azure AD) for client authentication and also has a PKI-based client
authentication certificate, if you use include this parameter the client won't be able to get Azure AD onboarding
information from a cloud management gateway (CMG). For a client that uses Azure AD authentication, don't
specify this parameter, but include the AADRESOURCEURI and AADCLIENTAPPID properties.
NOTE
In some scenarios, you don't have to specify this parameter, but still use a client certificate. For example, client push and
software update-based client installation. Use this parameter when you manually install a client and use the /mp
parameter with an HTTPS-enabled management point.
Also specify this parameter when you install a client for internet-only communication. Use CCMALWAYSINF=1 together
with the properties for the internet-based management point (CCMHOSTNAME ) and the site code (SMSSITECODE ).
For more information about internet-based client management, see Considerations for client communications from the
internet or an untrusted forest.
/IgnoreSkipUpgrade
Specify this parameter to manually upgrade an excluded client. For more information, see How to exclude clients
from upgrade.
RET URN C O DE M EA N IN G
0 Success
6 Error
7 Reboot required
Ccmsetup.msi properties
The following properties can modify the installation behavior of ccmsetup.msi.
CCMSETUPCMD
Use this ccmsetup.msi property to pass additional command-line parameters and properties to ccmsetup.exe.
Include other parameters and properties inside quotation marks ( " ). Use this property when you bootstrap the
Configuration Manager client with the Intune MDM installation method.
Example: ccmsetup.msi CCMSETUPCMD="/mp:https://mp.contoso.com CCMHOSTNAME=mp.contoso.com"
TIP
Microsoft Intune limits the command line to 1024 characters.
Client.msi properties
The following properties can modify the installation behavior of client.msi, which ccmsetup.exe installs.
AADCLIENTAPPID
Specifies the Azure Active Directory (Azure AD) client app identifier. You create or import the client app when
you configure Azure services for Cloud Management. An Azure administrator can get the value for this property
from the Azure portal. For more information, see get application ID. For the AADCLIENTAPPID property, this
application ID is for the Native application type.
Example: ccmsetup.exe AADCLIENTAPPID=aa28e7f1-b88a-43cd-a2e3-f88b257c863b
AADRESOURCEURI
Specifies the Azure AD server app identifier. You create or import the server app when you configure Azure
services for Cloud Management. When you create the server app, in the Create Server Application window, this
property is the App ID URI .
An Azure administrator can get the value for this property from the Azure portal. In Azure Active Director y ,
find the server app under App registrations . Look for application type Web app / API . Open the app, select
Settings , and then select Proper ties . Use the App ID URI value for this AADRESOURCEURI client
installation property.
Example: ccmsetup.exe AADRESOURCEURI=https://contososerver
AADTENANTID
Specifies the Azure AD tenant identifier. Configuration Manager links to this tenant when you configure Azure
services for Cloud Management. To get the value for this property, use the following steps:
On a device that runs Windows 10 or later and is joined to the same Azure AD tenant, open a command
prompt.
Run the following command: dsregcmd.exe /status
In the Device State section, find the TenantId value. For example,
TenantId : 607b7853-6f6f-4d5d-b3d4-811c33fdd49a
NOTE
An Azure administrator can also obtain this value in the Azure portal. For more information, see get tenant ID.
CCMADMINS
Specifies one or more Windows user accounts or groups to be given access to client settings and policies. This
property is useful when you don't have local administrative credentials on the client computer. Specify a list of
accounts that are separated by semicolons ( ; ).
Example: CCMSetup.exe CCMADMINS="domain\account1;domain\group1"
CCMALLOWSILENTREBOOT
If necessary, allow the computer to silently restart after the client installation.
IMPORTANT
When you use this property, the computer restarts without warning. This behavior occurs even if a user is signed in to
Windows.
CCMALWAYSINF
To specify that the client is always internet-based and never connects to the intranet, set this property value to
1 . The client's connection type displays Always Internet .
Use this property with CCMHOSTNAME to specify the FQDN of the internet-based management point. Also use
it with the CCMSetup parameter UsePKICert and the SMSSITECODE property.
For more information about internet-based client management, see Considerations for client communications
from the internet or an untrusted forest.
Example: CCMSetup.exe /UsePKICert CCMALWAYSINF=1 CCMHOSTNAME=SERVER3.CONTOSO.COM SMSSITECODE=ABC
CCMCERTISSUERS
Use this property to specify the certificate issuers list. This list includes certificate information for the trusted
root certification authorities (CA) that the Configuration Manager site trusts.
This value is a case-sensitive match for subject attributes that are in the root CA certificate. Separate attributes
by a comma ( , ) or a semicolon ( ; ). Specify more than one root CA certificate by using a separator bar ( | ).
Example:
CCMCERTISSUERS="CN=Contoso Root CA; OU=Servers; O=Contoso, Ltd; C=US | CN=Litware Corporate Root CA;
O=Litware, Inc."
TIP
Use the value of the Cer tificateIssuers attribute in the mobileclient.tcf file for the site. This file is in the
\bin\<platform> subfolder of the Configuration Manager installation directory on the site server.
For more information about the certificate issuers list and how clients use it during the certificate selection
process, see Planning for PKI client certificate selection.
CCMCERTSEL
If the client has more than one certificate for HTTPS communication, this property specifies the criteria for it to
select a valid client authentication certificate.
Use the following keywords to search the certificate Subject Name or Subject Alternative Name:
Subject : Find an exact match
SubjectStr : Find a partial match
Examples:
CCMCERTSEL="Subject:computer1.contoso.com" : Search for a certificate with an exact match to the computer
name computer1.contoso.com in the Subject Name or the Subject Alternative Name.
CCMCERTSEL="SubjectStr:contoso.com" : Search for a certificate that contains contoso.com in the Subject
Name or the Subject Alternative Name.
Use the SubjectAttr keyword to search for the Object Identifier (OID) or distinguished name attributes in the
Subject Name or Subject Alternative Name.
Examples:
CCMCERTSEL="SubjectAttr:2.5.4.11 = Computers" : Search for the organizational unit attribute expressed as
an object identifier and named Computers .
CCMCERTSEL="SubjectAttr:OU = Computers" : Search for the organizational unit attribute expressed as a
distinguished name, and named Computers .
IMPORTANT
If you use the Subject Name, the Subject keyword is case-sensitive, and the SubjectStr keyword is case-insensitive.
If you use the Subject Alternative Name, both the Subject and the SubjectStr keywords are case-insensitive.
For the complete list of attributes that you can use for certificate selection, see Supported attribute values for
PKI certificate selection criteria.
If more than one certificate matches the search, and you set CCMFIRSTCERT to 1 , then the client installer
selects the certificate with the longest validity period.
CCMCERTSTORE
If the client installer can't locate a valid certificate in the default Personal certificate store for the computer, use
this property to specify an alternate certificate store name.
Example: CCMSetup.exe /UsePKICert CCMCERTSTORE="ConfigMgr"
CCMDEBUGLOGGING
This property enables debug logging when the client installs. This property causes the client to log low-level
information for troubleshooting. Avoid using this property in production sites. Excessive logging can occur,
which might make it difficult to find relevant information in the log files. Also enable CCMENABLELOGGING .
Supported values:
0 : Turn off debug logging (default)
1 : Turn on debug logging
Example: CCMSetup.exe CCMDEBUGLOGGING=1
CCMHOSTNAME
If the client is managed over the internet, this property specifies the FQDN of the internet-based management
point.
Don't specify this option with the installation property of SMSSITECODE=AUTO . Directly assign internet-based
clients to an internet-based site.
Example: CCMSetup.exe /UsePKICert CCMHOSTNAME="SMSMP01.corp.contoso.com"
This property can specify the address of a cloud management gateway (CMG). To get the value for this property,
use the following steps:
Create a CMG. For more information, see Set up a CMG.
On an active client, open a Windows PowerShell command prompt as an administrator.
Run the following command:
IMPORTANT
When you specify the address of a CMG for the CCMHOSTNAME property, don't append a prefix such as https:// .
Only use this prefix with the /mp URL of a CMG.
CCMHTTPPORT
Specifies the port for the client to use when it communicates over HTTP to site system servers. By default, this
value is 80 .
Example: CCMSetup.exe CCMHTTPPORT=80
CCMHTTPSPORT
Specifies the port for the client to use when it communicates over HTTPS to site system servers. By default, this
value is 443 .
Example: CCMSetup.exe /UsePKICert CCMHTTPSPORT=443
CCMINSTALLDIR
Use this property to set the folder to install the Configuration Manager client files. By default, it uses
%WinDir%\CCM .
TIP
Regardless of where you install the client files, it always installs the ccmcore.dll file in the %WinDir%\System32 folder. On
a 64-bit OS, it installs a copy of ccmcore.dll in the %WinDir%\SysWOW64 folder. This file supports 32-bit applications that
use the 32-bit version of the client APIs from the Configuration Manager SDK.
CCMLOGLEVEL
Use this property to specify the level of detail to write to Configuration Manager log files.
Supported values:
0 : Verbose
1 : Default
2 : Warnings and errors
3 : Errors only
DNSSUFFIX
Specify a DNS domain for clients to locate management points that you publish in DNS. When the client locates
a management point, it tells the client about other management points in the hierarchy. This behavior means
that the management point that the client finds from DNS can be any one in the hierarchy.
NOTE
You don't have to specify this property if the client is in the same domain as a published management point. In that case,
the client's domain is automatically used to search DNS for management points.
For more information about DNS publishing as a service location method for Configuration Manager clients,
see Service location and how clients determine their assigned management point.
NOTE
By default, Configuration Manager doesn't enable DNS publishing.
FSP
Specify the fallback status point that receives and processes state messages sent by Configuration Manager
clients.
For more information, see Determine if you need a fallback status point.
Example: CCMSetup.exe FSP=SMSFP01
IGNOREAPPVVERSIONCHECK
If you set this property to TRUE , the client installer doesn't check the minimum required version of Microsoft
Application Virtualization (App-V).
IMPORTANT
If you install the Configuration Manager client without installing App-V, you can't deploy virtual applications.
NOTIFYONLY
When you enable this property, the client reports status, but doesn't remediate problems that it finds.
Example: CCMSetup.exe NOTIFYONLY=TRUE
NOTE
If the task sequence installs software updates or applications, clients need a valid client authentication certificate. Token
authentication alone doesn't work. For more information, see Release notes - OS deployment.
For example, you provision a new Windows device with Windows Autopilot, auto-enroll it to Microsoft Intune,
and then install the Configuration Manager client for co-management. If you specify this new option, the newly
provisioned client then runs a task sequence. This process gives you additional flexibility to install applications
and software updates, or configure settings.
Use the following process:
1. Create a non-OS deployment task sequence to install apps, install software updates, and configure
settings.
2. Deploy this task sequence to the new built-in collection, All Provisioning Devices . Note the task
sequence deployment ID, for example PRI20001 .
TIP
The deployment's purpose can be either available or required. Since you specify the deployment ID as the
property value, the purpose doesn't matter.
3. Install the Configuration Manager client on a device using ccmsetup.msi , and include the following
property: PROVISIONTS=PRI20001 . Set the value of this property as the task sequence deployment ID.
If you're installing the client from Intune during co-management enrollment, see How to prepare
internet-based devices for co-management.
NOTE
This method may have additional prerequisites. For example, enrolling the site to Azure Active Directory,
or creating a content-enabled cloud management gateway.
Regardless the method, only use this property with ccmsetup.msi.
After the client installs and properly registers with the site, it starts the referenced task sequence. If client
registration fails, the task sequence won't start.
NOTE
The task sequence launched by PROVISIONTS uses the Default Client Settings . This task sequence starts
immediately after the client registers, so it won't be part of any collection to which you've deployed custom client settings.
The client doesn't process or apply custom client settings before this task sequence runs.
For the task sequence to work properly, you may need to change certain settings in the Default Client Settings . For
example,
Cloud Ser vices group: Enable clients to use a cloud management gateway and Allow access to cloud
distribution point
Computer Agent group: PowerShell execution policy
If devices don't need these client settings after the task sequence completes, deploy new custom client settings to reverse
the default settings.
For more information, see About client settings.
RESETKEYINFORMATION
If a client has the wrong Configuration Manager trusted root key, it can't contact a trusted management point to
receive the new trusted root key. Use this property to remove the old trusted root key. This situation may occur
when you move a client from one site hierarchy to another. This property applies to clients that use HTTP and
HTTPS client communication. For more information, see Planning for the trusted root key.
Example: CCMSetup.exe RESETKEYINFORMATION=TRUE
SITEREASSIGN
Enables automatic site reassignment for client upgrades when used with SMSSITECODE=AUTO.
Example: CCMSetup.exe SMSSITECODE=AUTO SITEREASSIGN=TRUE
SMSCACHEDIR
Specifies the location of the client cache folder on the client computer. By default, the cache location is
%WinDir%\ccmcache .
Use this property with the SMSCACHEFL AGS property to control the client cache folder location. For example,
to install the client cache folder on the largest available client disk drive:
CCMSetup.exe SMSCACHEDIR=Cache SMSCACHEFLAGS=MAXDRIVE
SMSCACHEFLAGS
Use this property to specify further installation details for the client cache folder. You can use
SMSCACHEFL AGS properties individually or in combination separated by semicolons ( ; ).
If you don't include this property:
The client installs the cache folder according to the SMSCACHEDIR property
The folder isn't compressed
The client uses the SMSCACHESIZE property as the size limit in MB of the cache
When you upgrade an existing client, the client installer ignores this property.
Values for the SMSCACHEFLAGS property
PERCENTDISKSPACE : Set the cache size as a percentage of the total disk space. If you specify this
property, also set SMSCACHESIZE to a percentage value.
PERCENTFREEDISKSPACE : Set the cache size as a percentage of the free disk space. If you specify this
property, also set SMSCACHESIZE as a percentage value. For example, the disk has 10 MB free, and you
specify SMSCACHESIZE=50 . The client installer sets the cache size to 5 MB. You can't use this property with
the PERCENTDISKSPACE property.
MAXDRIVE : Install the cache on the largest available disk. If you specify a path with the SMSCACHEDIR
property, the client installer ignores this value.
MAXDRIVESPACE : Install the cache on the disk drive with the most free space. If you specify a path with
the SMSCACHEDIR property, the client installer ignores this value.
NTFSONLY : Only install the cache on an NTFS-formatted disk drive. If you specify a path with the
SMSCACHEDIR property, the client installer ignores this value.
COMPRESS : Store the cache in a compressed form.
FAILIFNOSPACE : If there's insufficient space to install the cache, remove the Configuration Manager
client.
Example: CCMSetup.exe SMSCACHEFLAGS=NTFSONLY;COMPRESS
SMSCACHESIZE
IMPORTANT
Client settings are available for specifying the client cache folder size. The addition of those client settings effectively
replaces using SMSCACHESIZE as a client.msi property to specify the size of the client cache. For more information, see
the client settings for cache size.
When you upgrade an existing client, the client installer ignores this setting. The client also ignores the cache
size when it downloads software updates.
Example: CCMSetup.exe SMSCACHESIZE=100
NOTE
If you reinstall a client, you can't use SMSCACHESIZE or SMSCACHEFL AGS to set the cache size to be smaller than it
was previously. The previous size is the minimum value.
SMSCONFIGSOURCE
Use this property to specify the location and order that the client installer checks for configuration settings. It's a
string of one or more characters, each defining a specific configuration source:
R : Check for configuration settings in the registry.
For more information, see Provision client installation properties.
P : Check for configuration settings in the installation properties from the command line.
M : Check for existing settings when you upgrade an older client.
U : Upgrade the installed client to a newer version and use the assigned site code.
By default, the client installer uses PU . It first checks the installation properties ( P ) and then the existing
settings ( U ).
Example: CCMSetup.exe SMSCONFIGSOURCE=RP
SMSMP
Specifies an initial management point for the Configuration Manager client to use.
IMPORTANT
If the management point only accepts client connections over HTTPS, prefix the management point name with https://
.
Examples:
CCMSetup.exe SMSMP=smsmp01.contoso.com
CCMSetup.exe SMSMP=https://smsmp01.contoso.com
SMSMPLIST
Specifies MP list for the Configuration Manager client to use. Use semi-colon as delimiter when specifying
multiple MP.
IMPORTANT
If the management point only accepts client connections over HTTPS, prefix the management point name with https://
.
Examples:
CCMSetup.exe SMSMPLIST=https://smsmp01.contoso.com;https://smsmp02.contoso.com;smsmp03.contoso.com
CCMSetup.exe SMSMPLIST=https://smsmp01.contoso.com;smsmp02.contoso.com;smsmp03.contoso.com
SMSPUBLICROOTKEY
If the client can't get the Configuration Manager trusted root key from Active Directory Domain Services, use
this property to specify the key. This property applies to clients that use HTTP and HTTPS communication. For
more information, see Planning for the trusted root key.
Example: CCMSetup.exe SMSPUBLICROOTKEY=<keyvalue>
TIP
Get the value for the site's trusted root key from the mobileclient.tcf file on the site server. For more information, see Pre-
provision a client with the trusted root key by using a file.
SMSROOTKEYPATH
Use this property to reinstall the Configuration Manager trusted root key. It specifies the full path and name of a
file that contains the trusted root key. This property applies to clients that use HTTP and HTTPS client
communication. For more information, see Planning for the trusted root key.
Example: CCMSetup.exe SMSROOTKEYPATH=C:\folder\trk
SMSSIGNCERT
Specifies the full path and name of the exported self-signed certificate on the site server. The site server stores
this certificate in the SMS certificate store. It has the Subject name Site Ser ver and the friendly name Site
Ser ver Signing Cer tificate .
Export the certificate without the private key, store the file securely, and access it only from a secured channel.
Example: CCMSetup.exe /UsePKICert SMSSIGNCERT=C:\folder\smssign.cer
SMSSITECODE
This property specifies a Configuration Manager site to which you assign the client. This value can either be a
three-character site code or the word AUTO . If you specify AUTO , or don't specify this property, the client
attempts to determine its site assignment from Active Directory Domain Services or from a specified
management point. To enable AUTO for client upgrades, also set SITEREASSIGN=TRUE.
NOTE
If you also specify an internet-based management point with the CCMHOSTNAME property, don't use AUTO with
SMSSITECODE . Directly assign the client to its site by specifying the site code.
2.5.4.7 L Locality
NOTE
For more information about how to extend the Active Directory schema for Configuration Manager, and how to publish a
site, see Schema extensions for Configuration Manager.
NOTE
The client installation properties are used to install the client. These properties might be overwritten with new settings
from its assigned site after the client is installed and has successfully been assigned to a Configuration Manager site.
Use the details in the following sections to determine which Configuration Manager client installation methods
use Active Directory Domain Services to obtain client installation properties.
NOTE
You do not have to specify any CCMSetup properties for client push installation, or the fallback status point, or the
trusted root key in the Installation Proper ties tab. These settings are automatically supplied to clients when they are
installed by using client push installation. In addition to Client.msi properties, CCMSetup supports the following
parameters: /forcereboot, /skipprereq, /logon, /BITSPriority, /downloadtimeout, /forceinstall
Any properties that you specify in the Installation Proper ties tab are published to Active Directory Domain
Services if the site is published to Active Directory Domain Services. These settings are read by client
installations where CCMSetup is run with no installation properties.
IMPORTANT
Starting in January 2022, this feature of Configuration Manager is deprecated. For more information, see Mac computers.
Follow these steps to make sure that you're ready to deploy the Configuration Manager client to Mac computers.
For the list of supported versions, see Supported operating systems for clients and devices.
Certificate requirements
Client installation and management for Mac computers requires public key infrastructure (PKI) certificates. PKI
certificates secure the communication between the Mac computers and the Configuration Manager site by using
mutual authentication and encrypted data transfers. Configuration Manager can request and install a user client
certificate. It uses Certificate Services with an enterprise certification authority, and the Configuration Manager
enrollment point and enrollment proxy point. You can also request and install a computer certificate
independently from Configuration Manager. This certificate must meet the Configuration Manager certificate
requirements.
Configuration Manager Mac clients always check for certificate revocation. You can't disable this function.
If Mac clients can't locate the certificate revocation list (CRL), they can't connect to Configuration Manager site
systems. Especially for Mac clients in a different forest to the issuing certification authority, check your CRL
design. Make sure that Mac clients can locate and download a CRL.
Before you install the Configuration Manager client on a Mac computer, decide how to install the client
certificate:
Use Configuration Manager enrollment by using the CMEnroll tool. The enrollment process doesn't
support automatic certificate renewal. Re-enroll Mac computers before the certificate expires.
Use a certificate request and installation method that's independent from Configuration Manager.
For more information about Mac client certificate requirements, see PKI certificate requirements for
Configuration Manager.
Mac clients are automatically assigned to the Configuration Manager site that manages them. Mac clients install
as internet-only clients, even if communication is restricted to the intranet. This configuration means that they
communicate with internet-enabled management points and distribution points in their assigned site. Mac
computers don't communicate with site systems outside their assigned site.
IMPORTANT
The Configuration Manager client for macOS can't be used to connect to a management point that's configured to use a
database replica.
IMPORTANT
To deploy the client to devices running macOS Sierra, the subject name of the management point certificate must be
configured correctly. For example, use the FQDN of the management point server.
Next steps
Deploy the Configuration Manager client to Mac computers
How to deploy clients to Macs
2/16/2022 • 9 minutes to read • Edit Online
IMPORTANT
Starting in January 2022, this feature of Configuration Manager is deprecated. For more information, see Mac computers.
This article describes how to deploy and maintain the Configuration Manager client on Mac computers. To learn
about what you have to configure before deploying clients to Mac computers, see Prepare to deploy client
software to Macs.
When you install a new client for Mac computers, you might have to also install Configuration Manager updates
to reflect the new client information in the Configuration Manager console.
In these procedures, you have two options for installing client certificates. Read more about client certificates for
Macs in Prepare to deploy client software to Macs.
Use Configuration Manager enrollment by using the CMEnroll tool. The enrollment process doesn't
support automatic certificate renewal. Re-enroll the Mac computer before the installed certificate expires.
Use a certificate request and installation method that is independent from Configuration Manager.
IMPORTANT
To deploy the client to devices running macOS Sierra, correctly configure the Subject name of the management point
certificate. For example, use the FQDN of the management point server.
6. Choose Add .
7. In the Add Cer tification Authority for Mobile Devices window, select the certification authority
server that issues certificates to Mac computers.
8. In the Create Enrollment Profile dialog box, select the Mac computer certificate template that you
previously created.
9. Select OK to close the Enrollment Profile dialog box, and then the Default Client Settings dialog box.
TIP
If you want to change the client policy interval, use Client policy polling inter val in the Client Policy client
setting group.
The next time the devices download client policy, Configuration Manager applies these settings for all users. To
initiate policy retrieval for a single client, see Initiate policy retrieval for a Configuration Manager client.
In addition to the enrollment client settings, make sure that you have configured the following client device
settings:
Hardware inventor y : Enable and configure this feature if you want to collect hardware inventory from
Mac and Windows client computers. For more information, see How to extend hardware inventory.
Compliance settings : Enable and configure this feature if you want to evaluate and remediate settings
on Mac and Windows client computers. For more information, see Plan for and configure compliance
settings.
For more information, see How to configure client settings.
1. Save ConfigmgrMacClient.msi to a computer that runs Windows. This file isn't on the Configuration
Manager installation media.
2. Run the installer on the Windows computer. Extract the Mac client package, Macclient.dmg , to a folder
on the local disk. The default path is
C:\Program Files\Microsoft\System Center Configuration Manager for Mac client .
IMPORTANT
When you use an email address to populate the User name field, Configuration Manager
automatically populates the Ser ver name field. It uses the default name of the enrollment proxy
point server and the domain name of the email address. If these names don't match the name of
the enrollment proxy point server, fix the Ser ver name during enrollment.
The user name and corresponding password must match an Active Directory user account
that has Read and Enroll permissions on the Mac client certificate template.
Ser ver name : The name of the enrollment proxy point server.
Client and certificate automation with CMEnroll
Use this procedure for automation of client installation and requesting and enrollment of client certificates with
the CMEnroll tool. To run the tool, you must have an Active Directory user account.
1. On the Mac computer, navigate to the folder where you extracted the contents of the Macclient.dmg file.
2. Enter the following command: sudo ./ccmsetup
3. Wait until you see the Completed installation message. Although the installer displays a message that
you must restart now, don't restart, and continue to the next step.
4. From the Tools folder on the Mac computer, type the following command:
sudo ./CMEnroll -s <enrollment_proxy_server_name> -ignorecertchainvalidation -u '<user_name>'
After the client installs, the Mac Computer Enrollment wizard opens to help you enroll the Mac computer.
For more information, see Enroll the client by using the Mac computer enrollment wizard.
Example: If the enrollment proxy point server is named ser ver02.contoso.com , and you grant
contoso\mnor th permissions for the Mac client certificate template, type the following command:
sudo ./CMEnroll -s server02.contoso.com -ignorecertchainvalidation -u 'contoso\mnorth'
NOTE
If the user name includes any of the following characters, enrollment fails: <>"+=, . Use an out-of-band certificate
with a user name that doesn't include these characters.
For a more seamless user experience, script the installation steps. Then users only have to supply their user name
and password.
5. Type the password for the Active Directory user account. When you enter this command, it prompts for
two passwords. The first password is for the super user account to run the command. The second prompt
is for the Active Directory user account. The prompts look identical, so make sure that you specify them in
the correct sequence.
6. Wait until you see the Successfully enrolled message.
7. To limit the enrolled certificate to Configuration Manager, on the Mac computer, open a terminal window
and make the following changes:
a. Enter the command
sudo /Applications/Utilities/Keychain Access.app/Contents/MacOS/Keychain Access
b. In the Keychain Access window, in the Keychains section, choose System . Then in the
Categor y section, choose Keys .
c. Expand the keys to view the client certificates. Find the certificate with a private key that you
installed, and open the key.
d. On the Access Control tab, choose Confirm before allowing access .
e. Browse to /Librar y/Application Suppor t/Microsoft/CCM , select CCMClient , and then choose
Add .
f. Choose Save Changes and close the Keychain Access dialog box.
8. Restart the Mac computer.
To verify that the client installation is successful, open the Configuration Manager item in System
Preferences on the Mac computer. Also update and view the All Systems collection in the Configuration
Manager console. Confirm that the Mac computer appears in this collection as a managed client.
TIP
To help troubleshoot the Mac client, use the CMDiagnostics tool included with the Mac client package. Use it to collect
the following diagnostic information:
A list of running processes
The macOS X operating system version
macOS X crash reports relating to the Configuration Manager client including CCM*.crash and System
Preference.crash .
The Bill of Materials (BOM) file and property list (.plist) file created by the Configuration Manager client installation.
The contents of the folder /Librar y/Application Suppor t/Microsoft/CCM/Logs .
The information collected by CmDiagnostics is added to a zip file that is saved to the desktop of the computer and is
named cmdiag-<hostname>-<datetime>.zip
Manage certificates external to Configuration Manager
You can use a certificate request and installation method independent from Configuration Manager. Use the
same general process, but include the following additional steps:
When you install the Configuration Manager client, use the MP and SubjectName command-line
options. Enter the following command:
sudo ./ccmsetup -MP <management point internet FQDN> -SubjectName <certificate subject name> . The
certificate subject name is case-sensitive, so type it exactly as it appears in the certificate details.
Example: The management point's internet FQDN is ser ver03.contoso.com . The Mac client certificate
has the FQDN of mac12.contoso.com as a common name in the certificate subject. Use the following
command: sudo ./ccmsetup -MP server03.contoso.com -SubjectName mac12.contoso.com
If you have more than one certificate that contains the same subject value, specify the certificate serial
number to use for the Configuration Manager client. Use the following command:
sudo defaults write com.microsoft.ccmclient SerialNumber -data "<serial number>" .
IMPORTANT
After you replace the client SMSID, when you delete the old resource in the Configuration Manager console, you also
delete any stored client history. For example, hardware inventory history for that client.
1. Create and populate a device collection for the Mac computers that must renew the computer certificates.
2. In the Assets and Compliance workspace, start the Create Configuration Item Wizard .
3. On the General page of the wizard, specify the following information:
Name : Remove SMSID for Mac
Type : Mac OS X
4. On the Suppor ted Platforms page, select all macOS X versions.
5. On the Settings page, select New . In the Create Setting window, specify the following information:
Name : Remove SMSID for Mac
Setting type : Script
Data type : String
6. In the Create Setting window, for Discover y script , select Add script . This action specifies a script to
discover Mac computers configured with an SMSID.
7. In the Edit Discover y Script window, enter the following shell script:
See also
Prepare to deploy clients to Macs
Maintain Mac clients
How to assign clients to a site in Configuration
Manager
2/16/2022 • 8 minutes to read • Edit Online
NOTE
Always assign clients to sites running the same version of Configuration Manager. Avoid assigning a client from a later
release to a site on an earlier release. If necessary, update the primary site to the same Configuration Manager version
that you use for the clients.
After the client assigns to a site, it remains assigned to that site, even if it changes its IP address or roams to
another site. Only an administrator can manually assign the client to another site or remove the client
assignment.
WARNING
An exception to a client remaining assigned to a site is if you assign the client on a Windows Embedded device with write
filters enabled. If you don't first disable write filters before you assign the client, the site assignment status of the client
reverts to its original state when the device next restarts. For example, if you configure the client for automatic site
assignment, it reassigns on startup and might assign to a different site. If the client requires manual site assignment, you
have to manually reassign it before you can manage it.
To avoid this behavior, disable the write filters before you assign the client on embedded devices. Then enable the write
filters after you have verified that site assignment was successful.
If assignment fails, the client remains installed, but you can't manage it. A client is considered unmanaged when
it's installed but not assigned to a site. It's also unmanaged when it's assigned to a site but it can't communicate
with a management point.
NOTE
If a client computer has multiple network adapters and multiple IP addresses, the IP address used to evaluate client site
assignment is assigned randomly.
For more information about how to configure boundary groups for site assignment, see Define site boundaries
and boundary groups.
Configuration Manager clients that use automatic site assignment attempt to find site boundary groups that you
publish to Active Directory Domain Services. If this process fails, clients can get boundary group information
from a management point. This process can fail if you don't extend the Active Directory schema for
Configuration Manager, or clients are workgroup computers.
When you install the client, you can specify a management point for it to use, or the client can locate a
management point automatically. For more information, see How clients find site resources and services.
If the client can't find a site in a boundary group for its network location, and the hierarchy doesn't have a
fallback site, the client retries every 10 minutes. It repeats this process until it assigns to a site.
Configuration Manager clients can't automatically assign to a site if any of the following conditions apply:
They are currently assigned to a site.
They are on the internet or configured as internet-only clients.
Their network location doesn't fall within one of the boundary groups in the hierarchy, and there's no
fallback site.
If any of these conditions apply, you have to manually assign the client.
Configuration Manager also checks that you've assigned the current branch client to a site that supports it.
The site compatibility check requires one of the following conditions:
The client can access site information published to Active Directory Domain Services.
The client can communicate with a management point in the site.
If the site compatibility check fails to finish successfully, the site assignment fails. The client remains unmanaged
until the site compatibility check runs again and succeeds.
An exception to this site compatibility check is when you configure a client for an internet-based management
point. In this case, Configuration Manager doesn't check site compatibility. If you assign clients to a site that
contains internet-based site systems, and you specify an internet-based management point, make sure that you
assign the client to the correct site.
Scenarios for assignment of legacy clients
The following scenarios might occur during migration from previous versions of Configuration Manager:
You use automatic site assignment and boundaries overlap between versions of Configuration Manager
In this case, the client automatically tries to find a current branch site.
The client first checks Active Directory Domain Services. If it finds a current branch site published, site
assignment succeeds. If this check fails, the client then checks for site information from its assigned
management point.
NOTE
You can specify an initial management point for the client during client installation. For more information, see Client
installation properties - SMSMP.
If both these methods fail, site assignment fails. You need to manually assign the client.
Accidental manual assignment to a legacy site version
For example, you assign a current branch client with a specific site code, and mistakenly specify a site code for a
version of Configuration Manager earlier than System Center 2012 R2 Configuration Manager.
In this case, site assignment fails. Manually reassign the client to a current branch site.
NOTE
If a client doesn't meet any of the settings, the site marks it as inactive.
Client policy requests during the following days: Specify the number of days since the client
requested policy from the site. The default value is 7 days.
Compare this value to the Client policy polling inter val setting in the Client Policy group of
client settings. Its default is 60 minutes. In other words, a client should poll the site for policy every
hour. If it doesn't request policy after one week, the site marks it as inactive.
Hear tbeat discover y during the following days: Specify the number of days since the client
sent a heartbeat discovery record to the site. The default value is 7 days.
Compare this value to the schedule for the Heartbeat discovery method. By default, the site runs
heartbeat discovery once a week.
Hardware inventor y during the following days: Specify the number of days since the client
sent a hardware inventory record to the site. The default value is 7 days.
Compare this value to the Hardware inventor y schedule setting in the Hardware Inventor y
group of client settings. Its default is seven days.
Software inventor y during the following days: Specify the number of days since the client
sent a software inventory record to the site. The default value is 7 days.
Compare this value to the Schedule software inventor y and file collection setting in the
Software Inventor y group of client settings. Its default is seven days.
Status messages during the following days: Specify the number of days since the client sent
any status messages to the site. The default value is 7 days. The client can send status messages
for different kinds of activities, such as running a task sequence. The site deletes old status
messages as part of the maintenance task, Delete Aged Status Messages .
3. Specify the following value to determine how long the site keeps client status history data:
Retain client status histor y for the following number of days: By default, the site keeps client
status information for 31 days. This setting doesn't have any impact on client or site behavior. It's
similar to a maintenance task for client status history.
NOTE
When you change the schedule for client status updates, it doesn't take effect until the next scheduled client
status update on the previous schedule.
Configure alerts
1. In the Configuration Manager console, go to the Assets and Compliance workspace, and select the
Device Collections node.
2. Select the collection for which you want to configure alerts. On the Home tab of the ribbon, in the
Proper ties group, select Proper ties .
NOTE
You can't configure alerts for user collections.
TIP
You can only view the Aler ts tab if your security role has permissions for alerts.
Choose the alerts that you want the site to generate for client status thresholds, and select OK .
4. In the Conditions list of the Aler ts tab, select each client status alert, and then specify the following
information:
Aler t Name : Accept the default name or enter a new name for the alert.
Aler t Severity : Choose the alert level that the Configuration Manager console displays.
Raise aler t : Specify the threshold percentage for the alert.
Next steps
Monitor clients
How to monitor client deployment status in
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
The best and most reliable way to monitor client deployment is with the Configuration Manager console (as described in
this article). The Client Status section of the Monitoring workspace in the console provides client deployment status
accurately and in real time. You can monitor client deployments with other tools, such as Server Manager in Windows
Server or System Center Operations Manager, but you may receive alarms from normal client installation activity. Because
of how the client installation program (CCMSetup.exe) runs in various environments, these other tools may generate false
alarms and warnings that do not accurately reflect the state of client deployments.
In the Monitoring workspace of the console, you can monitor the following statuses for client deployments
taking place within a collection that you specify:
Compliant
In progress
Not compliant
Failed
Unknown
Configuration Manager reports on deployments for production clients or pre-production clients. The
Configuration Manager console also provides a chart of failed client deployments over a specified period
of time to help you determine if actions you to take to troubleshoot deployments are improving the
deployment success rate over time.
TIP
These messages use the client notification channel. For more information, see Ports used in Configuration
Manager.
Client activity : The site considers the client as active if it has communicated with Configuration
Manager in the past seven days. The site considers the client inactive if it hasn't done the following
actions in seven days:
Requested policy update
Sent a heartbeat message
Sent hardware inventory
Client check : The state of the periodic evaluation that the Configuration Manager client runs on the
device. The evaluation checks the device and can remediate some of the problems it finds. For more
information, see Client health checks.
Client check runs automatically during the Windows maintenance window.
You can configure remediation not to run on specific devices, for example, a business-critical server. For
more information, see How to configure client status.
If there are more items that you want to evaluate, use Configuration Manager compliance settings to
monitor other configurations. For more information about compliance settings, see Plan for and
configure compliance settings.
Decommissioned : The site has marked the device record for deletion. This behavior can happen when a
new registration for same device assigns to the same or a different primary site in a hierarchy. The site
deletes these devices the next time it runs the site maintenance task Delete Aged Discover y Data .
Obsolete : The site has discovered a new device record with the same hardware ID, so it marks the old
record as obsolete. Reports don't count obsolete records of the same device multiple times. You can still
target policies to obsolete devices. If the site doesn't get a heartbeat for an obsolete record after 90 days
of inactivity, it removes the obsolete device when it runs the site maintenance task Delete Obsolete
Client Discover y Data .
TIP
The Power BI sample reports for Configuration Manager includes a report called Client Status . This report can also help
with monitoring clients.
IC O N DESC RIP T IO N
Device is online.
Device is offline.
2. For more detailed online status, add the client online status information to the device view. Right-click the
column header and select the online status fields you want to add:
Device Online Status : Indicates whether the client is currently online or offline. (This status is the
same information given by the icons.)
Last Online Time : Indicates when the client online status changed to online.
Last Offline Time indicates when the status changed to offline.
3. Select an individual client in the list pane to see more status in the detail pane. This information includes
client activity and client check status.
Next steps
Use the client health dashboard to view your client health, scenario health, and common errors. Filter the
view by several attributes to see any potential issues by OS and client versions. For more information, see Client
health dashboard.
For more information about the log files used by client deployment and management operations, see Log files.
Client health dashboard
2/16/2022 • 7 minutes to read • Edit Online
NOTE
Configuration Manager version 2111 includes improvements to this dashboard. This article mainly focuses on the current
experience. For more information on the dashboard appearance and behavior in version 2107 and earlier, see Version
2107 and earlier.
To view this dashboard your account needs the Read Client Status Settings permission on the Site object.
Configure
There are two actions in the ribbon to configure client health and the dashboard:
Choose Default Collection : Set a persistent user preference for the collection to scope the dashboard.
When you set the collection on the Filter tile of the dashboard, that selection resets when you refresh the
dashboard.
Client Status Settings : Adjust the evaluation periods for scenario health. By default, if a client doesn't
send scenario-specific data in 7 days , Configuration Manager considers it unhealthy for that scenario.
TIP
You can also configure these settings from the ribbon of the Client Status node.
Scenario health isn't measured from your configuration of client settings. These values can vary based upon the
resultant set of policy per device.
Filters
The single Filter tile at the top of the dashboard lets you adjust the data that it displays. It includes the following
filters:
Include client health for offline clients : By default, the dashboard displays only online clients. This
state comes from the client notification channel that updates a client's status every five minutes. For more
information, see About client status.
Only show unhealthy client details : Scope the view to only devices that are reporting a client health
failure.
TIP
Combine this filter with the tiles for Client Versions and OS Versions . For more information, see Version tiles.
Clients active in last number of days : By default, the dashboard displays clients that are active in the
last three days.
Client health for clients in the following collections : By default, the dashboard displays devices in
the All Systems collection. Browse for a device collection to scope the view to a subset of devices in a
specific collection.
TIP
This filter is temporary. When you refresh the dashboard, it'll reset to the default. To change the collection scope
so it's persistent, use the Choose default collection action in the ribbon. For more information, see Configure
the dashboard.
This tile shows the percentage of clients that report any health issue. This percentage should be as close to 0%
as possible.
Hover over the segment to see the number of devices that are unhealthy. Select it to drill down to a device list
view.
TIP
This tile replaces the Combined (All) and Combined (Any) scenarios from earlier versions.
Version tiles
C L IEN T VERSIO N S O S VERSIO N S
There are two tiles that show client health by Configuration Manager Client versions and OS versions . These
tiles are useful when you make changes to the filters, such as Failure only . They can help highlight whether any
issues are consistent across a specific version. Use this information to help you make upgrade decisions.
Select a segment of these charts to drill down to a device list view.
Select Show table to switch to a table view of the data. You can select and copy the data from the table. Select
Show char t to show the donut chart. The following example shows a chart of Configuration Manager client
versions:
Scenario health
This bar chart shows the overall health for the following core scenarios:
Client health evaluation (client policy)
Policy request
Software inventory
Hardware inventory
Heartbeat discovery
Status messaging operational (status messages)
This tile shows the percentage of healthy clients for the selected scenario. To adjust the number of days the chart
displays, use the slider control at the top of the tile.
NOTE
The maximum value for the slider control is the same as the Retain client status histor y for the following number
of days in Client Status Settings . It's 31 days by default.
It's limited by the amount of client health data in the site database. For example, you configure it to display 31 days of
history. There's only three days of available data, so the chart shows three days.
This chart lists the most common failures in your environment. These errors come from Windows or
Configuration Manager.
Select a row of this table to drill down to a device list view. This action lets you easily create a collection of
devices to target a remediation action or for more detailed reporting.
TIP
Use this filter along with the client version and OS version tiles. For more information, see Version tiles.
Next steps
For more information on the client's regular checks to keep healthy, see Client health checks.
Use the Surface device dashboard to see the use of Surface devices in your environment.
Client health checks
2/16/2022 • 5 minutes to read • Edit Online
Client checks
Verify that the client was installed correctly
If the client isn't correctly installed, start by troubleshooting client install. Review the ccmsetup.log. Often,
remediation requires that you reinstall the client.
Verify that client prerequisites are installed
Verify that the client prerequisites are installed. It reads the file ccmsetup.xml in the client installation folder to
discover the prerequisites. By default: C:\Windows\ccmsetup\ccmsetup.xml
Most client prerequisites are available by default in Windows, or installed automatically by the Configuration
Manager client. To remediate problems with prerequisites, you can try to install them manually, or reinstall the
client.
Verify the client service
There are three checks for the SMS Agent Host client service ( CcmExec ):
First, it verifies that the service exists. If it doesn't exist, you need to reinstall the client.
Next, it verifies that the service startup type is automatic. To remediate a failure with this check, reset the
service startup type to automatic. Check group policies to make sure something isn't automatically
configuring the service startup type.
Then it verifies that the client service is running. The remediation for this check is to start the client
service. Then monitor it to make sure it keeps running. Review Windows event logs to see if there are any
related activities that might be stopping the service. Review client logs to make sure it's not failing to
start.
Verify that client check has recently run
Verify that the client check scheduled task ( CcmEval ) has run at least one time in the past three days. You can
manually run the scheduled task. Make sure that Windows can run scheduled tasks.
Verify that the client database is healthy
The client uses Microsoft SQL Server Compact Edition (CE) to locally store information. If this check fails,
reinstall the Configuration Manager client to remediate.
Verify WMI
There are several checks specific to WMI. The first three checks are for the Windows Management
Instrumentation (WMI) service ( Winmgmt ).
Verify that the service exists. WMI is a fundamental component of Windows. If this service doesn't exist,
you may need to reinstall Windows.
Verify that the service startup type is automatic. To remediate a failure with this check, reset the service
startup type to automatic. Check group policies to make sure something isn't automatically configuring
the service startup type.
Verify that the service is running. The remediation for this check is to start the WMI service. Then monitor
it to make sure it keeps running. Review Windows event logs to see if there are any related activities that
might be stopping the service.
There are two other checks to test the overall health of WMI on the device:
The WMI repository integrity test checks that Configuration Manager client entries exist in WMI. If this
check fails, reinstall the Configuration Manager client.
The WMI event sink test checks whether the Configuration Manager-related WMI event sink is lost. If this
check fails, restart the client service.
Verify the antimalware service
There are two checks for whatever antimalware service is registered with Windows:
Verify that the antimalware service startup type is automatic. To remediate a failure with this check, reset
the service startup type to automatic. Check group policies to make sure something isn't automatically
configuring the service startup type.
Verify that the antimalware service is running. The remediation for this check is to start the antimalware
service. Then monitor it to make sure it keeps running. Review Windows event logs to see if there are any
related activities that might be stopping the service.
If you're using Windows Defender, the Configuration Manager client also verifies the Windows Defender
Antivirus Network Inspection Ser vice ( WdNisSvc ). It checks to make sure the service startup type is manual.
Verify Windows Update service
This check verifies that the Windows Update service ( wuauserv ) startup type is automatic or manual. To
remediate a failure with this check, reset the service startup type to automatic. Check group policies to make
sure something isn't automatically configuring the service startup type.
Verify the policy platform
There are three checks for the Microsoft Policy Platform service ( lppsvc ):
Verify that the service exists. The policy platform is one of the prerequisite components that the
Configuration Manager client automatically installs. If this service doesn't exist, reinstall the Configuration
Manager client.
Verify that the service startup type is manual. To remediate a failure with this check, reset the service
startup type to manual. Check group policies to make sure something isn't automatically configuring the
service startup type.
Policy platform WMI integrity test. Repair the policy platform.
Verify BITS service
There are two checks for the Background Intelligent Transfer Ser vice ( BITS ):
Verify that the service exists. BITS is a fundamental component of Windows. If this service doesn't exist,
you may need to reinstall Windows.
Verify that the service startup type is automatic or manual. To remediate a failure with this check, reset
the service startup type to automatic. Check group policies to make sure something isn't automatically
configuring the service startup type.
Verify remote control
If you enable the remote control agent in client settings, there are two checks for the Configuration Manager
Remote Control service ( CmRcService ):
Verify that the service type is automatic or manual. To remediate a failure with this check, reset the
service startup type to automatic. Check group policies to make sure something isn't automatically
configuring the service startup type.
Verify that the service is running. The remediation for this check is to start the remote control service.
Then monitor it to make sure it keeps running. Review Windows event logs to see if there are any related
activities that might be stopping the service.
Verify wake -up proxy
If you enable the wake-up proxy in client settings, there are two checks for the Configuration Manager
Wake-up Proxy service:
Verify that the service startup type is automatic. To remediate a failure with this check, reset the service
startup type to automatic. Check group policies to make sure something isn't automatically configuring
the service startup type.
Verify that the service is running. The remediation for this check is to start the wake-up proxy service.
Then monitor it to make sure it keeps running. Review Windows event logs to see if there are any related
activities that might be stopping the service.
Next steps
Client health dashboard
How to configure client status
How to deploy clients to Windows computers
Configuration Manager troubleshooting
Surface device dashboard in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
How to open
To open the Surface device dashboard, use the following steps:
1. Open the Configuration Manager console.
2. Select the Monitoring workspace.
3. To load the dashboard, select the Surface Devices node.
Review information
The Surface device dashboard shows three graphs:
Percent of Surface devices : The percentage of Surface devices throughout your environment.
Surface Models : The number of devices per Surface model. Hover over a graph section to see the
percentage of Surface devices for that model.
Top five firmware versions : The top five firmware models in your environment. Hover over a graph
section to see the number of Surface devices with that firmware version. Select a graph section to go
through to a device list.
Next steps
You can use Configuration Manager to deploy Surface firmware updates. For more information, see Managing
Surface driver updates.
For more information about Surface devices, see the Surface website.
How to manage clients in Configuration Manager
2/16/2022 • 14 minutes to read • Edit Online
NOTE
If you install the Configuration Manager client, but it hasn't yet successfully assigned to a site, it might not display in the
console. After the client assigns to a site, update collection membership, and then refresh the console view.
A device can also display in the console when the Configuration Manager client isn't installed. This behavior happens if the
site discovers a device but the client isn't installed and assigned.
Mobile devices managed with the Exchange Server connector or on-premises MDM don't install the Configuration
Manager client.
To manage a device from the console, use the Client column in the Devices node to determine whether the client is
installed.
TIP
There are many different ways to install the Configuration Manager client. Although the Client Push wizard offers a
convenient client installation method from the console, this method has many dependencies and isn't suitable for all
environments. For more information about the dependencies, see Prerequisites for deploying clients to Windows
computers. For more information about the other client installation methods, see Client installation methods.
For more information, see How to install Configuration Manager clients by using client push.
Run script
Opens the Run Script wizard to run a PowerShell script on the selected device.
For more information, see Create and run PowerShell scripts.
Install application
Install an application to a device in real time. This feature can help reduce the need for separate collections for
every application.
Starting in version 2111, select the Install Application Group action for an app group.
For more information, see Install applications for a device.
Reassign site
Reassign one or more clients, including managed mobile devices, to another primary site in the hierarchy. You
can individually reassign clients or select more than one to reassign them in bulk.
Client settings - Resultant client settings
When you deploy multiple client settings to the same device, the prioritization and combination of settings is
complex. Use this option to view the resultant set of client settings deployed to this device.
For more information, see How to configure client settings.
Start
Run Resource Explorer to see the hardware and software inventory information from a Windows client.
For more information, see the following articles:
How to use Resource Explorer to view hardware inventory
How to use Resource Explorer to view software inventory
Remotely administer the device by using Remote Control , Remote Assistance , or Remote Desktop
Client . For more information, see How to remotely administer a Windows client computer.
Approve
When the client communicates with site systems using HTTP and a self-signed certificate, you must approve
these clients to identify them as trusted computers. By default, the site configuration automatically approves
clients from the same Active Directory forest, trusted forests, and connected Azure Active Directory (Azure AD)
tenants. This default behavior means that you don't have to manually approve each client. Manually approve
workgroup computers or clients from an untrusted forest that you trust, and any other unapproved computers
that you trust.
IMPORTANT
Although some management functions might work for unapproved clients, this is an unsupported scenario for
Configuration Manager.
You don't have to approve clients that always communicate to site systems using HTTPS, or clients that use a PKI
certificate when they communicate to site systems using HTTP. These clients establish trust by using the PKI
certificates.
Block or unblock
Block a client that you no longer trust. Blocking prevents the client from receiving policy, and prevents site
systems from communicating with the client.
IMPORTANT
Blocking a client only prevents communication from the client to Configuration Manager site systems. It doesn't prevent
communication to other devices. When the client communicates to site systems by using HTTP instead of HTTPS, there
are some security limitations.
TIP
Check the manufacturer's documentation for more information about how the mobile device processes a remote wipe
command.
There's often a delay until the mobile device receives the wipe command:
If the mobile device is enrolled by Configuration Manager, the client receives the command when it
downloads its client policy.
If the mobile device is managed by the Exchange Server connector, it receives the command when it
synchronizes with Exchange.
To monitor when the device receives the wipe command, use the Wipe Status column. Until the device sends a
wipe acknowledgment to Configuration Manager, you can cancel the wipe command.
Retire a mobile device
The Retire option is supported only by mobile devices enrolled by on-premises MDM.
For more information, see Help protect your data with remote wipe, remote lock, or passcode reset.
Change ownership
If a device isn't domain-joined and doesn't have the Configuration Manager client installed, use this option to
change the ownership to Company or Personal .
You can use this value in application requirements to control deployments, and to control how much inventory
is collected from users' devices.
You may need to add the Device Owner column to the view by right-clicking any column heading and
choosing it.
Delete
WARNING
Don't delete a client if you want to uninstall the Configuration Manager client or remove it from a collection.
The Delete action manually removes the client record from the Configuration Manager database. Only use this
action to troubleshoot a problem. If you delete the object, but the client is still installed and communicating with
the site, Heartbeat Discovery recreates the client record. It reappears in the Configuration Manager console,
although the client history and any previous associations are lost.
NOTE
When you delete a mobile device client that was enrolled by Configuration Manager, this action also revokes the issued
PKI certificate. This certificate is then rejected by the management point, even if IIS doesn't check the certificate revocation
list (CRL).
Certificates on mobile device legacy clients are not revoked when you delete these clients.
Restart clients
Use the Configuration Manager console to identify clients that require a restart. Then use a client notification
action to restart them.
TIP
Enable automatic client upgrade to keep your clients up-to-date with less effort. For more information, see About
automatic client upgrade.
To identify devices that are pending a restart, go to the Assets and Compliance workspace in the
Configuration Manager console and select the Devices node. Then view the status for each device in the details
pane in a new column named Pending Restar t . Each device has one or more of the following values:
No : there's no pending restart
Configuration Manager : this value comes from the client reboot coordinator component
(RebootCoordinator.log)
File rename : this value comes from Windows reporting a pending file rename operation (
HKLM\SYSTEM\CurrentControlSet\Control\Session Manager, PendingFileRenameOperations )
Windows Update : this value comes from the Windows Update Agent reporting a pending restart is
required for one or more updates (
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired )
Add or remove feature : this value comes from the Windows component-based servicing reporting the
addition or removal of a Windows feature requires a restart (
HKLM\Software\Microsoft\Windows\CurrentVersion\Component Based Servicing\Reboot Pending )
NOTE
You can't uninstall the Configuration Manager client from a mobile device. If you must remove the Configuration Manager
client from a mobile device, you must wipe the device, which deletes all data on the mobile device.
1. Open a Windows command prompt as an administrator. Change the folder to the location in which
CCMSetup.exe is located, for example: cd %windir%\ccmsetup
2. Run the following command: CCMSetup.exe /uninstall
TIP
The uninstall process displays no results on the screen. To verify that the client successfully uninstalls, see the following log
file: %windir%\ccmsetup\logs\CCMSetup.log
If you need to wait for the uninstall process to complete before doing something else, run Wait-Process CCMSetup in
PowerShell. This command can pause a script until the CCMSetup process completes.
Starting in version 2111, when you uninstall the client it also removes the client bootstrap, ccmsetup.msi, if it
exists.
NOTE
You can also use client notification to start policy retrieval for all devices in a collection.
Start client policy retrieval from the Configuration Manager client control panel
1. Open the Configuration Manager control panel on the computer.
2. Switch to the Actions tab. Select Machine Policy Retrieval & Evaluation Cycle to start the computer
policy, and then select Run Now .
3. Select OK to confirm the prompt.
4. Repeat the previous steps for any other actions. For example, User Policy Retrieval & Evaluation
Cycle for user client settings.
Start client policy retrieval with Support Center Client Tools
Use Support Center Client Tools to request and view client policy. For more information, see Support Center
reference.
Start client policy retrieval by script
1. Open a script editor, such as Notepad or Windows PowerShell ISE.
2. Copy and insert the following sample PowerShell code into the file:
$trigger = "{00000000-0000-0000-0000-000000000021}"
Invoke-WmiMethod -Namespace root\ccm -Class sms_client -Name TriggerSchedule $trigger
TIP
For more information about the schedule IDs, see Message IDs.
Next steps
Configure the content cache for clients
Client notification
Configure the content cache for Configuration
Manager clients
2/16/2022 • 4 minutes to read • Edit Online
IMPORTANT
Don't encrypt the folder used for the client cache. Configuration Manager can't download content to an encrypted folder.
About
The Configuration Manager client downloads the content for required software soon after the deployment's
available time but waits to run it until the deployment's scheduled time. At the scheduled time, the Configuration
Manager client checks to see whether the content is available in the cache. If content is in the cache and it's the
correct version, the client uses the cached content. When the required version of the content changes, or if the
client deletes the content to make room for another package, the client downloads the content to the cache
again.
If the client attempts to download content for a program or application that's greater than the size of the cache,
the deployment fails because of insufficient cache size. The client generates status message 10050 for
insufficient cache size. If you increase the cache size later, the result is:
For a required program: The client doesn't automatically retry to download the content. Redeploy the
package and program to the client.
For a required application: The client automatically retries to download the content when it downloads its
client policy.
If the client attempts to download content that's less than the size of the cache, but the cache is full, all required
deployments keep retrying until:
The cache space is available
The download times out
The retry count reaches its limit
If you later increase the cache size, the client attempts to download the content again during the next retry
interval. The client tries to download the content every four hours until it tries 18 times.
Cached content isn't automatically deleted and is only removed if new content requires its disk space. It remains
in the cache for the configured number of minutes after the client uses that content. If you configure the content
with the option to persist content in the client cache, the client doesn't automatically delete it. If the cache space
is used by content that was downloaded within the configured number of minutes, and the client must
download new content, either increase the cache size or choose the option to delete persisted cache content. For
more information, see About client settings.
IMPORTANT
Don't manually delete files from the client cache folder using Windows Explorer or the command line. This action can
cause issues with the Configuration Manager client. The client manages the cache and tracks the content apart from the
file system. Always use a supported method to delete files in the cache.
For applications only, if the content for a related deployment currently exists in the cache, then the client
downloads only new or changed files. Related deployments include those deployments for older revisions of the
same deployment type and superseded applications.
Configure
Use the following procedures to configure the client cache during manual client installation or after you install
the client.
Configure the cache during manual client installation
Run the CCMSetup.exe command from the install source location and specify the following properties that you
require, and separated by spaces:
DISABLECACHEOPT
SMSCACHEDIR
SMSCACHEFLAGS
NOTE
Use the cache size settings available in Client Settings in the Configuration Manager console instead of SMSCACHESIZE.
For more information, see Client cache settings.
For more information about how to use these command-line properties for CCMSetup.exe, see About client
installation properties.
Configure the cache during client push installation
1. In the Configuration Manager console, go to the Administration workspace, expand Site
Configuration , and select the Sites node.
2. Select the appropriate site. On the Home tab of the ribbon, in the Settings group, select Client
Installation Settings , and choose Client Push Installation . Switch to the Installation Proper ties
tab.
3. Specify the following properties, separated by spaces:
DISABLECACHEOPT
SMSCACHEDIR
SMSCACHEFLAGS
NOTE
Use the cache size settings available in Client Settings in the Configuration Manager console instead of
SMSCACHESIZE. For more information, see Client cache settings.
For more information about how to use these command-line properties for CCMSetup.exe, see About client
installation properties.
Configure the cache on the client computer
1. On the client computer, open the Configuration Manager control panel.
2. Switch to the Cache tab. Set the space and location properties. The default location is %windir%\ccmcache .
3. To delete the files in the cache folder, choose Delete Files .
IMPORTANT
Don't manually delete files from the ccmcache folder using Windows Explorer or the command line. This action can
cause issues with the Configuration Manager client. The client manages the cache and tracks the content apart
from the file system. Always use a supported method to delete files in the cache. For example, the Delete Files
option on the control panel.
Next steps
Client notification
Client notification in Configuration Manager
2/16/2022 • 5 minutes to read • Edit Online
Actions
The following actions are on the ribbon in the Device or Collection group of the Home tab.
Install client
Opens the Install Client Wizard . This wizard uses client push installation to install a Configuration Manager
client. For more information, see Client push installation.
Permissions - Install client
This action requires the Modify Resource and Read permissions on the Collection object.
The following built-in roles have these permissions by default:
Application Administrator
Full Administrator
Infrastructure Administrator
Operations Administrator
OS Deployment Manager
Add these permissions to any custom roles that need to push the client.
Run script
Opens the Run Script wizard to run a PowerShell script on all of the clients in the collection. For more
information, see Create and run PowerShell scripts.
Permissions - Run script
This action requires the Run Script permission on the Collection object.
The following built-in roles have this permission by default:
Full Administrator
Infrastructure Administrator
Operations Administrator
Add this permission to any custom roles that need to run scripts.
Start CMPivot
Starts CMPivot , which runs real-time queries against the targeted devices. For more information, see CMPivot.
Permissions - Start CMPivot
This action requires the Run CMPivot permission on the Collection object.
Client notification
These actions are under the Client notification menu, on the ribbon in the Device or Collection group of the
Home tab.
You can start a Client Notification from the Devices node or within a collection membership view.
Permissions - Client notification
Client notification actions require the Notify Resource permission on the Collection object. This permission
applies to all actions under the Client notification menu.
The following built-in roles have this permission by default:
Full Administrator
Operations Administrator
Add this permission to any custom roles that need to use client notification actions.
Download computer policy
Refresh the device policy. For more information, see Initiate policy retrieval for a Configuration Manager client.
Download user policy
Refresh the user policy.
Collect discovery data
Trigger clients to send a discovery data record (DDR). For more information, see Heartbeat discovery.
Collect software inventory
Trigger clients to run a software inventory cycle. For more information, see Introduction to software inventory.
Collect hardware inventory
Trigger clients to run a hardware inventory cycle. For more information, see Introduction to hardware inventory.
Evaluate application deployments
Trigger clients to run an application deployment evaluation cycle. For more information, see Schedule re-
evaluation for deployments.
Evaluate software update deployments
Trigger clients to run a software updates deployment evaluation cycle. For more information, see Introduction to
software updates.
Switch to the next software update point
Trigger clients to switch to the next available software update point. For more information, see Software update
point switching.
Evaluate device health attestation
Trigger Windows 10 or later clients to check and send their latest device health state. For more information, see
Health attestation.
Check conditional access compliance
Trigger clients to check compliance for conditional access policies. For more information, see Conditional access.
Wake Up
Trigger devices configured to support Wake-on-LAN to wake up using other devices on the same subnet to send
the Wake-on-LAN package. For more information, see How to configure Wake on LAN.
Restart
Trigger the selected devices to restart. For more information, see Restart clients.
Client diagnostics
Use the following actions to help troubleshoot clients:
Enable verbose logging : Change the global log level for the CCM component to verbose, and enable
debug logging.
Disable verbose logging : Change the global log level to default, and disable debug logging.
Collect Client Logs : The site sends a client notification message to the selected clients to gather the
CCM logs. The client sends the logs to the management point using the same channel as software
inventory file collection. You don't need to enable software inventory in client settings.
The size limit for the compressed client logs is 100 MB.
Use Resource Explorer manage and view these files.
IMPORTANT
These actions only change the log verbosity, not the size or history. More verbose logging can generate more log
content.
The management point role also uses the CCM component. If the targeted device is also a management point, this
action also applies to that role.
For more information about these settings, see About log files.
Track the status of the task in the diagnostics.log on the client. When client logs are collected, additional
information is logged in MP_SinvCollFile.log on the management point and sinvproc.log on the site server.
NOTE
Starting in version 2107, you can inventory client log file settings such as log levels and size. Enable the hardware
inventory class, Client Diagnostics (CCM_ClientDiagnostics) . For more information, see Enable or disable existing
hardware inventory classes.
Endpoint Protection
The following actions are under the Endpoint Protection menu. This menu is on the ribbon in the Collection
group of the Home tab. When you select one or more devices, these actions are on the Selected Object tab of
the ribbon.
For more information, see Endpoint Protection in Configuration Manager.
Permissions - Endpoint Protection
This action requires the Enforce Security permission on the Collection object.
The following built-in roles have this permission by default:
Full Administrator
Endpoint Protection Manager
Operations Administrator
Add this permission to any custom roles that need to trigger Endpoint Protection actions.
Full Scan
Trigger Endpoint Protection or Windows Defender to run a full antimalware scan.
Quick Scan
Trigger Endpoint Protection or Windows Defender to run a quick antimalware scan.
Download Definition
Trigger Endpoint Protection or Windows Defender to download the latest antimalware definitions.
IMPORTANT
Starting in January 2022, this feature of Configuration Manager is deprecated. For more information, see Mac computers.
Here are procedures for uninstalling Mac clients and for renewing their certificates.
NOTE
The -c property instructs the client uninstall to also remove client crash logs and log files. We recommend this to
avoid confusion if you later reinstall the client.
3. If required, manually remove the client authentication certificate that Configuration Manager was using,
or revoke it. CMUnistall does not remove or revoke this certificate.
2. When the Renew Certificate Wizard opens, the User name and Ser ver name fields will typically be pre-
populated and the user can just enter a password to renew the certificate.
NOTE
If the wizard does not open, or if you accidentally close the wizard, click Renew from the Configuration
Manager preference page to open the wizard.
IMPORTANT
If the certificate expires, you must uninstall, reinstall and then re-enroll the Mac client.
This procedure removes the SMSID, which is required to request a new certificate for the same Mac computer.
When you remove and replace the client SMSID, any stored client history such as inventory is deleted after you
delete the client from the Configuration Manager console.
1. Create and populate a device collection for the Mac computers that must renew the user certificates.
WARNING
Configuration Manager does not monitor the validity period of the certificate that it enrolls for Mac computers.
You must monitor this independently from Configuration Manager to identify the Mac computers to add to this
collection.
2. In the Assets and Compliance workspace, start the Create Configuration Item Wizard .
3. On the General page, specify the following information:
Name:Remove SMSID for Mac
Type:Mac OS X
4. On the Suppor ted Platforms page, ensure that all macOS X versions are selected.
5. On the Settings page, choose New and then, in the Create Setting dialog box, specify the following
information:
Name:Remove SMSID for Mac
Setting type:Script
Data type:String
6. In the Create Setting dialog box, for Discover y script , choose Add script to specify a script that
discovers Mac computers with an SMSID configured.
7. In the Edit Discover y Script dialog box, enter the following Shell Script:
When prompted, provide the password for the super user account to run the command and then the
password for the Active Directory user account.
16. To limit the enrolled certificate to Configuration Manager, on the Mac computer, open a terminal window
and make the following changes:
a. Enter the command
sudo /Applications/Utilities/Keychain\ Access.app/Contents/MacOS/Keychain\ Access
b. In the Keychain Access dialog, in the Keychains section, choose System , and then, in the Categor y
section, choose Keys .
c. Expand the keys to view the client certificates. When you have identified the certificate with a private
key that you have just installed, double-click the key.
d. On the Access Control tab, choose Confirm before allowing access .
e. Browse to /Librar y/Application Suppor t/Microsoft/CCM , select CCMClient , and then choose
Add .
f. Choose Save Changes and close the Keychain Access dialog box.
17. Restart the Mac computer.
Introduction to collections in Configuration
Manager
2/16/2022 • 3 minutes to read • Edit Online
O P ERAT IO N EXA M P L E
Grouping resources You can create collections that group resources based on
your organization's hierarchy.
Application deployment You can create a collection of all computers that do not have
Microsoft Microsoft 365 Apps installed and then deploy it to
all computers in that collection.
Power management You can configure specific power settings per collection.
Role-based administration Use collections to control which groups of users have access
to various functionality in the Configuration Manager
console.
Maintenance Windows With maintenance windows you can define a time period
when various Configuration Manager operations can be
carried out on members of a device collection.
C O L L EC T IO N N A M E DESC RIP T IO N
All User Groups Contains the user groups that are discovered by using
Active Directory Security Group Discovery.
All Users Contains the users who are discovered by using Active
Directory User Discovery.
All Users and User Groups Contains the All Users and the All User Groups collections.
This collection contains the largest scope of user and user
group resources.
All Desktop and Ser ver Clients Contains the server and desktop devices that have the
Configuration Manager client installed. Membership is
maintained by Heartbeat Discovery.
All Mobile Devices Contains the mobile devices that are managed by
Configuration Manager. Membership is restricted to those
mobile devices that are successfully assigned to a site or
discovered by the Exchange Server connector.
All Systems Contains the All Desktop and Server Clients, the All Mobile
Devices, and the All Unknown Computers collections, and all
mobile devices that are enrolled by Microsoft Intune. This
collection contains the largest scope of device resources.
All Unknown Computers Contains generic computer records for multiple computer
platforms. You can use this collection to deploy an operating
system by using a task sequence and PXE boot, bootable
media, or prestaged media.
Co-management Eligible Devices Contains devices that meet the client prerequisites and are
eligible for co-management enrollment (added in version
2111).
Custom collections
When you create a custom collection in Configuration Manager, the membership of that collection is determined
by one or more collection rules, as described in How to create collections.
Prerequisites for collections in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
Reporting services point The reporting services point site system role must be
installed before you can run reports for collections. For more
information, see Introduction to reporting.
Specific security permissions must have been granted to You must have the following security permissions to manage
manage collections compliance settings:
A collection update from a CAS with multiple primary sites can be time consuming. If a collection doesn't
evaluate in a timely fashion, it's tempting to repeat the request.
Once a collection evaluation thread begins and loads the evaluation graph, evaluation continues until the
collection evaluation graph is empty. The thread then terminates and becomes available for the next evaluation.
However, if another collection evaluation cycle queues while the thread is evaluating collections, the thread
immediately restarts to attempt an evaluation of the "missed" cycle.
Each evaluation method runs in its own thread. It's possible that within the thread, Configuration Manager may
attempt to graph the same collection more than once. Configuration Manager then drops the second and later
requests.
To prevent these scenarios, avoid manual collection evaluations of large trees, especially when working from the
CAS with multiple sites.
Exclude:
Select * from SMS_R_System where SMS_R_System.ResourceId not in (select ResourceID from
SMS_CM_RES_COLL_XYZ0003F)
TIP
Starting in Configuration Manager version 2010, this functionality is built-in to the console. For more information, see,
How to view collection evaluation.
To manually do a similar check with SQL, you can use the following query:
Evaluation process
The colleval.log records when the collection evaluator creates, changes, and deletes collections.
At a high level, each individual collection evaluation and update follows these steps:
TIP
You can use management insights in the Configuration Manager console to help you manage your collections. There's a
group of insights specific to Collections. There are also several insights in the Configuration Manager Assessment group
for collections.
A full evaluation doesn't always evaluate all collections. The collection evaluation graph only continues to
evaluate dependent collections if an update occurs to the current referenced collection. If an incrementally
updated collection updates during scheduled incremental evaluations, referencing collections that aren't enabled
for incremental updates may not update. A full evaluation doesn't update the collection, ending the collection
evaluation graph and any referencing collection evaluations for that cycle.
In the following example, installing DNS on the existing server makes it a member of the DNS Ser vers
collection, but because there's no update to its limiting All Member Ser vers collection, the full evaluation
doesn't evaluate the DNS Ser vers collection. The next incremental evaluation cycle will evaluate the DNS
Ser vers collection, because it's an incremental collection.
Next steps
How to create collections
Best practices for collections
View collection evaluation (starting in version 2010)
Collection Evaluation Viewer
How to create collections in Configuration Manager
2/16/2022 • 12 minutes to read • Edit Online
NOTE
A collection can contain users or devices, but not both.
The information in this article can help you create collections in Configuration Manager. You can also import
collections that were created at the current Configuration Manager site or at another one. For more information
about how to export and import collections, see How to manage collections.
Collection rules
There are different types of rules that you can use to configure the members of a collection in Configuration
Manager.
Direct rule
Use direct rules to choose the users or computers that you want to add to a collection. The membership doesn't
change unless you remove a resource from Configuration Manager. Before you can add the resources to a direct
rule collection, Configuration Manager must have discovered them or you must have imported them. Direct rule
collections have more administrative overhead than query rule collections because they require manual
changes.
Query rule
Dynamically update the membership of a collection based on a query that Configuration Manager runs on a
schedule. For example, you can create a collection of users that are a member of the Human Resources
organizational unit in Active Directory Domain Services. This collection is automatically updated when new
users are added to or removed from the Human Resources organizational unit.
For example queries that you can use to build collections, see How to create queries.
Include collection rule
Include the members of another collection in a Configuration Manager collection. If the included collection
changes, Configuration Manager updates the membership of the current collection on a schedule.
You can add multiple include collection rules to a collection.
Exclude collection rule
Exclude collection rules let you exclude the members of one collection from another Configuration Manager
collection. If the excluded collection changes, Configuration Manager updates the membership of the current
collection on a schedule.
You can add multiple exclude collection rules to a collection. If a collection includes both include collection and
exclude collection rules and there's a conflict, the exclude collection rule takes priority.
Example of an exclude collection rule
You create a collection that has one include collection rule and one exclude collection rule. The include collection
rule is for a collection of Dell desktops. The exclude collection is for a collection of computers that have less than
4 GB of RAM. The new collection contains Dell desktops that have at least 4 GB of RAM.
Create a collection
1. In the Configuration Manager console, go to the Assets and Compliance workspace.
To create a device collection, select the Device Collections node. Then, on the Home tab of the
ribbon, in the Create group, select Create Device Collection .
To create a user collection, select the User Collections node. Then, on the Home tab of the
ribbon, in the Create group, select Create User Collection .
2. On the General page of the wizard, provide a Name and a Comment . In the Limiting collection
section, select Browse , and then select a limiting collection. The collection you're creating will contain
only members from the limiting collection.
3. On the Membership Rules page, in the Add Rule list, select the type of membership rule that you want
to use for the collection. You can configure multiple rules for each collection. The configuration for each
rule varies. For more information on configuring each rule, see the following sections of this article:
Direct rule
Query rule
Include collection rule
Exclude collection rule
4. Also on the Membership Rules page, review the following settings.
Use incremental updates for this collection : Select this option to periodically scan for and
update only new or changed resources from the previous collection evaluation. This process is
independent of a full collection evaluation. By default, incremental updates occur at 5-minute
intervals.
IMPORTANT
Collections with query rules that use the following classes don't support incremental updates:
SMS_G_System_CollectedFile
SMS_G_System_LastSoftwareScan
SMS_G_System_AppClientState
SMS_G_System_DCMDeploymentState
SMS_G_System_DCMDeploymentErrorAssetDetails
SMS_G_System_DCMDeploymentCompliantAssetDetails
SMS_G_System_DCMDeploymentNonCompliantAssetDetails
SMS_G_User_DCMDeploymentCompliantAssetDetails (for collections of users only)
SMS_G_User_DCMDeploymentNonCompliantAssetDetails (for collections of users only)
SMS_G_System_SoftwareUsageData
SMS_G_System_CI_ComplianceState
SMS_G_System_EndpointProtectionStatus
SMS_GH_System_*
SMS_GEH_System_*
Schedule a full update on this collection : Schedule a regular full evaluation of the collection
membership.
When you disable this setting, the site clears the schedule. This change from previous
behavior makes sure that the site doesn't continue to evaluate the query. To stop the site
evaluating a collection on a schedule, disable this option.
You can't disable the evaluation of built-in collections like All Systems , but you can
configure the schedule. This behavior allows you to customize this action at a time that
meets your requirements.
TIP
On built-in collections, only change the Time of the custom schedule. Don't change the
Recurrence pattern . Future versions of Configuration Manager might enforce a specific
recurrence pattern.
5. Complete the wizard to create the new collection. The new collection is displayed in the Device
Collections node of the Assets and Compliance workspace.
NOTE
To see new collection members, refresh or reload the Configuration Manager console. They don't appear in the collection
until after the first scheduled update. You can also manually select Update Membership for the collection. It might take
a few minutes for a collection update to complete.
Import a collection
When you export a collection from a site, Configuration Manager saves it as a Managed Object Format (MOF)
file. Use this procedure to import that file into your site database. To complete this procedure, you need Create
permissions on the collections class.
IMPORTANT
Make sure the MOF file contains only collection data, is from a trusted source, and hasn't been tampered with.
Also make sure to export the file from a site that's the same version of Configuration Manager as the import site.
For more information about exporting collections, see How to manage collections.
1. In the Configuration Manager console, go to the Assets and Compliance workspace. Select either the
User Collections or the Device Collections node.
2. On the Home tab of the ribbon, in the Create group, select Impor t Collections .
3. On the General page of the Impor t Collections Wizard , select Next .
4. On the MOF File Name page, select Browse . Browse to the MOF file that contains the collection
information you want to import.
5. Complete the wizard to import the collection. The new collection is displayed in the User Collections or
Device Collections node of the Assets and Compliance workspace. Refresh or reload the
Configuration Manager console to see the collection members for the newly imported collection.
Use PowerShell
You can use PowerShell to create and import collections. For more information, see the following cmdlet articles:
New-CMCollection
Set-CMCollection
Import-CMCollection
Next steps
Manage collections
How to manage collections in Configuration
Manager
2/16/2022 • 10 minutes to read • Edit Online
Collection actions
In the Configuration Manager console, go to the Assets and Compliance workspace. Select Device
Collections or User Collections , select the collection to manage, and then select a management task.
Manage device collections
Show Members
Displays all of the resources that are members of the selected collection in a temporary node under the Devices
node.
Add Selected Items
Provides the following options:
Add Selected Items to Existing Device Collection : Opens the Select Collection window. Select the
collection to which you want to add the members of the selected collection. The selected collection is
included in this collection by using an Include Collections membership rule.
Add Selected Items to New Device Collection : Opens the Create Device Collection Wizard
where you can create a new collection. The selected collection is included in this collection by using an
Include Collections membership rule.
For more information, see How to create collections.
Install Client
Opens the Install Client Wizard . This wizard uses client push installation to install a Configuration Manager
client on all computers in the selected collection. For more information, see Client push installation.
Run Script
Opens the Run Script wizard to run a PowerShell script on all of the clients in the collection. For more
information, see Create and run PowerShell scripts.
Start CMPivot
Opens CMPivot for this collection. Use CMPivot to query device information and take action in real time. For
more information, see CMPivot for real-time data.
Manage Affinity requests
Opens the Manage User Device Affinity Requests dialog box. Approve or reject pending requests to
establish user device affinities for devices in the selected collection. For more information, see Link users and
devices with user device affinity.
Clear Required PXE deployments
Clears any required PXE boot deployments from all members of the selected collection. For more information,
see Use PXE to deploy Windows over the network.
Update membership
Evaluates the membership for the selected collection. For collections with many members, this update might
take some time to finish. Use the Refresh action to update the display with the new collections members after
the update is completed.
Synchronize membership
If you configured this collection for cloud sync, synchronize the current membership with an Azure Active
Directory group. For more information, see Create collections.
Add resources
Opens the Add Resources to Collection window. Search for new resources to add to the selected collection.
The icon for the selected collection displays an hourglass symbol while the update is in progress.
Client notification
For more information, see Client notifications.
Client diagnostics
Displays the following options:
Enable verbose logging
Disable verbose logging
Collect client logs
For more information, see Client diagnostics.
Endpoint Protection
For more information, see Client notifications: Endpoint protection.
Export
Opens the Expor t Collection Wizard that helps you export this collection to a Managed Object Format (MOF)
file. You can then archive this file, or import it to another Configuration Manager site. When you export a
collection, referenced collections aren't exported. A referenced collection is referenced by the selected collection
by using an Include or Exclude rule.
Copy
Creates a copy of the selected collection. The new collection uses the selected collection as a limiting collection.
Refresh
Refresh the view.
Delete
Deletes the selected collection. You can also delete all of the resources in the collection from the site database.
You can't delete the collections that are built into Configuration Manager. For a list of the built-in collections, see
Introduction to collections.
Simulate deployment
Opens the Simulate Application Deployment Wizard . This wizard lets you test the results of an application
deployment without installing or uninstalling the application. For more information, see How to simulate
application deployments.
Deploy
Displays the following options:
Application : Opens the Deploy Software Wizard . Select and configure an application deployment to
the selected collection. For more information, see How to deploy applications.
Program : Opens the Deploy Software Wizard . Select and configure a package and program
deployment to the selected collection. For more information, see Packages and programs.
Configuration Baseline : Opens the Deploy Configuration Baselines window. Configure the
deployment of one or more configuration baselines to the selected collection. For more information, see
How to deploy configuration baselines.
Task Sequence : Opens the Deploy Software Wizard . Select and configure a task sequence
deployment to the selected collection. For more information, see Deploy a task sequence.
Software Updates : Opens the Deploy Software Updates Wizard . Configure the deployment of
software updates to resources in the selected collection. For more information, see Deploy software
updates.
View relationships
For more information, see View collection relationships.
Move
Move the selected collection to another folder in the Device Collections node.
Properties
For more information, see Collection properties.
Manage user collections
The following actions are available on user collections. The behaviors are the same as with device collections,
other than they apply to user collections and the users within. For more information, see the corresponding
action under Manage device collections.
Show Members
Add Selected Items
Add Selected Items to Existing User Collection
Add Selected Items to New User Collection
Manage Affinity Requests
Update Membership
Synchronize Membership
Add Resources
Export
Copy
Refresh
Delete
Simulate Deployment
Deploy
Application
Program
Configuration Baseline
View Relationships
Move
Properties
Collection properties
When you view properties for a collection, you can view and configure the following options:
General : View and configure general information about the selected collection including the collection
name, the limiting collection, the collection ID, and last update times.
Membership Rules : Configure the membership rules that define the membership of this collection. For
more information, see How to create collections.
Power Management : Configure power management plans that you've assigned to computers in the
selected collection. For more information, see Introduction to power management.
Deployments : Displays any software that you've deployed to members of the selected collection.
Maintenance Windows : View and configure maintenance windows that are applied to members of the
selected collection. For more information, see How to use maintenance windows.
Collection Variables : Configure variables that apply to this collection and can be used by task
sequences. For more information, see How to set task sequence variables.
Distribution Point Groups : Associate one or more distribution point groups to members of the
selected collection. For more information, see Manage content and content infrastructure.
Cloud Sync : Synchronize collection membership results to Azure Active Directory groups. For more
information, see Create collections.
Starting in version 2006, you can also make this collection available to assign endpoint security policies
when you tenant-attach the site. For more information, see Tenant attach: Onboard Configuration
Manager clients to Microsoft Defender for Endpoint from the admin center.
Security : Displays the administrative users who have permissions for the selected collection from
associated roles and security scopes. For more information, see Fundamentals of role-based
administration.
Aler ts : Configure when alerts are generated for client status and endpoint protection. For more
information, see How to configure client status and How to monitor endpoint protection.
If you want to change or delete collections, view the relationships to understand the effect of the proposed
change. Before you create a deployment, look at the potential target collection for any include or exclude
relationships that might affect the deployment.
When you select the View Relationships action on a device or user collection:
To view the relationships with parent collections, select Dependency .
To view the relationships with child collections, select Dependent .
For example, if you select the All Systems collection to view its relationships, the Dependency node will be 0
as it has no parent collections.
Use the following tips to navigate the relationship viewer:
Select the plus ( + ) or minus ( - ) icons next to the collection name to expand or collapse members of a
node.
The number in parentheses after the collection name is the number of relationships. If the number is 0 ,
then that collection is the final or leaf node in that relationship tree.
The style and color of the line between the collections determines the type of relationship:
If you hover over a specific line, a tooltip shows the relationship type.
The maximum number of child nodes displayed depends upon the level of the graph:
First level: five nodes
Second level: three nodes
Third level: two nodes
Fourth level: one node
If there are more objects than the graph can display at that level, you'll see the More icon.
When the width of the tree is larger than the window, use the green arrows to the right or the left to view
more.
When a node of the relationship tree is larger than the available space, select More to change the view to
just that node.
To navigate to a prior view, select the Back arrow in the upper right corner. Select the Home icon to
return to the main page.
Use the Search box in the upper right corner to locate a collection in the current tree view.
Use the Navigator in the lower right corner to zoom and pan around the tree. You can also print the
current view.
You can only see relationships between collections to which you have permission:
If you have permission for All Systems or All Users and User Groups , then you'll see all
relationships.
If you don't have permission for a specific collection, you don't see it in the graph, and can't view
its relationships.
Improvements in version 2103
Starting in version 2103, you can view both dependency and dependent relationships together in a single graph.
This change allows you to quickly see an overview of all the relationships of a collection at once and then drill
down into specific related collections. It also includes other filtering and navigation improvements.
The following example shows the relationships for the "c1" collection in the center. It's dependent upon the
collections above it (parents), and has dependencies below it (children).
To see the relationships of another collection in the graph, select it to open a new window targeted on that
collection.
Other improvements:
There's a new Filter button in the upper right corner. This action lets you reduce the graph to specific
relationship types: Limiting , Include , or Exclude .
If you don't have permissions to all related collections, the graph includes a warning message that the
graph may be incomplete.
When the graph is wider than the window can display, use the page navigation controls in the upper left
corner. The first number is the page for parents (above), and the second number is the page for children
(below). The window title also shows the page numbers.
The tooltip for a collection displays the count of dependencies it has and the count of dependant
collections where applicable. This count only includes unique subcollections. The count no longer displays
in the parentheses next to the collection name.
Previously the Back button took you through your viewing history. Now it takes you to the previously
selected collection. For example, changing pages for the current collection doesn't activate the Back
button. When you select a new collection, you can select Back to return to the original collection graph.
TIP
Hold the Ctrl key and scroll the mouse wheel to zoom the graph.
For more information on how to navigate the collection dependency graph with a keyboard, see Accessibility
features.
Next steps
Client notifications
How to use maintenance windows in Configuration
Manager
2/16/2022 • 4 minutes to read • Edit Online
TIP
A maintenance window is for a client. A service window is for a site server. For more information, see Service windows for
site servers.
NOTE
This setting also applies to maintenance windows that you configure to apply to Task sequences .
If the client only has an All deployments window available, it still installs software updates or task sequences in that
window.
NOTE
You can't create maintenance windows for the All Systems collection.
3. On the Home tab of the ribbon, in the Proper ties group, choose Proper ties .
4. Switch to the Maintenance Windows tab, and select the New icon.
a. Specify a Name to uniquely identify this maintenance window for the collection.
b. Configure the Time settings:
Effective date : The date when the maintenance windows starts. The default is the current
date.
Star t and End : The start and end times of the maintenance window. It calculates the
Duration for the window. The minimum duration is five minutes, and the maximum is 24
hours. The default duration is three hours, from 01:00 to 04:00.
Coordinated Universal Time (UTC) : Enable this option for the client to interpret the start
and end times in the UTC time zone. For regionally or globally distributed devices in the
same collection, this option sets the maintenance window to occur simultaneously on all
devices in the collection. Disable this option for the client to use the device's local time zone.
This option is disabled by default.
c. Configure the recurrence pattern. The default is once per week on the current day of the week.
d. Apply this schedule to : By default the window applies to All deployments . You can select
either Software updates or Task sequences to further control what deployments run during
this window.
TIP
If you configure multiple maintenance windows of different types on the same collection, make sure you
understand the client behaviors. For more information, see Multiple maintenance windows.
Use PowerShell
You can use PowerShell to configure maintenance windows. For more information, see the following articles:
Get-CMMaintenanceWindow
New-CMMaintenanceWindow
Remove-CMMaintenanceWindow
Set-CMMaintenanceWindow
How to view collection evaluation
2/16/2022 • 6 minutes to read • Edit Online
TIP
Viewing collection evaluation at the CAS changed in Configuration Manager version 2103. For more information, see the
Collection evaluation information at the CAS section.
When using the console connected to a CAS using Configuration Manager 2010, you'll see the following behavior:
Evaluation-related columns for device collections won't contain data.
The Collection Evaluation node under the Monitoring workspace isn't shown.
Evaluation-related information, such as evaluation status and links to the collection evaluation queues, won't be shown
in the collection Summar y group pane.
From the Device Collections node at the CAS, the evaluation columns display the evaluation status from the
primary site with the longest run time. The column information at the CAS for the full evaluation status could be
from a different primary site than the incremental information since the longest runtime for the incremental
might have occurred at a different primary.
For instance, incremental evaluation for the All Systems collection on the WMI primary site takes longer than
the other primary sites. The full evaluation columns on the CAS display the information from primary site WMI
for the All Systems collection in the Device Collections node.
Next steps
Learn more about Collection evaluation in Configuration Manager.
Security and privacy for collections in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
Security recommendations
When you export or import a collection by using a managed object format (MOF) file that's saved to a network
location, secure the location and the network channel. Restrict who can access the network folder. Use Server
Message Block (SMB) signing or Internet Protocol security (IPsec) between the network location and the site
server. These mechanisms help prevent an attacker from tampering with the exported collection data. Use IPsec
to encrypt the data on the network to prevent information disclosure.
Security issues
Collections have the following security issues:
If you use collection variables, local administrators can read potentially sensitive information. Collection
variables are only used when you deploy an OS. For more information, see Collection and device variables.
Privacy information
There's no privacy information specifically for collections in Configuration Manager. Collections are containers
for resources, such as users and devices. Collection membership often depends on the information that
Configuration Manager collects during standard operation.
Configuration Manager can collect resource information from discovery or inventory. Using this information,
you can configure a collection to contain the devices that meet your specified criteria. Collections might also be
based on the current status information for client management operations. For example, deploying software or
checking for compliance. Along with query-based collections, you can also directly add resources to collections.
Next steps
For more information about collections, see Introduction to collections.
For more information about other security features in Configuration Manager, see the Security documentation
hub.
Introduction to hardware inventory
2/16/2022 • 2 minutes to read • Edit Online
Extend inventory
To collect more information than what Configuration Manager inventories by default, you can also use one of
these methods to extend hardware inventory:
Enable, disable, add, and remove inventory classes for hardware inventory from the Configuration
Manager console.
Use NOIDMIF files to collect information about client devices that can't be inventoried by Configuration
Manager. For example, you might want to collect device asset number information that exists only as a
label on the device. NOIDMIF inventory is automatically associated with the client device that it was
collected from.
Use IDMIF files to collect information about assets that aren't associated with a Configuration Manager
client, for example, projectors, photocopiers, and network printers.
Starting in version 2107, you can use the administration service to set custom properties on devices. You
can then use the custom properties in Configuration Manager for reporting or to create collections. For
more information, see Custom properties for devices.
Next steps
How to configure hardware inventory
How to extend hardware inventory in Configuration
Manager
2/16/2022 • 10 minutes to read • Edit Online
NOTE
If you changed the state of classes in client settings, when you update the site, some classes may revert to a default state.
For example, if you disable the SMS_Windows8Application or SMS_Windows8ApplicationUserInfo classes, they're
enabled after installing a Configuration Manager update. When you customize hardware inventory classes, make sure to
review their configuration before and after a site update.
If you've manually changed the Configuration.mof file to add custom inventory classes, these changes will be overwritten
when you update the site. To keep using custom classes after you update, add them to the Added extensions section of
the Configuration.mof file. Don't modify anything above this section. The other sections are reserved for modification by
Configuration Manager. The site backs up your custom Configuration.mof in the data\hinvarchive\ folder of the
Configuration Manager installation directory on the site server.
Starting in version 2107, you can use the administration service to set custom properties on devices. You can
then use the custom properties in Configuration Manager for reporting or to create collections. For more
information, see Custom properties for devices.
Methods
Enable or disable
Enable or disable some of all attributes of a class that already exists on the client. This action instructs the
hardware inventory agent to collect it on clients. You can do this action in default client settings, or custom
device client settings. For more information, see Enable or disable existing classes.
Add
If a WMI class exists on the client and is known to the site, this action includes it to the possible set of hardware
inventory classes. You can add a new inventory class from the WMI namespace of another device. This action is
only on default client settings. For more information, see Add a new class.
Extend
Add a new WMI class to the client. To manually extend hardware inventory, edit the configuration.mof on the
top-level site.
If the WMI class doesn't already exist on the client, you need to extend the WMI schema:
1. Edit the configuration.mof on the top-level site. Review dataldr.log to see the site add it.
2. Refresh policy on a client, and wait for the new class to compile.
3. Use default client settings to Add the new class to hardware inventory. You don't have to enable this class
in default client settings. You can then enable it in a custom device client setting.
Import and export
Use the Configuration Manager console to import and export Managed Object Format (MOF) files that contain
inventory classes. For more information, see How to import classes and How to export classes.
About NOIDMIF files
Use NOIDMIF files to collect information about client devices that Configuration Manager can't inventory. For
example, collect device asset number information that exists only as a label on the device. NOIDMIF inventory is
automatically associated with the client device that it was collected from. For more information, see Create
NOIDMIF files.
About IDMIF files
Use IDMIF files to collect information about assets in your organization that aren't associated with a
Configuration Manager client. For example, projectors, photocopiers, and network printers. For more
information, see Create IDMIF files.
Procedures
These procedures help you to configure the default client settings for hardware inventory and they apply to all
the clients in your hierarchy. If you want these settings to apply to only some clients, create a custom client
device setting and assign it to a collection of specific clients. For more information, see How to configure client
settings.
Enable or disable existing classes
1. In the Configuration Manager console, go to the Administration workspace, and select the Client
Settings node.
2. Select the Default Client Settings . On the Home tab, in the Proper ties group, choose Proper ties .
3. In the Default Client Settings dialog box, choose Hardware Inventor y .
4. In the Device Settings list, select Set Classes .
5. In the Hardware Inventor y Classes dialog box, select or clear the classes and class properties to be
collected by hardware inventory. You can expand classes to select or clear individual properties within
that class. Use the Search for inventor y classes field to search for individual classes.
IMPORTANT
When you add new classes to Configuration Manager hardware inventory, the size of the inventory file that is collected
and sent to the site server will increase. This might negatively affect the performance of your network and Configuration
Manager site. Enable only the inventory classes that you want to collect.
NOTE
When you export classes, all currently selected classes will be exported.
6. In the Expor t dialog box, specify the Managed Object Format (MOF) file that you want to export the
classes to, and then choose Save .
Collect strings larger than 255 characters
You can specify the length of strings to be greater than 255 characters for hardware inventory properties. This
action applies only to newly added classes and for hardware inventory properties that aren't keys.
1. In the Administration workspace, select Client Settings . Choose a client device setting to edit, then
select Proper ties .
2. Select Hardware Inventor y , then Set Classes , and Add .
3. Select Connect .
4. Fill in Computer Name , WMI namespace , select recursive if needed. Provide credentials if necessary
to connect. Select Connect to view the namespace classes.
5. Select a new class, then select Edit .
6. Change the Length of your property that's a string, other than the key, to be greater than 255. Select OK .
7. Make sure that the edited property is selected for Add Hardware Inventor y Class , and select OK .
IMPORTANT
When you create a NOIDMIF file, save it in an ANSI-encoded format. If you save NOIDMIF files in UTF-8 encoded format,
Configuration Manager can't read it.
After you create a NOIDMIF file, store it in the %Windir%\CCM\Inventory\noidmifs folder on each client.
Configuration Manager collects information from NODMIF files in this folder during the next scheduled
hardware inventory cycle.
Create IDMIF files
IDMIF files can be used to add information about assets that couldn't normally be inventoried by Configuration
Manager and isn't associated with a particular client device, to the Configuration Manager database. For
example, you could use IDMIFS to collect information about projectors, DVD players, photocopiers, or other
equipment that doesn't have a Configuration Manager client.
For more information about creating IDMIF files, see About inventory in the Configuration Manager SDK
documentation.
After you create an IDMIF file, store it in the %Windir%\CCM\Inventory\idmifs folder on client computers.
Configuration Manager collects information from this file during the next scheduled hardware inventory cycle.
Declare new classes for information contained in the file by adding or importing them.
NOTE
MIF files could contain large amounts of data and collecting this data could negatively affect the performance of your site.
Enable MIF collection only when required. Configure the option Maximum custom MIF file size (KB) in the hardware
inventory settings. For more information, see Introduction to hardware inventory.
How to configure hardware inventory in
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
If a client device receives hardware inventory settings from multiple sets of client settings, then the hardware inventory
classes from each set of settings will be merged when the client reports hardware inventory. Additionally, not checking a
class in a custom client setting with a higher priority doesn't disable the client from inventorying that class.
To disable a specific hardware inventory class on a majority of systems except a few, the class needs to be
unchecked in the default client settings. Then create a custom client setting to enable the class, and deploy it to
the target systems.
To configure hardware inventory
1. In the Configuration Manager console, choose Administration > Client Settings > Default Client
Settings .
2. On the Home tab, in the Proper ties group, choose Proper ties .
3. In the Default Settings dialog box, choose Hardware Inventor y .
4. In the Device Settings list, configure the following:
Enable hardware inventor y on clients - Select Yes .
Hardware inventor y schedule - Click Schedule to specify the interval at which clients collect
hardware inventory.
5. Configure other hardware inventory client settings that you require.
Client devices will be configured with these settings when they next download client policy. To initiate policy
retrieval for a single client, see How to manage clients.
How to use Resource Explorer to view hardware
inventory in Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
TIP
Resource Explorer doesn't display any data until a hardware inventory cycle runs on the client to which you're connecting.
Overview
Resource Explorer has the following sections related to hardware inventory:
Hardware : Shows the most recent hardware inventory collected from the specified client device.
The Workstation Status node shows the time and date of the last hardware inventory from the
device.
Hardware Histor y : A history of inventoried items that changed since the last hardware inventory cycle.
Expand an item to see a Current node and one or more nodes with the historical date. Compare the
information in the current node to one of the historical nodes to see the items that changed.
NOTE
By default, Configuration Manager deletes hardware inventory data that's been inactive for 90 days. Adjust this number
of days in the Delete Aged Inventor y Histor y site maintenance task. For more information, see Maintenance tasks.
TIP
In Resource Explorer, right-click an item in the right results pane for additional actions. Click Proper ties to view that item
in a different format.
See also
Resource Explorer also shows Software Inventory. For more information, see How to use Resource Explorer to
view software inventory.
Resource Explorer default inventory classes
2/16/2022 • 29 minutes to read • Edit Online
1394 Controller
Namespace: root\cimv2
class Win32_1394Controller
(String) DeviceID
(UInt16) Availability
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(Boolean) ErrorCleared
(String) ErrorDescription
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Manufacturer
(UInt32) MaxNumberControlled
(String) Name
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt16) ProtocolSupported
(String) Status
(UInt16) StatusInfo
(String) SystemName
(DateTime) TimeOfLastReset
Account SID
Namespace: root\cimv2
class Win32_AccountSID
(String) Element
(String) Setting
ActiveSync Service
Namespace: root\SmsDm
class SMS_ActiveSyncService
(UInt32) MajorVersion
(UInt32) MinorVersion
(String) LastSyncTime
AMT Agent
Namespace: root\cimv2\sms
class SMS_AMTObject
(UInt32) DeviceID
(String) AMT
(String) AMTApps
(String) BiosVersion
(String) BuildNumber
(String) Flash
(String) LegacyMode
(String) Netstack
(UInt32) ProvisionMode
(UInt32) ProvisionState
(String) RecoveryBuildNum
(String) RecoveryVersion
(String) Sku
(UInt32) TLSMode
(String) VendorID
(UInt32) ZTCEnabled
AutoStart Software
Namespace: root\cimv2\sms
class SMS_AutoStartSoftware
(String) FilePropertiesHash
(String) BinFileVersion
(String) BinProductVersion
(String) Description
(String) FileName
(String) FilePropertiesHashEx
(String) FileVersion
(String) Location
(String) Product
(String) ProductVersion
(String) Publisher
(String) StartupType
(String) StartupValue
BaseBoard
Namespace: root\cimv2
class Win32_BaseBoard
(String) Tag
(String) Caption
(String) ConfigOptions[]
(String) Description
(Boolean) HostingBoard
(Boolean) HotSwappable
(DateTime) InstallDate
(String) Manufacturer
(String) Model
(String) Name
(String) OtherIdentifyingInfo
(String) PartNumber
(Boolean) PoweredOn
(String) Product
(Boolean) Removable
(Boolean) Replaceable
(String) RequirementsDescription
(Boolean) RequiresDaughterBoard
(String) SerialNumber
(String) SKU
(String) SlotLayout
(Boolean) SpecialRequirements
(String) Status
(String) Version
Battery
Namespace: root\cimv2
class Win32_Battery
(String) DeviceID
(UInt16) Availability
(UInt16) BatteryStatus
(String) Caption
(UInt16) Chemistry
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(UInt32) DesignCapacity
(UInt64) DesignVoltage
(Boolean) ErrorCleared
(String) ErrorDescription
(UInt16) EstimatedChargeRemaining
(UInt32) EstimatedRunTime
(UInt32) ExpectedLife
(UInt32) FullChargeCapacity
(DateTime) InstallDate
(UInt32) LastErrorCode
(UInt32) MaxRechargeTime
(String) Name
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) SmartBatteryVersion
(String) Status
(UInt16) StatusInfo
(String) SystemName
(UInt32) TimeOnBattery
(UInt32) TimeToFullCharge
BitLocker
Namespace: root\cimv2\security\MicrosoftVolumeEncryption
class Win32_EncryptableVolume
(String) DeviceID
(String) DriveLetter
(String) PersistentVolumeID
(UInt32) ProtectionStatus
BitLocker Policy
Namespace: root\cimv2
class Win32Reg_MBAMPolicy
(String) EncodedComputerName
(UInt32) EncryptionMethod
(UInt32) FixedDataDriveAutoUnlock
(UInt32) FixedDataDriveEncryption
(UInt32) FixedDataDrivePassphrase
(String) KeyName
(String) LastConsoleUser
(UInt32) MBAMMachineError
(UInt32) MBAMPolicyEnforced
(UInt32) OsDriveEncryption
(UInt32) OsDriveProtector
(DateTime) UserExemptionDate
Boot Configuration
Namespace: root\cimv2
class Win32_BootConfiguration
(String) Name
(String) BootDirectory
(String) ConfigurationPath
(String) Description
(String) LastDrive
(String) ScratchDirectory
(String) SettingID
(String) TempDirectory
CCM_RAX
Namespace: root\ccm\cimodels
class CCM_RAXInfo
(String) AppID
(String) FeedURL
(String) UserSID
CD-ROM
Namespace: root\cimv2
class Win32_CDROMDrive
(String) DeviceID
(UInt16) Availability
(UInt16) Capabilities[]
(String) CapabilityDescriptions[]
(String) Caption
(String) CompressionMethod
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(UInt64) DefaultBlockSize
(String) Description
(String) Drive
(Boolean) DriveIntegrity
(Boolean) ErrorCleared
(String) ErrorDescription
(String) ErrorMethodology
(UInt16) FileSystemFlags
(UInt32) FileSystemFlagsEx
(String) ID
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Manufacturer
(UInt64) MaxBlockSize
(UInt32) MaximumComponentLength
(UInt64) MaxMediaSize
(Boolean) MediaLoaded
(String) MediaType
(UInt64) MinBlockSize
(String) Name
(Boolean) NeedsCleaning
(UInt32) NumberOfMediaSupported
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) RevisionLevel
(UInt32) SCSIBus
(UInt16) SCSILogicalUnit
(UInt16) SCSIPort
(UInt16) SCSITargetId
(UInt64) Size
(String) Status
(UInt16) StatusInfo
(String) SystemName
(String) VolumeName
(String) VolumeSerialNumber
Client Diagnostics
Starting in version 2107
Namespace: root\cimv2
class CCM_ClientDiagnostics
(String) Identifier
(String) DebugLoggingEnabled
(UInt32) LogEnabled
(UInt32) LogLevel
(UInt32) LogMaxHistory
(UInt32) LogMaxSize
Client Events
Namespace: root\ccm\invagt
class ClientEvents
(String) EventName
(UInt16) Count
Computer System
Namespace: root\cimv2
class Win32_ComputerSystem
(String) Name
(UInt16) AdminPasswordStatus
(Boolean) AutomaticResetBootOption
(Boolean) AutomaticResetCapability
(UInt16) BootOptionOnLimit
(UInt16) BootOptionOnWatchDog
(Boolean) BootROMSupported
(String) BootupState
(String) Caption
(UInt16) ChassisBootupState
(SInt16) CurrentTimeZone
(Boolean) DaylightInEffect
(String) Description
(String) Domain
(UInt16) DomainRole
(UInt16) FrontPanelResetStatus
(Boolean) InfraredSupported
(String) InitialLoadInfo[]
(DateTime) InstallDate
(UInt16) KeyboardPasswordStatus
(String) LastLoadInfo
(String) Manufacturer
(String) Model
(String) NameFormat
(Boolean) NetworkServerModeEnabled
(UInt32) NumberOfProcessors
(String) OEMLogoBitmap
(String) OEMStringArray[]
(SInt64) PauseAfterReset
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt16) PowerOnPasswordStatus
(UInt16) PowerState
(UInt16) PowerSupplyState
(String) PrimaryOwnerContact
(String) PrimaryOwnerName
(UInt16) ResetCapability
(SInt16) ResetCount
(SInt16) ResetLimit
(String) Roles[]
(String) Status
(String) SupportContactDescription[]
(UInt16) SystemStartupDelay
(String) SystemStartupOptions[]
(UInt8) SystemStartupSetting
(String) SystemType
(UInt16) ThermalState
(UInt64) TotalPhysicalMemory
(String) UserName
(UInt16) WakeUpType
Computer System Ex
Namespace: root\cimv2
class CCM_ComputerSystemExtended
(String) Name
(UInt16) PCSystemType
Connected Device
Namespace: root\SmsDm
class SMS_ActiveSyncConnectedDevice
(String) DeviceOEMInfo
(String) DeviceType
(String) OS_Major
(String) OS_Minor
(String) OS_Platform
(String) ProcessorArchitecture
(String) ProcessorLevel
(String) ProcessorRevision
(String) InstalledClientID
(String) InstalledClientServer
(String) InstalledClientVersion
(String) LastSyncTime
(String) OS_AdditionalInfo
(String) OS_Build
SMS_DefaultBrowser
Namespace: root\cimv2\sms
class SMS_DefaultBrowser
(String) BrowserProgId
Desktop
Namespace: root\cimv2
class Win32_Desktop
(String) Name
(UInt32) BorderWidth
(String) Caption
(Boolean) CoolSwitch
(UInt32) CursorBlinkRate
(String) Description
(Boolean) DragFullWindows
(UInt32) GridGranularity
(UInt32) IconSpacing
(String) IconTitleFaceName
(UInt32) IconTitleSize
(Boolean) IconTitleWrap
(String) Pattern
(Boolean) ScreenSaverActive
(String) ScreenSaverExecutable
(Boolean) ScreenSaverSecure
(UInt32) ScreenSaverTimeout
(String) SettingID
(String) Wallpaper
(Boolean) WallpaperStretched
(Boolean) WallpaperTiled
Desktop Monitor
Namespace: root\cimv2
class Win32_DesktopMonitor
(String) DeviceID
(UInt16) Availability
(UInt32) Bandwidth
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(UInt16) DisplayType
(Boolean) ErrorCleared
(String) ErrorDescription
(DateTime) InstallDate
(Boolean) IsLocked
(UInt32) LastErrorCode
(String) MonitorManufacturer
(String) MonitorType
(String) Name
(UInt32) PixelsPerXLogicalInch
(UInt32) PixelsPerYLogicalInch
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt32) ScreenHeight
(UInt32) ScreenWidth
(String) Status
(UInt16) StatusInfo
(String) SystemName
Device Info
Namespace: Reserved
class Device_Info
(String) CertExpiry
(String) DeviceName
(String) Manufacturer
(String) Model
(String) OS
MDM DevDetail
Namespace: root\cimv2\mdm\dmmap
class MDM_DevDetail_Ext01
(String) InstanceID
(String) ParentID
(String) DeviceHardwareData
(String) WLANMACAddress
Disk
Namespace: root\cimv2
class Win32_DiskDrive
(String) DeviceID
(UInt16) Availability
(UInt32) BytesPerSector
(UInt16) Capabilities[]
(String) CapabilityDescriptions[]
(String) Caption
(String) CompressionMethod
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(UInt64) DefaultBlockSize
(String) Description
(Boolean) ErrorCleared
(String) ErrorDescription
(String) ErrorMethodology
(UInt32) Index
(DateTime) InstallDate
(String) InterfaceType
(UInt32) LastErrorCode
(String) Manufacturer
(UInt64) MaxBlockSize
(UInt64) MaxMediaSize
(Boolean) MediaLoaded
(String) MediaType
(UInt64) MinBlockSize
(String) Model
(String) Name
(Boolean) NeedsCleaning
(UInt32) NumberOfMediaSupported
(UInt32) Partitions
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt32) SCSIBus
(UInt16) SCSILogicalUnit
(UInt16) SCSIPort
(UInt16) SCSITargetId
(UInt32) SectorsPerTrack
(UInt64) Size
(String) Status
(UInt16) StatusInfo
(String) SystemName
(UInt64) TotalCylinders
(UInt32) TotalHeads
(UInt64) TotalSectors
(UInt64) TotalTracks
(UInt32) TracksPerCylinder
Partition
Namespace: root\cimv2
class Win32_DiskPartition
(String) DeviceID
(UInt16) Access
(UInt16) Availability
(UInt64) BlockSize
(Boolean) Bootable
(Boolean) BootPartition
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(UInt32) DiskIndex
(Boolean) ErrorCleared
(String) ErrorDescription
(String) ErrorMethodology
(UInt32) HiddenSectors
(UInt32) Index
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Name
(UInt64) NumberOfBlocks
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(Boolean) PrimaryPartition
(String) Purpose
(Boolean) RewritePartition
(UInt64) Size
(UInt64) StartingOffset
(String) Status
(UInt16) StatusInfo
(String) SystemName
(String) Type
DMA
Namespace: root\cimv2
class Win32_DeviceMemoryAddress
(UInt64) StartingAddress
(String) Caption
(String) Description
(UInt64) EndingAddress
(DateTime) InstallDate
(String) MemoryType
(String) Name
(String) Status
DMA Channel
Namespace: root\cimv2
class Win32_DMAChannel
(UInt32) DMAChannel
(UInt16) AddressSize
(UInt16) Availability
(Boolean) BurstMode
(UInt16) ByteMode
(String) Caption
(UInt16) ChannelTiming
(String) Description
(DateTime) InstallDate
(UInt32) MaxTransferSize
(String) Name
(UInt32) Port
(String) Status
(UInt16) TransferWidths[]
(UInt16) TypeCTiming
(UInt16) WordMode
Driver - VxD
Namespace: root\cimv2
class Win32_DriverVXD
(String) Name
(String) SoftwareElementID
(UInt16) SoftwareElementState
(UInt16) TargetOperatingSystem
(String) Version
(String) BuildNumber
(String) Caption
(String) CodeSet
(String) Control
(String) Description
(String) DeviceDescriptorBlock
(String) IdentificationCode
(DateTime) InstallDate
(String) LanguageEdition
(String) Manufacturer
(String) OtherTargetOS
(String) PM_API
(String) SerialNumber
(UInt32) ServiceTableSize
(String) Status
(String) V86_API
Environment
Namespace: root\cimv2
class Win32_Environment
(String) Name
(String) UserName
(String) Caption
(String) Description
(DateTime) InstallDate
(String) Status
(Boolean) SystemVariable
(String) VariableValue
Firmware
Namespace: root\cimv2\sms
class SMS_Firmware
(Boolean) UEFI
(Boolean) SecureBoot
IDE Controller
Namespace: root\cimv2
class Win32_IDEController
(String) DeviceID
(UInt16) Availability
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(Boolean) ErrorCleared
(String) ErrorDescription
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Manufacturer
(UInt32) MaxNumberControlled
(String) Name
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt16) ProtocolSupported
(String) Status
(UInt16) StatusInfo
(String) SystemName
(DateTime) TimeOfLastReset
Installed Executable
Namespace: root\cimv2\sms
class SMS_InstalledExecutable
(String) ExecutableName
(String) ProductCode
(String) BinFileVersion
(String) BinProductVersion
(String) Description
(String) FilePropertiesHash
(String) FilePropertiesHashEx
(UInt32) FileSize
(String) FileVersion
(Boolean) HasPatchAdded
(String) InstalledFilePath
(Boolean) IsSystemFile
(Boolean) IsVitalFile
(UInt32) Language
(String) Product
(String) ProductVersion
(String) Publisher
Installed Software
Namespace: root\cimv2\sms
class SMS_InstalledSoftware
(String) SoftwareCode
(String) ARPDisplayName
(String) ChannelCode
(String) ChannelID
(String) CM_DSLID
(String) EvidenceSource
(DateTime) InstallDate
(UInt32) InstallDirectoryValidation
(String) InstalledLocation
(String) InstallSource
(UInt32) InstallType
(UInt32) Language
(String) LocalPackage
(String) MPC
(UInt32) OsComponent
(String) PackageCode
(String) ProductID
(String) ProductName
(String) ProductVersion
(String) Publisher
(String) RegisteredUser
(String) ServicePack
(String) SoftwarePropertiesHash
(String) SoftwarePropertiesHashEx
(String) UninstallString
(String) UpgradeCode
(UInt32) VersionMajor
(UInt32) VersionMinor
IRQ Table
Namespace: root\cimv2
class Win32_IRQResource
(UInt32) IRQNumber
(UInt16) Availability
(String) Caption
(String) Description
(Boolean) Hardware
(DateTime) InstallDate
(String) Name
(Boolean) Shareable
(String) Status
(UInt16) TriggerLevel
(UInt16) TriggerType
(UInt32) Vector
Keyboard
Namespace: root\cimv2
class Win32_Keyboard
(String) DeviceID
(UInt16) Availability
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(Boolean) ErrorCleared
(String) ErrorDescription
(DateTime) InstallDate
(Boolean) IsLocked
(UInt32) LastErrorCode
(String) Layout
(String) Name
(UInt16) NumberOfFunctionKeys
(UInt16) Password
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) Status
(UInt16) StatusInfo
(String) SystemName
Logical Disk
Namespace: root\cimv2\sms
class SMS_LogicalDisk
(String) DeviceID
(UInt16) Access
(UInt16) Availability
(UInt64) BlockSize
(String) Caption
(Boolean) Compressed
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(UInt32) DriveType
(Boolean) ErrorCleared
(String) ErrorDescription
(String) ErrorMethodology
(String) FileSystem
(UInt64) FreeSpace
(DateTime) InstallDate
(UInt32) LastErrorCode
(UInt32) MaximumComponentLength
(UInt32) MediaType
(String) Name
(UInt64) NumberOfBlocks
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) ProviderName
(String) Purpose
(UInt64) Size
(String) Status
(UInt16) StatusInfo
(Boolean) SupportsFileBasedCompression
(String) SystemName
(String) VolumeName
(String) VolumeSerialNumber
Memory
Namespace: root\cimv2
class CCM_LogicalMemoryConfiguration
(String) Name
(UInt64) AvailableVirtualMemory
(UInt64) TotalPageFileSpace
(UInt64) TotalPhysicalMemory
(UInt64) TotalVirtualMemory
Device Bluetooth
Namespace: Reserved
class Device_Bluetooth
(Boolean) Enabled
Device Camera
Namespace: Reserved
class Device_Camera
(Boolean) Enabled
Device Certificates
Namespace: Reserved
class Device_Certificates
(String) Thumbprint
(String) Type
(String) IssuedBy
(String) IssuedTo
(DateTime) ValidFrom
(DateTime) ValidTo
Device Client
Namespace: Reserved
class Device_Client
(Boolean) DownloadWhenRoaming
(Boolean) SyncWhenRoaming
Device Display
Namespace: Reserved
class Device_Display
(UInt32) HorizontalResolution
(UInt64) NumberOfColors
(UInt32) VerticalResolution
Device Email
Namespace: Reserved
class Device_Email
(String) OwnerEmailAddress
(String) SyncDomain
(String) SyncServer
(String) SyncUser
(String) Type
Device Encryption
Namespace: Reserved
class Device_Encryption
(UInt32) EmailEncryptionAlgorithm
(UInt32) EmailEncryptionNegotiation
(Boolean) EmailEncryptionRequired
(Boolean) EmailSigningAlgorithm
(Boolean) EmailSigningRequired
(Boolean) EncryptionCompliance
(Boolean) PhoneMemoryEncrypted
(Boolean) StorageCardEncrypted
Device Exchange
Namespace: Reserved
class Device_Exchange
(Boolean) ConflictResolution
(SInt32) HTMLEmailTruncation
(UInt32) MailFormat
(UInt32) MaxCalendarAge
(UInt32) MaxEmailAge
(SInt32) MaxMailFileAttachmentSize
(UInt32) OffPeakSyncFrequency
(UInt32) PeakDays
(String) PeakEndTime
(String) PeakStartTime
(UInt32) PeakSyncFrequency
(SInt32) PlainTextEmailTruncation
(Boolean) SendEmailImmediately
(Boolean) SyncCalendar
(Boolean) SyncContacts
(Boolean) SyncEmail
(Boolean) SyncTasks
(Boolean) SyncWhenRoaming
Device IrDA
Namespace: Reserved
class Device_IrDA
(Boolean) Enabled
Device OS Information
Namespace: Reserved
class Device_OSInformation
(String) Language
(String) Platform
(String) Version
Device Password
Namespace: Reserved
class Device_Password
(Boolean) AllowRecoveryPassword
(UInt32) AutolockTimeout
(Boolean) Enabled
(UInt32) Expiration
(UInt32) History
(UInt32) MaxAttemptsBeforeWipe
(UInt32) MinComplexChars
(UInt32) MinLength
(UInt8) PasswordQuality
(UInt32) Type
Device Policy
Namespace: Reserved
class Device_Policy
(String) Name
(Boolean) Enforced
Device Power
Namespace: Reserved
class Device_Power
(UInt32) BacklightACTimeout
(UInt32) BacklightBatTimeout
(SInt32) BackupPercent
(SInt32) BatteryPercent
Device WLAN
Namespace: Reserved
class Device_WLAN
(Boolean) Enabled
(String) EthernetMAC
(String) WiFiMAC
Modem
Namespace: root\cimv2
class Win32_POTSModem
(String) DeviceID
(UInt16) AnswerMode
(String) AttachedTo
(UInt16) Availability
(String) BlindOff
(String) BlindOn
(String) Caption
(String) CompatibilityFlags
(UInt16) CompressionInfo
(String) CompressionOff
(String) CompressionOn
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) ConfigurationDialog
(String) CountriesSupported[]
(String) CountrySelected
(String) CurrentPasswords[]
(String) DCB
(String) Default
(String) Description
(String) DeviceLoader
(String) DeviceType
(UInt16) DialType
(DateTime) DriverDate
(Boolean) ErrorCleared
(String) ErrorControlForced
(UInt16) ErrorControlInfo
(String) ErrorControlOff
(String) ErrorControlOn
(String) ErrorDescription
(String) FlowControlHard
(String) FlowControlOff
(String) FlowControlSoft
(String) InactivityScale
(UInt32) InactivityTimeout
(UInt32) Index
(DateTime) InstallDate
(UInt32) LastErrorCode
(UInt32) MaxBaudRateToPhone
(UInt32) MaxBaudRateToSerialPort
(UInt16) MaxNumberOfPasswords
(String) Model
(String) ModemInfPath
(String) ModemInfSection
(String) ModulationBell
(String) ModulationCCITT
(UInt16) ModulationScheme
(String) Name
(String) PNPDeviceID
(String) PortSubClass
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) Prefix
(String) Properties
(String) ProviderName
(String) Pulse
(String) Reset
(String) ResponsesKeyName
(UInt8) RingsBeforeAnswer
(String) SpeakerModeDial
(String) SpeakerModeOff
(String) SpeakerModeOn
(String) SpeakerModeSetup
(String) SpeakerVolumeHigh
(UInt16) SpeakerVolumeInfo
(String) SpeakerVolumeLow
(String) SpeakerVolumeMed
(String) Status
(UInt16) StatusInfo
(String) StringFormat
(Boolean) SupportsCallback
(Boolean) SupportsSynchronousConnect
(String) SystemName
(String) Terminator
(DateTime) TimeOfLastReset
(String) Tone
(String) VoiceSwitchFeature
Motherboard
Namespace: root\cimv2
class Win32_MotherboardDevice
(String) DeviceID
(UInt16) Availability
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(Boolean) ErrorCleared
(String) ErrorDescription
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Name
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) PrimaryBusType
(String) RevisionNumber
(String) SecondaryBusType
(String) Status
(UInt16) StatusInfo
(String) SystemName
NAP Client
Namespace: root\Nap
class NAP_Client
(String) name
(String) description
(String) fixupURL
(Boolean) napEnabled
(String) napProtocolVersion
(String) probationTime
(UInt32) systemIsolationState
Network Adapter
Namespace: root\cimv2
class Win32_NetworkAdapter
(String) DeviceID
(String) AdapterType
(Boolean) AutoSense
(UInt16) Availability
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(Boolean) ErrorCleared
(String) ErrorDescription
(UInt32) Index
(DateTime) InstallDate
(Boolean) Installed
(UInt32) LastErrorCode
(String) MACAddress
(String) Manufacturer
(UInt32) MaxNumberControlled
(UInt64) MaxSpeed
(String) Name
(String) NetworkAddresses[]
(String) PermanentAddress
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) ProductName
(String) ServiceName
(UInt64) Speed
(String) Status
(UInt16) StatusInfo
(String) SystemName
(DateTime) TimeOfLastReset
Network Client
Namespace: root\cimv2
class Win32_NetworkClient
(String) Name
(String) Caption
(String) Description
(DateTime) InstallDate
(String) Manufacturer
(String) Status
Network Login Profile
Namespace: root\cimv2
class Win32_NetworkLoginProfile
(String) Name
(DateTime) AccountExpires
(UInt32) AuthorizationFlags
(UInt32) BadPasswordCount
(String) Caption
(UInt32) CodePage
(String) Comment
(UInt32) CountryCode
(String) Description
(UInt32) Flags
(String) FullName
(String) HomeDirectory
(String) HomeDirectoryDrive
(DateTime) LastLogoff
(DateTime) LastLogon
(String) LogonHours
(String) LogonServer
(UInt64) MaximumStorage
(UInt32) NumberOfLogons
(String) Parameters
(DateTime) PasswordAge
(DateTime) PasswordExpires
(UInt32) PrimaryGroupId
(UInt32) Privileges
(String) Profile
(String) ScriptPath
(String) SettingID
(UInt32) UnitsPerWeek
(String) UserComment
(UInt32) UserId
(String) UserType
(String) Workstations
NT Eventlog File
Namespace: root\cimv2
class Win32_NTEventlogFile
(String) Name
(UInt32) AccessMask
(Boolean) Archive
(String) Caption
(Boolean) Compressed
(String) CompressionMethod
(DateTime) CreationDate
(String) Description
(String) Drive
(String) EightDotThreeFileName
(Boolean) Encrypted
(String) EncryptionMethod
(String) Extension
(String) FileName
(UInt64) FileSize
(String) FileType
(String) FSName
(Boolean) Hidden
(DateTime) InstallDate
(UInt64) InUseCount
(DateTime) LastAccessed
(DateTime) LastModified
(String) LogfileName
(String) Manufacturer
(UInt32) MaxFileSize
(UInt32) NumberOfRecords
(UInt32) OverwriteOutDated
(String) OverWritePolicy
(String) Path
(Boolean) Readable
(String) Sources[]
(String) Status
(Boolean) System
(String) Version
(Boolean) Writeable
Office365ProPlusConfigurations
Namespace: root\cimv2
class Office365ProPlusConfigurations
(String) KeyName
(String) AutoUpgrade
(String) CCMManaged
(String) CDNBaseUrl
(String) cfgUpdateChannel
(String) ClientCulture
(String) ClientFolder
(String) GPOChannel
(String) GPOOfficeMgmtCOM
(String) InstallationPath
(String) LastScenario
(String) LastScenarioResult
(String) OfficeMgmtCOM
(String) Platform
(String) SharedComputerLicensing
(String) UpdateChannel
(String) UpdatePath
(String) UpdatesEnabled
(String) UpdateUrl
(String) VersionToReport
Office Addin
Namespace: root\ccm\InvAgt
class CCM_OfficeAddin
(String) Architecture
(String) ID
(String) OfficeApp
(String) Type
(UInt32) AverageLoadTimeInMilliseconds
(String) CLSID
(String) CompanyName
(UInt32) CrashCount
(String) Description
(UInt32) ErrorCount
(String) FileName
(UInt64) FileSize
(UInt32) FileTimestamp
(String) FileVersion
(String) FriendlyName
(String) FriendlyNameHash
(String) IdHash
(UInt32) LoadBehavior
(UInt32) LoadCount
(UInt32) LoadFailCount
(String) ProductName
(String) ProductVersion
Office VbaSummary
Namespace: root\ccm\InvAgt
class CCM_OfficeVbaScanResultsSummary
(UInt32) Design
(UInt32) Design64
(UInt32) DuplicateVba
(Boolean) HasResults
(UInt32) HasVba
(UInt32) Inaccessible
(UInt32) Issues
(UInt32) Issues64
(UInt32) IssuesNone
(UInt32) IssuesNone64
(UInt32) Locked
(UInt32) NoVba
(UInt32) Protected
(UInt32) RemLimited
(UInt32) RemLimited64
(UInt32) RemSignificant
(UInt32) RemSignificant64
(UInt32) Score
(UInt32) Score64
(UInt32) Total
(UInt32) Validation
(UInt32) Validation64
Operating System
Namespace: root\cimv2
class Win32_OperatingSystem
(String) Name
(String) BootDevice
(String) BuildNumber
(String) BuildType
(String) Caption
(String) CodeSet
(String) CountryCode
(String) CSDVersion
(SInt16) CurrentTimeZone
(Boolean) Debug
(String) Description
(Boolean) Distributed
(UInt8) ForegroundApplicationBoost
(UInt64) FreePhysicalMemory
(UInt64) FreeSpaceInPagingFiles
(UInt64) FreeVirtualMemory
(DateTime) InstallDate
(DateTime) LastBootUpTime
(DateTime) LocalDateTime
(String) Locale
(String) Manufacturer
(UInt32) MaxNumberOfProcesses
(UInt64) MaxProcessMemorySize
(String) MUILanguages[]
(UInt32) NumberOfLicensedUsers
(UInt32) NumberOfProcesses
(UInt32) NumberOfUsers
(UInt32) OperatingSystemSKU
(String) Organization
(String) OSArchitecture
(UInt32) OSLanguage
(UInt32) OSProductSuite
(UInt16) OSType
(String) OtherTypeDescription
(String) PlusProductID
(String) PlusVersionNumber
(Boolean) Primary
(UInt32) ProductType
(String) RegisteredUser
(String) SerialNumber
(UInt16) ServicePackMajorVersion
(UInt16) ServicePackMinorVersion
(UInt64) SizeStoredInPagingFiles
(String) Status
(String) SystemDevice
(String) SystemDirectory
(UInt64) TotalSwapSpaceSize
(UInt64) TotalVirtualMemorySize
(UInt64) TotalVisibleMemorySize
(String) Version
(String) WindowsDirectory
Operating System Ex
Namespace: root\cimv2
class CCM_OperatingSystemExtended
(String) Name
(UInt32) SKU
Optional Feature
Namespace: root\cimv2
class Win32_OptionalFeature
(String) Name
(String) Caption
(String) Description
(DateTime) InstallDate
(UInt32) InstallState
(String) Status
Parallel Port
Namespace: root\cimv2
class Win32_ParallelPort
(String) DeviceID
(UInt16) Availability
(UInt16) Capabilities[]
(String) CapabilityDescriptions[]
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(Boolean) DMASupport
(Boolean) ErrorCleared
(String) ErrorDescription
(DateTime) InstallDate
(UInt32) LastErrorCode
(UInt32) MaxNumberControlled
(String) Name
(Boolean) OSAutoDiscovered
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt16) ProtocolSupported
(String) Status
(UInt16) StatusInfo
(String) SystemName
(DateTime) TimeOfLastReset
BIOS
Namespace: root\cimv2
class Win32_BIOS
(String) Name
(String) SoftwareElementID
(UInt16) SoftwareElementState
(UInt16) TargetOperatingSystem
(String) Version
(UInt16) BiosCharacteristics[]
(String) BIOSVersion[]
(String) BuildNumber
(String) Caption
(String) CodeSet
(String) CurrentLanguage
(String) Description
(String) IdentificationCode
(UInt16) InstallableLanguages
(DateTime) InstallDate
(String) LanguageEdition
(String) ListOfLanguages[]
(String) Manufacturer
(String) OtherTargetOS
(Boolean) PrimaryBIOS
(DateTime) ReleaseDate
(String) SerialNumber
(String) SMBIOSBIOSVersion
(UInt16) SMBIOSMajorVersion
(UInt16) SMBIOSMinorVersion
(Boolean) SMBIOSPresent
(String) Status
PCMCIA Controller
Namespace: root\cimv2
class Win32_PCMCIAController
(String) DeviceID
(UInt16) Availability
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(Boolean) ErrorCleared
(String) ErrorDescription
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Manufacturer
(UInt32) MaxNumberControlled
(String) Name
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt16) ProtocolSupported
(String) Status
(UInt16) StatusInfo
(String) SystemName
(DateTime) TimeOfLastReset
Physical Memory
Namespace: root\cimv2
class Win32_PhysicalMemory
(String) CreationClassName
(String) Tag
(String) BankLabel
(UInt64) Capacity
(String) Caption
(UInt16) DataWidth
(String) Description
(String) DeviceLocator
(UInt16) FormFactor
(Boolean) HotSwappable
(DateTime) InstallDate
(UInt16) InterleaveDataDepth
(UInt32) InterleavePosition
(String) Manufacturer
(UInt16) MemoryType
(String) Model
(String) Name
(String) OtherIdentifyingInfo
(String) PartNumber
(UInt32) PositionInRow
(Boolean) PoweredOn
(Boolean) Removable
(Boolean) Replaceable
(String) SerialNumber
(String) SKU
(UInt32) Speed
(String) Status
(UInt16) TotalWidth
(UInt16) TypeDetail
(String) Version
PhysicalDisk
Namespace: root\microsoft\windows\storage
class MSFT_PhysicalDisk
(String) ObjectId
(UInt64) AllocatedSize
(UInt16) BusType
(UInt16) CannotPoolReason[]
(Boolean) CanPool
(String) Description
(String) DeviceId
(UInt16) EnclosureNumber
(String) FirmwareVersion
(String) FriendlyName
(UInt16) HealthStatus
(Boolean) IsIndicationEnabled
(Boolean) IsPartial
(UInt64) LogicalSectorSize
(String) Manufacturer
(UInt16) MediaType
(String) Model
(UInt16) OperationalStatus[]
(String) OtherCannotPoolReasonDescription
(String) PartNumber
(String) PhysicalLocation
(UInt64) PhysicalSectorSize
(String) SerialNumber
(UInt64) Size
(UInt16) SlotNumber
(String) SoftwareVersion
(UInt32) SpindleSpeed
(UInt16) SupportedUsages[]
(String) UniqueId
(UInt16) Usage
Pointing Device
Namespace: root\cimv2
class Win32_PointingDevice
(String) DeviceID
(UInt16) Availability
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(UInt16) DeviceInterface
(UInt32) DoubleSpeedThreshold
(Boolean) ErrorCleared
(String) ErrorDescription
(UInt16) Handedness
(String) HardwareType
(String) InfFileName
(String) InfSection
(DateTime) InstallDate
(Boolean) IsLocked
(UInt32) LastErrorCode
(String) Manufacturer
(String) Name
(UInt8) NumberOfButtons
(String) PNPDeviceID
(UInt16) PointingType
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt32) QuadSpeedThreshold
(UInt32) Resolution
(UInt32) SampleRate
(String) Status
(UInt16) StatusInfo
(UInt32) Synch
(String) SystemName
Portable Battery
Namespace: root\cimv2
class Win32_PortableBattery
(String) DeviceID
(UInt16) Availability
(UInt16) BatteryStatus
(UInt16) CapacityMultiplier
(String) Caption
(UInt16) Chemistry
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(UInt32) DesignCapacity
(UInt64) DesignVoltage
(Boolean) ErrorCleared
(String) ErrorDescription
(UInt16) EstimatedChargeRemaining
(UInt32) EstimatedRunTime
(UInt32) ExpectedLife
(UInt32) FullChargeCapacity
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Location
(String) ManufactureDate
(String) Manufacturer
(UInt16) MaxBatteryError
(UInt32) MaxRechargeTime
(String) Name
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) SmartBatteryVersion
(String) Status
(UInt16) StatusInfo
(String) SystemName
(UInt32) TimeOnBattery
(UInt32) TimeToFullCharge
Ports
Namespace: root\cimv2
class Win32_PortResource
(UInt64) StartingAddress
(Boolean) Alias
(String) Caption
(String) Description
(UInt64) EndingAddress
(DateTime) InstallDate
(String) Name
(String) Status
Power Capabilities
Namespace: root\CCM\powermanagementagent
class CCM_PwrMgmtSystemPowerCapabilities
(UInt32) PreferredPMProfile
(Boolean) ApmPresent
(Boolean) BatteriesAreShortTerm
(Boolean) FullWake
(Boolean) LidPresent
(String) MinDeviceWakeState
(Boolean) ProcessorThrottle
(String) RtcWake
(Boolean) SystemBatteriesPresent
(Boolean) SystemS1
(Boolean) SystemS2
(Boolean) SystemS3
(Boolean) SystemS4
(Boolean) SystemS5
(Boolean) UpsPresent
(Boolean) VideoDimPresent
Power Configurations
Namespace: root\CCM\policy\machine\actualconfig
class CCM_PowerConfig
(String) PowerConfigID
(UInt32) DurationInSec
(String) NonPeakPowerPlan
(String) NonPeakPowerPlanName
(String) PeakPowerPlan
(String) PeakPowerPlanName
(String) PeakStartTimeHoursMin
(String) WakeUpTimeHoursMin
Power Settings
Namespace: root\cimv2\sms
class SMS_PowerSettings
(String) GUID
(String) ACSettingIndex
(String) ACValue
(String) DCSettingIndex
(String) DCValue
(String) Name
(String) UnitSpecifier
Print Jobs
Namespace: root\cimv2
class Win32_PrintJob
(String) Name
(String) Caption
(String) DataType
(String) Description
(String) Document
(String) DriverName
(DateTime) ElapsedTime
(String) HostPrintQueue
(DateTime) InstallDate
(UInt32) JobId
(String) JobStatus
(String) Notify
(String) Owner
(UInt32) PagesPrinted
(String) Parameters
(String) PrintProcessor
(UInt32) Priority
(UInt32) Size
(DateTime) StartTime
(String) Status
(UInt32) StatusMask
(DateTime) TimeSubmitted
(UInt32) TotalPages
(DateTime) UntilTime
Printer Configuration
Namespace: root\cimv2
class Win32_PrinterConfiguration
(String) Name
(UInt32) BitsPerPel
(String) Caption
(Boolean) Collate
(UInt32) Color
(UInt32) Copies
(String) Description
(String) DeviceName
(UInt32) DisplayFlags
(UInt32) DisplayFrequency
(UInt32) DitherType
(UInt32) DriverVersion
(Boolean) Duplex
(String) FormName
(UInt32) HorizontalResolution
(UInt32) ICMIntent
(UInt32) ICMMethod
(UInt32) LogPixels
(UInt32) MediaType
(UInt32) Orientation
(UInt32) PaperLength
(String) PaperSize
(UInt32) PaperWidth
(UInt32) PelsHeight
(UInt32) PelsWidth
(UInt32) PrintQuality
(UInt32) Scale
(String) SettingID
(UInt32) SpecificationVersion
(UInt32) TTOption
(UInt32) VerticalResolution
(UInt32) XResolution
(UInt32) YResolution
Printer Device
Namespace: root\cimv2
class Win32_Printer
(String) DeviceID
(UInt32) Attributes
(UInt16) Availability
(UInt32) AveragePagesPerMinute
(UInt16) Capabilities[]
(String) CapabilityDescriptions[]
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(UInt32) DefaultPriority
(String) Description
(UInt16) DetectedErrorState
(String) DriverName
(Boolean) ErrorCleared
(String) ErrorDescription
(UInt32) HorizontalResolution
(DateTime) InstallDate
(UInt32) JobCountSinceLastReset
(UInt16) LanguagesSupported[]
(UInt32) LastErrorCode
(String) Location
(String) Name
(UInt16) PaperSizesSupported[]
(String) PNPDeviceID
(String) PortName
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) PrinterPaperNames[]
(UInt32) PrinterState
(UInt16) PrinterStatus
(String) PrintJobDataType
(String) PrintProcessor
(String) SeparatorFile
(String) ServerName
(String) ShareName
(Boolean) SpoolEnabled
(DateTime) StartTime
(String) Status
(UInt16) StatusInfo
(String) SystemName
(DateTime) TimeOfLastReset
(DateTime) UntilTime
(UInt32) VerticalResolution
Process
Namespace: root\cimv2
class Win32_Process
(String) Handle
(String) Caption
(DateTime) CreationDate
(String) Description
(String) ExecutablePath
(UInt16) ExecutionState
(UInt32) HandleCount
(DateTime) InstallDate
(UInt64) KernelModeTime
(UInt32) MaximumWorkingSetSize
(UInt32) MinimumWorkingSetSize
(String) Name
(String) OSName
(UInt64) OtherOperationCount
(UInt64) OtherTransferCount
(UInt32) PageFaults
(UInt32) PageFileUsage
(UInt32) ParentProcessId
(UInt32) PeakPageFileUsage
(UInt64) PeakVirtualSize
(UInt32) PeakWorkingSetSize
(UInt32) Priority
(UInt64) PrivatePageCount
(UInt32) ProcessId
(UInt32) QuotaNonPagedPoolUsage
(UInt32) QuotaPagedPoolUsage
(UInt32) QuotaPeakNonPagedPoolUsage
(UInt32) QuotaPeakPagedPoolUsage
(UInt64) ReadOperationCount
(UInt64) ReadTransferCount
(UInt32) SessionId
(String) Status
(DateTime) TerminationDate
(UInt32) ThreadCount
(UInt64) UserModeTime
(UInt64) VirtualSize
(String) WindowsVersion
(UInt64) WorkingSetSize
(UInt64) WriteOperationCount
(UInt64) WriteTransferCount
Processor
Namespace: root\cimv2\sms
class SMS_Processor
(String) DeviceID
(UInt16) AddressWidth
(UInt16) Architecture
(UInt16) Availability
(UInt16) BrandID
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) CPUHash
(String) CPUKey
(UInt16) CpuStatus
(UInt32) CurrentClockSpeed
(UInt16) CurrentVoltage
(UInt16) DataWidth
(String) Description
(Boolean) ErrorCleared
(String) ErrorDescription
(UInt32) ExtClock
(UInt16) Family
(DateTime) InstallDate
(Boolean) Is64Bit
(Boolean) IsHyperthreadCapable
(Boolean) IsHyperthreadEnabled
(Boolean) IsMobile
(Boolean) IsTrustedExecutionCapable
(Boolean) IsVitualizationCapable
(UInt32) L2CacheSize
(UInt32) L2CacheSpeed
(UInt32) L3CacheSize
(UInt32) L3CacheSpeed
(UInt32) LastErrorCode
(UInt16) Level
(UInt16) LoadPercentage
(String) Manufacturer
(UInt32) MaxClockSpeed
(String) Name
(UInt32) NormSpeed
(UInt32) NumberOfCores
(UInt32) NumberOfLogicalProcessors
(String) OtherFamilyDescription
(Boolean) PartOfDomain
(UInt32) PCache
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) ProcessorId
(UInt16) ProcessorType
(UInt16) Revision
(String) Role
(String) SocketDesignation
(String) Status
(UInt16) StatusInfo
(String) Stepping
(String) SystemName
(String) UniqueId
(UInt16) UpgradeMethod
(String) Version
(UInt32) VoltageCaps
(String) Workgroup
Protocol
Namespace: root\cimv2
class Win32_NetworkProtocol
(String) Name
(String) Caption
(Boolean) ConnectionlessService
(String) Description
(Boolean) GuaranteesDelivery
(Boolean) GuaranteesSequencing
(DateTime) InstallDate
(UInt32) MaximumAddressSize
(UInt32) MaximumMessageSize
(Boolean) MessageOriented
(UInt32) MinimumAddressSize
(Boolean) PseudoStreamOriented
(String) Status
(Boolean) SupportsBroadcasting
(Boolean) SupportsConnectData
(Boolean) SupportsDisconnectData
(Boolean) SupportsEncryption
(Boolean) SupportsExpeditedData
(Boolean) SupportsFragmentation
(Boolean) SupportsGracefulClosing
(Boolean) SupportsGuaranteedBandwidth
(Boolean) SupportsMulticasting
(Boolean) SupportsQualityofService
Registry
Namespace: root\cimv2
class Win32_Registry
(String) Name
(String) Caption
(UInt32) CurrentSize
(String) Description
(DateTime) InstallDate
(UInt32) MaximumSize
(UInt32) ProposedSize
(String) Status
SCSI Controller
Namespace: root\cimv2
class Win32_SCSIController
(String) DeviceID
(UInt16) Availability
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(UInt32) ControllerTimeouts
(String) Description
(String) DeviceMap
(String) DriverName
(Boolean) ErrorCleared
(String) ErrorDescription
(String) HardwareVersion
(UInt32) Index
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Manufacturer
(UInt32) MaxDataWidth
(UInt32) MaxNumberControlled
(UInt64) MaxTransferRate
(String) Name
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt16) ProtectionManagement
(UInt16) ProtocolSupported
(String) Status
(UInt16) StatusInfo
(String) SystemName
(DateTime) TimeOfLastReset
Serial Ports
Namespace: root\cimv2
class Win32_SerialPort
(String) DeviceID
(UInt16) Availability
(Boolean) Binary
(UInt16) Capabilities[]
(String) CapabilityDescriptions[]
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(Boolean) ErrorCleared
(String) ErrorDescription
(DateTime) InstallDate
(UInt32) LastErrorCode
(UInt32) MaxBaudRate
(UInt32) MaximumInputBufferSize
(UInt32) MaximumOutputBufferSize
(UInt32) MaxNumberControlled
(String) Name
(Boolean) OSAutoDiscovered
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt16) ProtocolSupported
(String) ProviderType
(Boolean) SettableBaudRate
(Boolean) SettableDataBits
(Boolean) SettableFlowControl
(Boolean) SettableParity
(Boolean) SettableParityCheck
(Boolean) SettableRLSD
(Boolean) SettableStopBits
(String) Status
(UInt16) StatusInfo
(Boolean) Supports16BitMode
(Boolean) SupportsDTRDSR
(Boolean) SupportsElapsedTimeouts
(Boolean) SupportsIntTimeouts
(Boolean) SupportsParityCheck
(Boolean) SupportsRLSD
(Boolean) SupportsRTSCTS
(Boolean) SupportsSpecialCharacters
(Boolean) SupportsXOnXOff
(Boolean) SupportsXOnXOffSet
(String) SystemName
(DateTime) TimeOfLastReset
Server Feature
Namespace: root\cimv2
class Win32_ServerFeature
(UInt32) ID
(String) Name
(UInt32) ParentID
Services
Namespace: root\cimv2
class Win32_Service
(String) Name
(Boolean) AcceptPause
(Boolean) AcceptStop
(String) Caption
(UInt32) CheckPoint
(String) Description
(Boolean) DesktopInteract
(String) DisplayName
(String) ErrorControl
(UInt32) ExitCode
(DateTime) InstallDate
(String) PathName
(UInt32) ProcessId
(UInt32) ServiceSpecificExitCode
(String) ServiceType
(Boolean) Started
(String) StartMode
(String) StartName
(String) State
(String) Status
(String) SystemName
(UInt32) TagId
(UInt32) WaitHint
Shares
Namespace: root\cimv2
class Win32_Share
(String) Name
(UInt32) AccessMask
(Boolean) AllowMaximum
(String) Caption
(String) Description
(DateTime) InstallDate
(UInt32) MaximumAllowed
(String) Path
(String) Status
(UInt32) Type
SW Licensing Product
Namespace: root\cimv2
class SoftwareLicensingProduct
(String) ID
(String) ApplicationID
(String) Description
(DateTime) EvaluationEndDate
(UInt32) GracePeriodRemaining
(UInt32) LicenseStatus
(String) MachineURL
(String) Name
(String) OfflineInstallationId
(String) PartialProductKey
(String) ProcessorURL
(String) ProductKeyID
(String) ProductKeyURL
(String) UseLicenseURL
SW Licensing Service
Namespace: root\cimv2
class SoftwareLicensingService
(String) Version
(String) ClientMachineID
(UInt32) IsKeyManagementServiceMachine
(UInt32) KeyManagementServiceCurrentCount
(String) KeyManagementServiceMachine
(String) KeyManagementServiceProductKeyID
(UInt32) PolicyCacheRefreshRequired
(UInt32) RequiredClientCount
(UInt32) VLActivationInterval
(UInt32) VLRenewalInterval
Software Shortcut
Namespace: root\cimv2\sms
class SMS_SoftwareShortcut
(String) ShortcutKey
(String) BinFileVersion
(String) BinProductVersion
(String) Description
(String) FilePropertiesHash
(String) FilePropertiesHashEx
(UInt32) FileSize
(String) FileVersion
(UInt32) Language
(String) ParentName
(String) Product
(String) ProductCode
(String) ProductVersion
(String) Publisher
(String) ShortcutName
(UInt32) ShortcutType
(String) TargetExecutable
SMS_SoftwareTag
Namespace: root\cimv2\sms
class SMS_SoftwareTag
(String) TagCreatorRegid
(String) UniqueID
(String) DisplayVersion
(Boolean) EntitlementRequired
(String) ProductName
(String) SoftwareCreator
(String) SoftwareCreatorRegid
(String) SoftwareLicensor
(String) SoftwareLicensorRegid
(String) TagCreator
(SInt32) VersionMajor
(SInt32) VersionMinor
Sound Devices
Namespace: root\cimv2
class Win32_SoundDevice
(String) DeviceID
(UInt16) Availability
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(UInt16) DMABufferSize
(Boolean) ErrorCleared
(String) ErrorDescription
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Manufacturer
(UInt32) MPU401Address
(String) Name
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) ProductName
(String) Status
(UInt16) StatusInfo
(String) SystemName
System Account
Namespace: root\cimv2
class Win32_SystemAccount
(String) Domain
(String) Name
(String) Caption
(String) Description
(DateTime) InstallDate
(String) SID
(UInt8) SIDType
(String) Status
System Drivers
Namespace: root\cimv2
class Win32_SystemDriver
(String) Name
(Boolean) AcceptPause
(Boolean) AcceptStop
(String) Caption
(String) Description
(Boolean) DesktopInteract
(String) DisplayName
(String) ErrorControl
(UInt32) ExitCode
(DateTime) InstallDate
(String) PathName
(UInt32) ServiceSpecificExitCode
(String) ServiceType
(Boolean) Started
(String) StartMode
(String) StartName
(String) State
(String) Status
(String) SystemName
(UInt32) TagId
System Enclosure
Namespace: root\cimv2
class Win32_SystemEnclosure
(String) Tag
(Boolean) AudibleAlarm
(String) BreachDescription
(String) CableManagementStrategy
(String) Caption
(UInt16) ChassisTypes[]
(SInt16) CurrentRequiredOrProduced
(String) Description
(UInt16) HeatGeneration
(Boolean) HotSwappable
(DateTime) InstallDate
(Boolean) LockPresent
(String) Manufacturer
(String) Model
(String) Name
(UInt16) NumberOfPowerCords
(String) OtherIdentifyingInfo
(String) PartNumber
(Boolean) PoweredOn
(Boolean) Removable
(Boolean) Replaceable
(UInt16) SecurityBreach
(UInt16) SecurityStatus
(String) SerialNumber
(String) ServiceDescriptions[]
(UInt16) ServicePhilosophy[]
(String) SKU
(String) SMBIOSAssetTag
(String) Status
(String) TypeDescriptions[]
(String) Version
(Boolean) VisibleAlarm
Tape Drive
Namespace: root\cimv2
class Win32_TapeDrive
(String) DeviceID
(UInt16) Availability
(UInt16) Capabilities[]
(String) CapabilityDescriptions[]
(String) Caption
(UInt32) Compression
(String) CompressionMethod
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(UInt64) DefaultBlockSize
(String) Description
(UInt32) ECC
(UInt32) EOTWarningZoneSize
(Boolean) ErrorCleared
(String) ErrorDescription
(String) ErrorMethodology
(UInt32) FeaturesHigh
(UInt32) FeaturesLow
(String) ID
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Manufacturer
(UInt64) MaxBlockSize
(UInt64) MaxMediaSize
(UInt32) MaxPartitionCount
(String) MediaType
(UInt64) MinBlockSize
(String) Name
(Boolean) NeedsCleaning
(UInt32) NumberOfMediaSupported
(UInt32) Padding
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt32) ReportSetMarks
(String) Status
(UInt16) StatusInfo
(String) SystemName
Time Zone
Namespace: root\cimv2
class Win32_TimeZone
(String) StandardName
(SInt32) Bias
(String) Caption
(SInt32) DaylightBias
(UInt32) DaylightDay
(UInt8) DaylightDayOfWeek
(UInt32) DaylightHour
(UInt32) DaylightMillisecond
(UInt32) DaylightMinute
(UInt32) DaylightMonth
(String) DaylightName
(UInt32) DaylightSecond
(UInt32) DaylightYear
(String) Description
(String) SettingID
(UInt32) StandardBias
(UInt32) StandardDay
(UInt8) StandardDayOfWeek
(UInt32) StandardHour
(UInt32) StandardMillisecond
(UInt32) StandardMinute
(UInt32) StandardMonth
(UInt32) StandardSecond
(UInt32) StandardYear
TPM
Namespace: root\CIMv2\Security\MicrosoftTpm
class Win32_Tpm
(Boolean) IsActivated_InitialValue
(Boolean) IsEnabled_InitialValue
(Boolean) IsOwned_InitialValue
(UInt32) ManufacturerId
(String) ManufacturerVersion
(String) ManufacturerVersionInfo
(String) PhysicalPresenceVersionInfo
(String) SpecVersion
TPM Status
Namespace: root\cimv2\sms
class SMS_TPM
(Boolean) IsReady
(UInt32) Information
(Boolean) IsApplicable
TS Issued License
Namespace: root\cimv2
class Win32_TSIssuedLicense
(UInt32) LicenseId
(DateTime) ExpirationDate
(DateTime) IssueDate
(UInt32) KeyPackId
(UInt32) LicenseStatus
(String) sHardwareId
(String) sIssuedToComputer
(String) sIssuedToUser
USB Controller
Namespace: root\cimv2
class Win32_USBController
(String) DeviceID
(UInt16) Availability
(String) Caption
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) Description
(Boolean) ErrorCleared
(String) ErrorDescription
(DateTime) InstallDate
(UInt32) LastErrorCode
(String) Manufacturer
(UInt32) MaxNumberControlled
(String) Name
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt16) ProtocolSupported
(String) Status
(UInt16) StatusInfo
(String) SystemName
(DateTime) TimeOfLastReset
USB Device
Namespace: root\cimv2
class Win32_USBDevice
(String) DeviceID
(String) Caption
(String) ClassGuid
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) CreationClassName
(String) Description
(String) Manufacturer
(String) Name
(String) PNPDeviceID
(String) Service
(String) Status
(String) SystemCreationClassName
(String) SystemName
Video Controller
Namespace: root\cimv2
class Win32_VideoController
(String) DeviceID
(UInt16) AcceleratorCapabilities[]
(String) AdapterCompatibility
(String) AdapterDACType
(UInt32) AdapterRAM
(UInt16) Availability
(String) CapabilityDescriptions[]
(String) Caption
(UInt32) ColorTableEntries
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(UInt32) CurrentBitsPerPixel
(UInt32) CurrentHorizontalResolution
(UInt64) CurrentNumberOfColors
(UInt32) CurrentNumberOfColumns
(UInt32) CurrentNumberOfRows
(UInt32) CurrentRefreshRate
(UInt16) CurrentScanMode
(UInt32) CurrentVerticalResolution
(String) Description
(UInt32) DeviceSpecificPens
(UInt32) DitherType
(DateTime) DriverDate
(String) DriverVersion
(Boolean) ErrorCleared
(String) ErrorDescription
(UInt32) ICMIntent
(UInt32) ICMMethod
(String) InfFilename
(String) InfSection
(DateTime) InstallDate
(String) InstalledDisplayDrivers
(UInt32) LastErrorCode
(UInt32) MaxMemorySupported
(UInt32) MaxNumberControlled
(UInt32) MaxRefreshRate
(UInt32) MinRefreshRate
(Boolean) Monochrome
(String) Name
(UInt16) NumberOfColorPlanes
(UInt32) NumberOfVideoPages
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(UInt16) ProtocolSupported
(UInt32) ReservedSystemPaletteEntries
(UInt32) SpecificationVersion
(String) Status
(UInt16) StatusInfo
(String) SystemName
(UInt32) SystemPaletteEntries
(DateTime) TimeOfLastReset
(UInt16) VideoArchitecture
(UInt16) VideoMemoryType
(UInt16) VideoMode
(String) VideoModeDescription
(String) VideoProcessor
Virtual Applications
Namespace: root\Microsoft\appvirt\client
class Application
(String) Name
(String) Version
(String) CachedOsdPath
(UInt32) GlobalRunningCount
(DateTime) LastLaunchOnSystem
(Boolean) Loading
(String) OriginalOsdPath
(String) PackageGUID
Virtual Machine (64)
Namespace: root\cimv2
class Win32Reg_SMSGuestVirtualMachine64
(String) InstanceKey
(String) PhysicalHostName
(String) PhysicalHostNameFullyQualified
Virtual Machine
Namespace: root\cimv2
class Win32Reg_SMSGuestVirtualMachine
(String) InstanceKey
(String) PhysicalHostName
(String) PhysicalHostNameFullyQualified
Volume
Namespace: root\cimv2
class Win32_Volume
(String) DeviceID
(UInt16) Access
(Boolean) Automount
(UInt16) Availability
(UInt64) BlockSize
(UInt64) Capacity
(String) Caption
(Boolean) Compressed
(UInt32) ConfigManagerErrorCode
(Boolean) ConfigManagerUserConfig
(String) CreationClassName
(String) Description
(Boolean) DirtyBitSet
(String) DriveLetter
(UInt32) DriveType
(Boolean) ErrorCleared
(String) ErrorDescription
(String) ErrorMethodology
(String) FileSystem
(UInt64) FreeSpace
(Boolean) IndexingEnabled
(DateTime) InstallDate
(String) Label
(UInt32) LastErrorCode
(UInt32) MaximumFileNameLength
(String) Name
(UInt64) NumberOfBlocks
(String) PNPDeviceID
(UInt16) PowerManagementCapabilities[]
(Boolean) PowerManagementSupported
(String) Purpose
(Boolean) QuotasEnabled
(Boolean) QuotasIncomplete
(Boolean) QuotasRebuilding
(UInt32) SerialNumber
(String) Status
(UInt16) StatusInfo
(Boolean) SupportsDiskQuotas
(Boolean) SupportsFileBasedCompression
(String) SystemCreationClassName
(String) SystemName
CCM_WebAppInstallInfo
Namespace: root\ccm\cimodels
class CCM_WebAppInstallInfo
(String) AppDeliveryTypeId
(UInt32) AppDtRevision
(String) TargetURL
(String) UserSID
(String) URLFileName
(String) URLPath
SMS_Windows8Application
Namespace: root\cimv2\sms
class SMS_Windows8Application
(String) FullName
(String) ApplicationName
(String) Architecture
(Boolean) ConfigMgrManaged
(String) DependencyApplicationNames
(String) FamilyName
(String) InstalledLocation
(Boolean) IsFramework
(String) Publisher
(String) PublisherId
(String) Version
SMS_Windows8ApplicationUserInfo
Namespace: root\cimv2\sms
class SMS_Windows8ApplicationUserInfo
(String) FullName
(String) UserSecurityId
(String) InstallState
(String) UserAccountName
Windows Update
Namespace: root\cimv2
class Win32Reg_SMSWindowsUpdate
(String) InstanceKey
(UInt32) AUOptions
(UInt32) NoAutoUpdate
(UInt32) UseWUServer
Sign and encrypt inventory data When clients communicate with management points by
using HTTPS, all data that they send is encrypted by using
SSL. However, when client computers use HTTP to
communicate with management points on the intranet,
client inventory data and collected files can be sent unsigned
and unencrypted. Make sure that the site is configured to
require signing and use encryption. In addition, if clients can
support the SHA-256 algorithm, select the option to require
SHA-256.
Do not collect IDMIF and NOIDMIF files in high-security You can use IDMIF and NOIDMIF file collection to extend
environments hardware inventory collection. When necessary,
Configuration Manager creates new tables or modifies
existing tables in the Configuration Manager database to
accommodate the properties in IDMIF and NOIDMIF files.
However, Configuration Manager does not validate IDMIF
and NOIDMIF files, so these files could be used to alter
tables that you do not want altered. Valid data could be
overwritten by invalid data. In addition, large amounts of
data could be added and the processing of this data might
cause delays in all Configuration Manager functions. To
mitigate these risks, configure the hardware inventory client
setting Collect MIF files as None .
TIP
Error code 80041006 in inventoryprovider.log means the WMI provider is out of memory. That is, the memory
quota limit for a provider has been hit and inventory provider cannot continue. In this case, the inventory agent
creates a report with 0 entries so no inventory items are reported.
A possible solution for this error would be to reduce the scope of the software inventory collection. In
circumstances when the error occurs after limiting the inventory scope, increasing the MemoryPerHost property
defined in the _ProviderHostQuotaConfiguration class can provide a solution.
NOTE
Resource Explorer will not display any inventory data until a software inventory cycle has run on the client.
Next steps
Use Support Center to view collected diagnostic files.
Security and privacy for software inventory in
Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
Sign and encrypt inventory data When clients communicate with management points by
using HTTPS, all data that they send is encrypted by using
SSL. However, when client computers use HTTP to
communicate with management points on the intranet,
client inventory data and collected files can be sent unsigned
and unencrypted. Make sure that the site is configured to
require signing and use encryption. In addition, if clients can
support the SHA-256 algorithm, select the option to require
SHA-256.
Do not use file collection to collect critical files or sensitive Configuration Manager software inventory uses all the
information rights of the LocalSystem account, which has the ability to
collect copies of critical system files, such as the registry or
security account database. When these files are available at
the site server, someone with the Read Resource rights or
NTFS rights to the stored file location could analyze their
contents and possibly discern important details about the
client in order to be able to compromise its security.
Restrict local administrative rights on client computers A user with local administrative rights can send invalid data
as inventory information.
IMPORTANT
Starting in November 2021, this feature of Configuration Manager is deprecated.
This deprecation plan doesn't include the product lifecycle dashboard.
Inventory and manage software license usage throughout your enterprise by using the asset intelligence
catalog. Asset intelligence adds hardware inventory classes to improve the breadth of information that
Configuration Manager collects. This information includes the hardware and software titles used in your
environment. Over 60 reports present this information in an easy-to-use format. Many of these reports link to
more specific reports. Query for general information and drill down to more detailed information.
Add custom information to the asset intelligence catalog. For example, custom software categories, software
families, software labels, and hardware requirements. To dynamically update the asset intelligence catalog with
the most current information available, connect it to the Microsoft Cloud.
Use asset intelligence to help reconcile your enterprise software license usage. Import software license
information into the Configuration Manager site database to view it against what software is being used.
Software families
Asset intelligence software families are used to define inventoried software titles within software categories.
Many software families are predefined in the asset intelligence catalog. You can create user-defined categories to
additionally define inventoried software. The validation state for all predefined software families is always
Validated . Custom software family information added to the asset intelligence catalog is User-Defined .
For more information about how to manage software families, see Configuring asset intelligence.
NOTE
Predefined software family information is read-only and can't be changed. Administrative users can add, modify, or delete
user-defined software families.
Software labels
Asset intelligence custom software labels let you create filters to group software titles and to view them in asset
intelligence reports. Use software labels to create user-defined groups of software titles that share a common
attribute. For example, you could create a software label called Shareware, associate it with inventoried
shareware titles, and run a report to display all software titles with that label. There are no predefined labels. The
validation state for software labels is always User Defined .
For more information about how to manage software labels, see Configuring asset intelligence.
Hardware requirements
Use the hardware requirements information to verify that computers meet the hardware requirements for
software titles before they're targeted for software deployments. Manage hardware requirements for software
titles in the Assets and Compliance workspace in the Hardware Requirements node under the Asset
Intelligence node.
Many hardware requirements are predefined in the asset intelligence catalog. Create new user-defined
hardware requirement information to meet custom requirements. The validation state for all predefined
hardware requirements is always Validated . User-defined hardware requirements information added to the
asset intelligence catalog is User Defined .
For more information about how to manage hardware requirements, see Configuring asset intelligence.
NOTE
The hardware requirements displayed in the Configuration Manager console are retrieved from the asset intelligence
catalog. They aren't based on inventoried software title information from clients.
Hardware requirement information isn't updated as part of the synchronization process with Microsoft.
You can create user-defined hardware requirements for inventoried software that doesn't have associated hardware
requirements.
By default, the following information is displayed for each listed hardware requirement:
Software Title : The software title associated with the hardware requirement
Minimum CPU (MHz) : The minimum processor speed in megahertz (MHz) required by the software
title
Minimum RAM (KB) : The minimum RAM in kilobytes (KB) required by the software title
Minimum Disk Space (KB) : The minimum free hard disk space in KB required by the software title
Minimum Disk Size (KB) : The minimum hard disk size in KB required by the software title
Validation State : The validation state for the hardware requirement
Predefined hardware requirements stored in the asset intelligence catalog are read-only and can't be deleted.
Administrative users can add, modify, or delete user-defined hardware requirements for software titles that
aren't stored in the asset intelligence catalog.
NOTE
The hardware inventory agent collects inventory based on the asset intelligence hardware inventory reporting classes
that you enable. For more information about how to enable the reporting classes, see Configuring asset intelligence.
By default, the following information is displayed for each inventoried software title:
Name : The name of the inventoried software title
Vendor : The name of the vendor that developed the inventoried software title
Version : The product version of the inventoried software title
Categor y : The software category that's currently assigned to the inventoried software title
Family : The software family that's currently assigned to the inventoried software title
Label [1 , 2 , and 3 ]: The custom labels associated with the software title. Inventoried software titles can
have up to three custom labels associated with them.
Count : The number of Configuration Manager clients that have inventoried the software title
State : The validation state for the inventoried software title
NOTE
You can change the categorization information for inventoried software only at the top-level site in your hierarchy. This
information includes product name, vendor, software category, and software family. After you modify the categorization
information for predefined software, the validation state for the software changes from Validated to User Defined .
NOTE
The Asset Intelligence home page doesn't automatically update while you're viewing it.
NOTE
The home page only displays this section when you install an asset intelligence synchronization point.
NOTE
The accuracy of the quantity of installed software titles and license information displayed in asset intelligence reports
might vary from the actual number of software titles installed or licenses that are used in the environment. This variation
is because of the complex dependencies and limitations involved in inventorying software license information for software
titles that are installed in enterprise environments. Don't use asset intelligence reports as the sole source for determining
purchased software license compliance.
Hardware reports
Asset intelligence hardware reports provide information about hardware assets in the organization. By using
hardware inventory information such as speed, memory, and peripheral devices, asset intelligence hardware
reports can present information about USB devices, about hardware that must be upgraded, and even about
computers that aren't ready for a specific software upgrade.
NOTE
Some user data in asset intelligence hardware reports is collected from the Windows security event log. For better report
accuracy, clear this log when you reassign a computer to a new user.
IMPORTANT
Several of the asset intelligence license management reports present information about the function of KMS, a method of
administering volume licensing. If you haven't implemented a KMS server, some reports might not return any data.
Software reports
Asset intelligence software reports provide information about software families, categories, and specific
software titles that are installed on computers in the organization. The software reports present information
such as browser helper objects and software that starts automatically. These reports can be used to identify
adware, spyware, and other malware. You can also use them to identify software redundancy to help streamline
software acquisition and support.
Software identification tag reports
Asset intelligence software identification tag reports provide information about software that includes a
software identification tag compliant with ISO/IEC 19770-2. The software identification tags provide
authoritative information used to identify installed software. When you enable the SMS_SoftwareTag
hardware inventory reporting class, Configuration Manager collects information about the software with
software identification tags.
The following reports provide information about the software:
Software 14A - Search for software identification tag enabled software : The count of installed
software with a software identification tag enabled
Software 14B - Computers with specific software identification tag enabled software
installed : All computers that have installed software with a specific software identification tag enabled
Software 14C - Installed software identification tag enabled software on a specific computer :
All installed software with a specific software identification tag enabled on a specific computer
Reporting limitations
Asset intelligence reports can provide large amounts of information about installed software titles and acquired
software licenses that are being used. Don't use this information as the only source for determining acquired
software license compliance.
Example dependencies
The accuracy of the quantity displayed in the asset intelligence reports for installed software titles and license
information can vary from the actual amounts currently used. This variation is caused by the complex
dependencies involved in inventorying software license information for software titles in use in enterprise
environments. The following examples show the dependencies involved in inventorying installed software in the
enterprise by using asset intelligence that might affect the accuracy of asset intelligence reports:
Client hardware inventor y dependencies : Asset intelligence installed software reports are based on
data collected from Configuration Manager clients by extending hardware inventory to enable asset
intelligence reporting. Because of this dependency on hardware inventory reporting, asset intelligence
reports reflect data only from clients that successfully complete hardware inventory processes with the
required asset intelligence WMI reporting classes enabled. Because Configuration Manager clients
perform hardware inventory processes on a schedule defined by the administrative user, a delay might
occur in data reporting that affects the accuracy of asset intelligence reports.
For example, an inventoried licensed software title might be uninstalled after the client finishes a
successful hardware inventory cycle. Asset intelligence reports display the software title as installed until
the client's next scheduled hardware inventory reporting cycle.
Software packaging dependencies : Asset intelligence reports are based on installed software title
data collected by using standard Configuration Manager client hardware inventory processes. Some
software title data might not be collected correctly. Examples that could cause inaccurate asset
intelligence reporting:
Software installations that don't comply with standard installation processes
Software installations that were changed before installation
Legal limitations
The information displayed in asset intelligence reports is subject to many limitations. The information displayed
in them doesn't represent legal, accounting, or other professional advice. The information provided by asset
intelligence reports is for information only. Don't use it as the only source of information for determining
software license usage compliance.
The following limitations are examples of using asset intelligence that might affect the accuracy of the reports:
Microsoft license usage quantity limitations :
The quantity of acquired Microsoft software licenses is based on information that administrators
supply. Closely review it to make sure that the correct number of software licenses is provided.
The reported quantity of Microsoft software licenses includes information only about Microsoft
software licenses acquired through volume licensing programs. It doesn't reflect information for
software licenses acquired through retail, OEM, or other software license sales channels.
Software licenses acquired in the last 45 days might not be included in the quantity of Microsoft
software licenses reported because of software reseller reporting requirements and schedules.
Software license transfers from company mergers or acquisitions might not be reflected in
Microsoft software license quantities.
Nonstandard terms and conditions in a Microsoft Volume Licensing (MVLS) agreement might
affect the number of software licenses reported. They might require additional review by a
Microsoft representative.
Installed software title quantity limitations : Configuration Manager clients must successfully
complete hardware inventory reporting cycles for the asset intelligence reports to accurately report the
quantity of installed software titles. There might be a delay between the installation or uninstallation of a
licensed software title after a successful hardware inventory reporting cycle. This action may not be
reflected in asset intelligence reports run before the client reports its next scheduled hardware inventory.
License reconciliation limitations : The reconciliation of the quantity of installed software titles to the
quantity of acquired software licenses is calculated by using a comparison of the license quantity
specified by the administrator and the quantity of installed software titles collected from Configuration
Manager client hardware inventories based on the schedule set by the administrator. This comparison
doesn't represent a final Microsoft conclusion of the license positions. The actual license position depends
on the specific software title license and usage rights granted by the license terms.
User Defined Microsoft researchers Customize the local catalog This state is displayed in
haven't defined the catalog information asset intelligence reports
item
Pending Microsoft researchers No further action after Catalog item remains in this
haven't defined the catalog requesting categorization state until Microsoft
item, but you submitted the researchers categorize the
item to Microsoft for item, and you synchronize
categorization your asset intelligence
catalog
Updateable A user-defined catalog item Use the Resolve Conflict After you resolve a
has been categorized action to decide whether to categorization conflict, the
differently by Microsoft use the new categorization item isn't validated as
during catalog information or the previous conflicting again unless later
synchronization. user-defined value. For categorization updates
more information about introduce new information
how to resolve conflicts, see about the item.
Operations for asset
intelligence.
STAT E DEF IN IT IO N A DM IN IST RATO R A C T IO N C O M M EN T
NOTE
Catalog items that you submit to Microsoft for categorization have a validation state of Pending on a central
administration site, but continue to be displayed with a validation state of Uncategorized on child primary sites.
For examples of when a validation state might transition from one state to another, see Example validation state
transitions for asset intelligence.
Prerequisites for Asset Intelligence in Configuration
Manager
2/16/2022 • 3 minutes to read • Edit Online
DEP EN DEN C Y M O RE IN F O RM AT IO N
Auditing of Success Logon Events Prerequisites Four Asset Intelligence reports display information gathered
from the Windows Security event logs on client computers. If
the Security event log settings are not configured to log all
Success logon events, these reports contain no data even if
the appropriate hardware inventory reporting class is
enabled.
NOTE
The SMS_SystemConsoleUser hardware inventory reporting class retains successful logon event data for only the
previous 90 days of the Security event log, regardless of the length of the log. If the Security event log has fewer than 90
days of data, the entire log is read.
DEP EN DEN C Y M O RE IN F O RM AT IO N
DEP EN DEN C Y M O RE IN F O RM AT IO N
Client Agent Prerequisites The Asset Intelligence reports depend on client information
that is obtained through client hardware and software
inventory reports. To obtain the information necessary for all
Asset Intelligence reports, the following client agents must
be enabled:
Hardware Inventory Client Agent Dependencies To collect inventory data required for some Asset Intelligence
reports, the Hardware Inventory Client Agent must be
enabled. In addition, some hardware inventory reporting
classes that Asset Intelligence reports depend on must be
enabled on primary site server computers.
Software Metering Client Agent Dependencies A number of Asset Intelligence software reports depend on
the Software Metering Client Agent for data. For information
about enabling the Software Metering Client Agent, see
Monitor app usage with software metering.
Asset Intelligence Hardware Inventory Reporting Class Asset Intelligence reports in Configuration Manager depend
Prerequisites on specific hardware inventory reporting classes. Until the
hardware inventory reporting classes are enabled and clients
have reported hardware inventory based on these classes,
the associated Asset Intelligence reports do not contain any
data. You can enable the following hardware inventory
reporting classes to support Asset Intelligence reporting
requirements:
- SMS_SystemConsoleUsage1
- SMS_SystemConsoleUser1
- SMS_InstalledSoftware
- SMS_AutoStartSoftware
- SMS_BrowserHelperObject
- Win32_USBDevice
- SMS_InstalledExecutable
- SMS_SoftwareShortcut
- SoftwareLicensingService
- SoftwareLicensingProduct
- SMS_SoftwareTag
1 By default, the SMS_SystemConsoleUsage and
SMS_SystemConsoleUser Asset Intelligence hardware
inventory reporting classes are enabled.
Reporting services point The reporting services point site system role must be
installed before software updates reports can be displayed.
For more information about creating a reporting services
point, see Configuring reporting.
Configure Asset Intelligence in Configuration
Manager
2/16/2022 • 12 minutes to read • Edit Online
1. In the Configuration Manager console, choose Asset and Compliance > Asset Intelligence .
2. On the Home tab, in the Asset Intelligence group, choose Edit Inventor y Classes .
3. To enable Asset Intelligence reporting, select Enable all Asset Intelligence repor ting classes or
Enable only the selected Asset Intelligence repor ting classes , and select at least one reporting
class from the classes displayed.
NOTE
Asset Intelligence reports that depend on the hardware inventory classes that you enable by using this procedure
do not display data until clients have scanned for and returned hardware inventory.
To e n a b l e A sse t I n t e l l i g e n c e h a r d w a r e i n v e n t o r y r e p o r t i n g c l a sse s fr o m c l i e n t se t t i n g s p r o p e r t i e s
1. In the Configuration Manager console, choose Administration > Client Settings > Default Client
Agent Settings . If you have created custom client settings, you can select those instead.
2. On the Home tab > Proper ties group, choose Proper ties .
3. Choose Hardware Inventor y > Set Classes . .
4. Choose Filter by categor y > Asset Intelligence Repor ting Classes . The list of classes is refreshed
with only the Asset Intelligence hardware inventory reporting classes.
5. Select at least one reporting class from the list.
NOTE
Asset Intelligence reports that depend on the hardware inventory classes that you enable by using this procedure
do not display data until clients have scanned for and returned hardware inventory.
1. In the Configuration Manager console, choose Administration > Site Configuration > Ser vers and
Site System Roles .
2. Add the Asset Intelligence synchronization point site system role to a new or existing site system server:
For a New site system ser ver : On the Home tab, in the Create group, choose Create Site
System Ser ver to start the wizard.
NOTE
By default, when Configuration Manager installs a site system role, the installation files are installed on the
first available NTFS-formatted hard disk drive that has the most available free hard disk space. To prevent
Configuration Manager from installing on specific drives, create an empty file named
NO_SMS_ON_DRIVE.SMS and copy it to the root folder of the drive before you install the site system
server.
For an Existing site system ser ver : Choose the server on which you want to install the Asset
Intelligence synchronization point site system role. When you choose a server, a list of the site
system roles that are already installed on the server are displayed in the details pane.
On the Home tab, in the Ser ver group, choose Add Site System Role to start the wizard.
3. Complete the General page. When you add the Asset Intelligence synchronization point to an existing
site system server, verify the values that were previously configured.
4. On the System Role Selection page, select Asset Intelligence Synchronization Point from the list
of available roles.
5. On the Asset Intelligence Synchronization Point Connection Settings page, choose Next .
By default, the Use this Asset Intelligence Synchronization Point setting is selected and cannot be
configured on this page. System Center Online accepts network traffic only over TCP port 443, therefore
the SSL por t number setting cannot be configured on this page of the wizard.
6. Optionally, you can specify a path to the System Center Online authentication certificate (.pfx) file.
Typically, you do not specify a path for the certificate because the connection certificate is automatically
provisioned during site role installation.
7. On the Proxy Ser ver Settings page, specify whether the Asset Intelligence synchronization point will
use a proxy server when connecting to System Center Online to synchronize the catalog and whether to
use credentials to connect to the proxy server.
WARNING
If a proxy server is required to connect to System Center Online, the connection certificate might also be deleted if
the user account password expires for the account configured for proxy server authentication.
8. On the Synchronization Schedule page, specify whether to synchronize the Asset Intelligence catalog
on a schedule. When you enable the synchronization schedule, you specify a simple or custom
synchronization schedule. During scheduled synchronization, the Asset Intelligence synchronization point
connects to System Center Online to retrieve the latest Asset Intelligence catalog. You can manually
synchronize the Asset Intelligence catalog from the Asset Intelligence node in the Configuration Manager
console. For the steps to manually synchronize the Asset Intelligence catalog, see the To manually
synchronize the Asset Intelligence catalog section in the Operations for Asset Intelligence.
9. Complete the wizard
Enable auditing of success logon events
Four Asset Intelligence reports display information gathered from the Windows Security event logs on client
computers. Here's how to configure computer security policy logon settings to enable auditing of Success logon
events.
To e n a b l e su c c e ss l o g o n e v e n t l o g g i n g b y u si n g a l o c a l se c u r i t y p o l i c y
1. On a Configuration Manager client computer, choose Star t > Administrative Tools > Local Security
Policy .
2. In the Local Security Policy dialog box, under Security Settings , expand Local Policies , and then
choose Audit Policy .
3. In the results pane, double-click Audit logon events , ensure that the Success check box is selected, and
then choose OK .
To e n a b l e su c c e ss l o g o n e v e n t l o g g i n g b y u si n g a n A c t i v e D i r e c t o r y d o m a i n se c u r i t y p o l i c y
1. On a domain controller computer, choose Star t , point to Administrative Tools , and then choose
Domain Security Policy .
2. In the Local Security Policy dialog box, under Security Settings , expand Local Policies , and then
choose Audit Policy .
3. In the results pane, double-click Audit logon events , ensure that the Success check box is selected, and
then choose OK .
Import software license information
The following sections describe the procedures necessary to import both Microsoft and general software
licensing information into the Configuration Manager site database by using the Import Software License
Wizard. When you import software license information into the site database from license statement files, the
site server computer account requires Full Control permissions for the NTFS file system to the file share that is
used to import software license information.
IMPORTANT
When software license information is imported into the site database, existing software license information is overwritten.
Ensure that the software license information file that you use with the Import Software License Wizard contains a
complete listing of all necessary software license information.
To i m p o r t so ft w a r e l i c e n se i n fo r m a t i o n i n t o t h e A sse t I n t e l l i g e n c e c a t a l o g
WARNING
To download an MVLS file in .csv format that you can import to the Asset Intelligence catalog, see Microsoft
Volume Licensing Service Center. To access this information, you must have a registered account on the website.
You must contact your Microsoft account representative for information about how to get your MVLS file in .xml
format.
4. Enter the UNC path to the license statement file or choose Browse to select a network shared folder and
file.
NOTE
The shared folder should be correctly secured to prevent unauthorized access to the licensing information file, and
the computer account of the computer that the wizard is being run on must have Full Control permissions to the
share that contains the license import file.
NOTE
While only the Name , Publisher , Version , and EffectiveQuantity fields are required to contain data, all fields must be
entered on the first row of the license import file. All date fields should be displayed in the following format:
Month/Day/Year, for example, 08/04/2008.
Asset Intelligence matches the products that you specify in the general license statement by using the product
name and product version, but not publisher name. You must use a product name in the general license
statement that is an exact match with the product name stored in the site database. Asset Intelligence takes the
EffectiveQuantity number given in the general license statement and compares the number with the number
of installed products found in Configuration Manager inventory.
TIP
To get a complete list of the product names stored in the Configuration Manager site database, you can run the following
query on the site database: SELECT DISTINCT ProductName0 FROM v_GS_INSTALLED_SOFTWARE.
You can specify exact versions for a product or specify part of the version, such as only the major version. The
following examples provide the resulting version matches for a general license statement version entry for a
specific product.
GEN ERA L L IC EN SE STAT EM EN T EN T RY M ATC H IN G SIT E DATA B A SE EN T RIES
Name: "Mysoftware", Version "2" Error during import. The import fails when more than one
entry matches the same product version.
Name: "Mysoftware", Version "2.05"
To c r e a t e a g e n e r a l l i c e n se st a t e m e n t i m p o r t fi l e b y u si n g M i c r o so ft Ex c e l
NOTE
For an example of a general software license file that you can use for testing purposes, see Example Asset Intelligence
general license import file.
1. In the Configuration Manager console, choose Administration > Site Configuration > Sites .
2. Select the site on which to configure the Asset Intelligence maintenance task.
3. On the Home tab, in the Settings group, choose Site Maintenance . Select a task, and choose Edit to
modify the settings.
We recommend that you set the time period to off-peak hours of the site. The time period is the time
interval in which the task can run. It is defined by the Star t after and Latest star t time specified in the
Task Proper ties dialog box.
You can initiate the task right away by selecting the current day and setting the Star t after time to a
couple minutes after the present time.
4. Choose OK to save your settings. The task now runs according to its schedule.
NOTE
If a task fails to run on the first attempt, Configuration Manager attempts to rerun the task until either the task
runs successfully or until the time period in which the task can run has passed.
How to use Asset Intelligence in Configuration
Manager
2/16/2022 • 15 minutes to read • Edit Online
NOTE
The Asset Intelligence catalog synchronization section of the Asset Intelligence home page is only displayed if
an Asset Intelligence synchronization point site system role has been installed.
Inventoried Software Status : Provides the count and percentage of inventoried software, software
categories, and software families that are identified by Microsoft, identified by an administrative user,
pending online identification, or unidentified and not pending. The information displayed in table format
shows the count for each, while the information displayed in the chart shows the percentage for each.
Use the following procedure to view Asset Intelligence information on the Asset Intelligence home
page.
To v i e w A sse t I n t e l l i g e n c e i n fo r m a t i o n o n t h e A sse t I n t e l l i g e n c e h o m e p a g e
Use the following procedure to view Asset Intelligence information by using the Asset Intelligence reports.
To v i e w c o l l e c t e d A sse t I n t e l l i g e n c e i n fo r m a t i o n b y u si n g A sse t I n t e l l i g e n c e r e p o r t s
WARNING
If no report folders exist under the Repor ts node, verify that you have configured reporting. For more
information, see Configuring reporting.
3. Select the Asset Intelligence report that you want to run, and then on the Home tab, in the Repor t
Group group, click Run .
NOTE
An Asset Intelligence synchronization point site system role must first be installed before by using the procedures. For
information about installing an Asset Intelligence synchronization point, see Configuring Asset Intelligence.
Use the following procedure to create a synchronization schedule for the Asset Intelligence catalog.
To create a synchronization schedule for the Asset Intelligence catalog
1. In the Configuration Manager console, click Assets and Compliance .
2. In the Assets and Compliance workspace, click Asset Intelligence .
3. On the Home tab, in the Create group, click Synchronize , and then click Schedule Synchronization .
4. In the Asset Intelligence Synchronization Point Schedule dialog box, select Enable
synchronization on a schedule , and then configure a simple or custom schedule.
5. Click OK to save the changes.
NOTE
For information about the synchronization schedule, including the next scheduled synchronization, see the Asset
Intelligence node in the Assets and Compliance workspace on the top-level site of the hierarchy.
Use the following procedure to manually synchronize the Asset Intelligence catalog.
WARNING
System Center Online accepts only one manual synchronization request in a 12-hour period.
NOTE
The validation state for all new custom software categories is always set to User Defined .
Click Next .
5. On the Summar y page, review the settings, and then click Next .
6. On the Completion page, click Close to exit the wizard.
Software families
Asset Intelligence software families are used to further define inventoried software titles within software
categories. For example, a software category could be energy companies, and a software family within that
software category could be oil and gas or hydroelectric. Many software families are predefined in the Asset
Intelligence catalog, and additional user-defined families can be created to define inventoried software. The
validation state for all predefined software families is always Validated , while custom software family
information added to the Asset Intelligence catalog is User Defined .
Use the following procedure to create a user-defined software family.
To c r e a t e a u se r- d e fi n e d so ft w a r e fa m i l y
NOTE
The validation state for all new custom software families is always set to User Defined .
5. On the Summar y page, review the settings, and then click Next .
6. On the Completion page, click Close to exit the wizard.
Software labels
Asset Intelligence custom software labels let you create filters that you can use to group software titles and view
them by using Asset Intelligence reports. For example, you can create a software label called shareware,
associate it with a number of applications, and then run a report that shows you all titles with the software label
of shareware. The validation state is User Defined for all custom software labels that you add to the Asset
Intelligence catalog.
Use the following procedure to create a user-defined custom label.
To c r e a t e a u se r- d e fi n e d so ft w a r e l a b e l
NOTE
The validation state for all new custom software labels is always set to User Defined .
5. On the Summar y page, review the settings, and then click Next .
6. On the Completion page, click Close to exit the wizard.
Hardware requirements
Hardware requirements information can help you verify that computers meet the hardware requirements for
software titles before they are targeted for software deployments. Many hardware requirements are predefined
in the Asset Intelligence catalog, and you can create new user-defined hardware requirement information to
meet custom requirements. The validation state for all predefined hardware requirements is always Validated ,
while user-defined hardware requirements information added to the Asset Intelligence catalog is User Defined .
IMPORTANT
The hardware requirements displayed in the Configuration Manager console are retrieved from the Asset Intelligence
catalog on the local computer and are not based on inventoried software title information from System Center 2012
Configuration Manager clients. Hardware requirements information is not updated as part of the synchronization process
with System Center Online. You can create user-defined hardware requirements for inventoried software that does not
have associated hardware requirements.
IMPORTANT
The categorization information can only be modified at the top-level site.
Use the following procedure to modify categorization information for inventoried software.
To m o d i fy t h e c a t e g o r i z a t i o n s fo r so ft w a r e t i t l e s
TIP
Click the State column to sort by the validation state. Sorting lets you see all software by validation state and
quickly select multiple items to revert to the original settings.
NOTE
For more information about Asset Intelligence privacy information, see Security and privacy for Asset Intelligence.
Use the following procedure to request Asset Intelligence catalog software title categorization from System
Center Online.
To request a catalog update for uncategorized software titles
1. In the Configuration Manager console, click Assets and Compliance .
2. In the Assets and Compliance workspace, click Asset Intelligence , and then click Inventoried
Software .
3. Select a product name or select multiple product names, to be submitted to System Center Online for
categorization. Only uncategorized inventoried software titles can be submitted to System Center Online
for categorization. If an inventoried software title has been categorized by an administrator resulting in a
user-defined state, you must right-click the inventoried software title, and then click Rever t to revert the
software title to the Uncategorized state before it can be submitted to System Center Online for
categorization.
NOTE
Configuration Manager can process up to 2000 software titles for categorization at a time. If you select more than
2000 software titles, only the first 2000 software titles will be processed. You must select the remaining software
titles for categorization in batches of less than 2000.
TIP
Click the State column to sort by the validation state. This lets you see all uncategorized product names and
quickly select multiple items to submit for categorization.
NOTE
Software that is submitted to System Center Online for categorization has a validation state of Pending on a
central administration site is still displayed with a validation state of Uncategorized on child primary sites.
Security guidance
Secure license files
When you import a Microsoft Volume Licensing file or a General License Statement file, secure the file and
communication channel. Configure NTFS permissions to make sure that only authorized users can access the
license files. Use Server Message Block (SMB) signing to keep the integrity of the data when it's transferred to
the site server during the import process.
Limit permissions for users who import license files
Use the principle of least permissions to import the license files. Use role-based administration to grant the
Manage Asset Intelligence permission to the administrative user who imports license files. The built-in role
of Asset Manager includes this permission.
Privacy information
Asset Intelligence extends the inventory capabilities of Configuration Manager to provide a higher level of asset
visibility. Asset Intelligence information collection isn't automatically enabled. You can modify the type of
information collected by enabling hardware inventory reporting classes. For more information, see Configure
Asset Intelligence.
Configuration Manager stores Asset Intelligence information in the site database the same as inventory
information. When clients connect to management points by using HTTPS, the data is always encrypted during
transfer to the management point. When clients connect by using HTTP, configure the inventory data transfer to
be signed and encrypted. Inventory data isn't stored in an encrypted format in the database. Information is kept
in the database until the site maintenance task Delete Aged Inventory History deletes it every 90 days by
default. You can configure the deletion interval.
Asset Intelligence doesn't send information about users, computers, or license usage to Microsoft. You can
choose to send System Center Online requests for categorization. For these requests, you tag one or more
uncategorized software titles and send them to Microsoft for research and categorization. After you upload a
software title, Microsoft researchers identify and categorize the software. They then make that information
available to all customers who use the online service.
When you submit information to System Center Online, understand the following privacy implications:
Upload applies only to generic software title information that you choose to send to Microsoft. For
example, software name and publisher. Inventory information isn't sent to Microsoft.
Upload never occurs automatically, and the system isn't designed for this task to be automated. Manually
select and approve the upload of each software title.
Before the upload process starts, the Configuration Manager console shows you exactly what data it will
upload.
License information isn't sent to Microsoft. Configuration Manager stores the license information in a
separate area of the site database, and it can't be sent to Microsoft.
Any software title that you upload becomes public. The knowledge of that software and its categorization
become part of the online Asset Intelligence catalog. Other customers can then download the catalog
updates.
The source of the software title isn't recorded in the Asset Intelligence catalog, and it isn't made available
to other customers. Still verify that you don't include any application titles that contain any private
information.
You can't recall uploaded data.
Example validation state transitions for Asset
Intelligence
2/16/2022 • 3 minutes to read • Edit Online
NOTE
Because categorization information obtained from System Center Online is stored in the database and cannot be deleted,
the administrative user can revert back to the System Center Online categorization later.
User Defined to Updateable A user-defined catalog item has been categorized differently
by System Center Online during subsequent manual bulk
updates of the Asset Intelligence catalog.
or
Updateable to User Defined The administrative user uses the Software Details
Conflict Resolution dialog box to use the previous user-
defined value.
NOTE
Because categorization information obtained from System Center Online is stored in the database and cannot be deleted,
the administrative user can revert back to the System Center Online categorization later.
User Defined to Pending You submit the user-defined item to System Center Online
for categorization.
Updateable to Validated You use the Resolve Conflict action and select the new
categorization information received from System Center
Online during the previous catalog update. For more
information about resolving conflicts, see Resolve software
details conflicts.
or
Updateable to User Defined You use the Resolve Conflict action and select to use the
previous user-defined value. For more information about
resolving conflicts, see Resolve software details conflicts.
NOTE
Because categorization information obtained from System Center Online is stored in the database and cannot be deleted,
you can revert back to the System Center Online categorization later.
Example Asset Intelligence general license import
file in Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
EF F EC T SUP P O SUP P O
IVEQ U RESEL L DAT EO RT P UR RT EXP I
P UB L IS VERSIO L A N GU A N T IT PONU ERN A F P URC C H A SE RAT IO C OMM
NAME H ER N A GE Y M B ER ME H A SE D N DAT E EN T S
Prerequisites
To see data in the product lifecycle dashboard, the following components are required:
Install Internet Explorer 9 or later on the computer that runs the Configuration Manager console.
To get updates for the data on this dashboard, the service connection point must be online. If the service
connection point is in offline mode, synchronize it regularly. For more information, see About the service
connection point.
Configure and synchronize the asset intelligence synchronization point. The dashboard uses the asset
intelligence catalog as metadata for product titles. Configuration Manager compares this metadata
against inventory data in your hierarchy. For more information, see Configure asset intelligence in
Configuration Manager.
If you're configuring the asset intelligence service point for the first time, make sure to enable
asset intelligence hardware inventory classes. The lifecycle dashboard depends on those asset
intelligence hardware inventory classes. The dashboard won't display data until clients scan for
and return hardware inventory.
In version 2006 and earlier, to view information about Extended Security Updates (ESU) in this
dashboard, enable the hardware inventory class Software Licensing Product - Asset
Intelligence (SoftwareLicensingProduct) . For more information, see Enable asset intelligence
hardware inventory classes. In version 2010 and later, the dashboard uses an attribute in the client
discovery data.
NOTE
The data in the dashboard is based on the site the Configuration Manager console connects to. If the console connects to
your top-tier site, you see data for the entire hierarchy. When connected to a child primary site, only data from that site
displays.
Change the view by selecting one of the following options from the Product categor y list:
All : View all products together
Windows Client : View Windows client OS versions
Windows Ser ver : View Windows server OS versions
Database : View SQL Server versions
Configuration Manager : View Configuration Manager versions
Microsoft Office : View information for installed versions of Office 2003 through Office 2016
The dashboard has the following tiles:
Top 5 products past end-of-suppor t : This tile is a consolidated data view of products found in your
environment past their end-of-support. The graph shows installed software that's expired when
compared against the support lifecycle for operating systems and SQL Server products.
Top 5 products nearing end-of-suppor t : This tile is a consolidated data view of products found in
your environment that are nearing end-of-support in next 18 months. The graph shows installed
software that's within 18 months of end-of-support when compared against the support lifecycle for
operating systems and SQL Server products.
Starting in version 2103, use the time slider to control the timeframe for this tile. The default is 18
months, but you can adjust it from 1 to 36 months.
Lifecycle data for installed products : This tile gives you a general idea of when a product transitions
from supported to the expired state. The chart provides a breakdown of the number of clients where the
product is installed, the support availability state, and a link to learn more about the next steps to take.
The following information is included in the chart:
Support time remaining
Number in environment
Mainstream support end date
Extended support end date
Next steps
Starting in version 2103, the dashboard also has a subnode, All Product Lifecycle Data . You can sort and
filter the product lifecycle information, which gives you multiple ways to view it. When you select a product, you
can View devices for that product. From the list of devices, you can create a direct membership collection. Use
this action to deploy the latest software versions to these collections so that the devices are kept current.
IMPORTANT
The information shown in this dashboard is provided for your convenience and only for use internally within your
company. You should not solely rely on this information to confirm compliance. Be sure to verify the accuracy of the
information provided to you, along with availability of support information by visiting the Microsoft Lifecycle Policy.
Reporting
Other reports are available as well. In the Configuration Manager console, go to the Monitoring workspace,
expand Repor ting , and expand Repor ts . The following reports are added under the category Asset
Intelligence :
Lifecycle 01A - Computers with a specific software product : View a list of computers on which a
specified product is detected.
Lifecycle 02A - List of machines with expired products in the organization : View computers
that have expired products on them. You can filter this report by product name.
Lifecycle 03A - List of expired products found in the organization : View details for products in
your environment that have expired lifecycle dates.
Lifecycle 04A - General Product Lifecycle over view : View a list of product lifecycles. Filter the list
by product name and days to expiration.
Lifecycle 05A - Product lifecycle dashboard : This report includes similar information as the in-
console dashboard. Select a category to view the count of products in your environment, and the days of
support remaining.
For more information, see List of reports.
Introduction to remote control in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
You cannot establish a Remote Assistance session from the Configuration Manager console to a client computer that is in
a workgroup.
You can start a remote control session in the Configuration Manager console from Assets and Compliance >
Devices , from any device collection, from the Windows Command Prompt window, or from the Windows Star t
menu.
Prerequisites for remote control in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
No Windows services are required as an external dependency for remote control.
TIP
For tenant-attached devices, remote tools are available in the Microsoft Endpoint Manager admin center. For more
information, see Support for remote tools.
Next steps
Configure remote control
Configuring remote control in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
Special keys, such as ~!#@$%, will not be translated correctly.
Ctrl+Alt+Minus Sign (on the numeric keypad) Copies the active window of the local computer to the
remote computer Clipboard.
Ctrl+Alt+Plus Sign (on the numeric keypad) Copies the entire local computer's window area to the
remote computer Clipboard.
How to remotely administer a Windows client
computer by using Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
NOTE
The above Start menu path is for versions from November 2019 (version 1910) or later. In earlier versions, the
folder name is Microsoft System Center .
IMPORTANT
If the client setting Prompt user for Remote Control permission is set to True , the connection does not
initiate until the user at the remote computer agrees to the remote control prompt. For more information, see
Configuring remote control.
3. After the Configuration Manager Remote Control window opens, you can remotely administer the
client computer. Use the following options to configure the connection.
NOTE
If the computer that you connect to has multiple monitors, the display from all the monitors is shown in the
remote control window.
File
Connect - Connect to another computer. This option is unavailable when a remote control
session is active.
Disconnect - Disconnects the active remote control session but doesn't close the
Configuration Manager Remote Control window.
Exit - Disconnects the active remote control session and closes the Configuration Manager
Remote Control window.
NOTE
When you disconnect a remote control session, the contents of the Windows Clipboard on the computer
that you are viewing is deleted.
View
Color depth - Choose either 16 bits or 32 bits per pixel.
Full Screen - Maximizes the Configuration Manager Remote Control window. To exit full
screen mode, press Ctrl+Alt+Break.
Optimize for low bandwidth connection - Choose this option if the connection is low
bandwidth.
Display:
All Screens - If the computer that you connect to has multiple monitors, the display
from all the monitors is shown in the remote control window.
First Screen - The first screen is at the top and far left as shown in Windows display
settings. You can't select a specific screen. When you switch the configuration of the
viewer, reconnect the remote session. The viewer saves your preference for future
connections.
Scale to Fit - Scales the display of the remote computer to fit the size of the
Configuration Manager Remote Control window.
Status Bar - Toggles the display of the Configuration Manager Remote Control
window status bar.
NOTE
The viewer saves your preference for future connections.
Action
Send Ctrl+Alt+Del Key - Sends a Ctrl+Alt+Del key combination to the remote computer.
Enable Clipboard Sharing - Lets you copy and paste items to and from the remote
computer. If you change this value, you must restart the remote control session for the change
to take effect.
If you don't want clipboard sharing to be enabled in the Configuration Manager console,
on the computer running the console, set the value of the registry key
HKEY_CURRENT_USER\Software\Microsoft\ConfigMgr10\Remote
Control\Clipboard Sharing to 0 .
Enable Keyboard Translation - Translates the keyboard layout of the computer running the
console to the connected device's layout.
Lock Remote Keyboard and Mouse - Locks the remote keyboard and mouse to prevent the
user from operating the remote computer.
Help
About Remote Control - Displays the current version of the viewer.
4. Users at the remote computer can view more information about the remote control session when they
click the Configuration Manager Remote Control icon. The icon is in the Windows notification area or
the icon on the remote control session bar.
To start the remote control viewer from the Windows command line
At the Windows command prompt, type <Configuration Manager Installation
Folder>\AdminConsole\Bin\i386\CmRcViewer.exe
CmRcViewer.exe supports the following command-line options:
Address - Specifies the NetBIOS name, the fully qualified domain name (FQDN), or the IP address of the
client computer that you want to connect to.
Site Server Name - Specifies the name of the Configuration Manager site server to which you want to send
status messages that are related to the remote control session.
/? - Displays the command-line options for the remote control viewer.
NOTE
The remote control viewer is supported on all operating systems that are supported for the Configuration Manager
console. For more information, see Supported configurations for Configuration Manager consoles and Prerequisites for
remote control.
Next steps
Audit remote control usage
How to audit remote control usage in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
When you connect to a remote computer, do not continue if When Configuration Manager detects that the remote
NTLM instead of Kerberos authentication is used. control session is authenticated by using NTLM instead of
Kerberos, you see a prompt that warns you that the identity
of the remote computer cannot be verified. Do not continue
with the remote control session. NTLM authentication is a
weaker authentication protocol than Kerberos and is
vulnerable to replay and impersonation.
Do not enable Clipboard sharing in the remote control The Clipboard supports objects such as executable files and
viewer. text and could be used by the user on the host computer
during the remote control session to run a program on the
originating computer.
Do not enter passwords for privileged accounts when Software that observes keyboard input could capture the
remotely administering a computer. password. Or, if the program that is being run on the client
computer is not the program that the remote control user
assumes, the program might be capturing the password.
When accounts and passwords are required, the end user
should enter them.
Lock the keyboard and mouse during a remote control If Configuration Manager detects that the remote control
session. connection is terminated, Configuration Manager
automatically locks the keyboard and mouse so that a user
cannot take control of the open remote control session.
However, this detection might not occur immediately and
does not occur if the remote control service is terminated.
Do not let users configure remote control settings in Do not enable the client setting Users can change policy
Software Center. or notification settings in Software Center to help
prevent users from being spied on. If one user changes it, it
can allow a different user on the same machine to be viewed
remotely.
Enable the Domain Windows Firewall profile. Enable the client setting Enable remote control on
clients Firewall exception profiles and then select the
Domain Windows Firewall for intranet computers.
If you log off during a remote control session and log on as If you do not log off in this scenario, the session remains
a different user, ensure that you log off before you open.
disconnect the remote control session.
Do not give users local administrator rights. When you give users local administrator rights, they might
be able to take over your remote control session or
compromise your credentials.
Use either Group Policy or Configuration Manager to You can use Configuration Manager and Group Policy to
configure Remote Assistance settings, but not both. make configuration changes to the Remote Assistance
settings. When Group Policy is refreshed on the client, by
default, it optimizes the process by changing only the
policies that have changed on the server. Configuration
Manager changes the settings in the local security policy,
which might not be overwritten unless the Group Policy
update is forced.
Enable the client setting Prompt user for Remote Although there are ways around this client setting that
Control permission . prompts a user to confirm a remote control session, enable
this setting to reduce the chance of users being spied upon
while working on confidential tasks.
Limit the Permitted Viewers list. Local administrator rights are not required for a user to be
able to use remote control.
IMPORTANT
Configuration Manager power management is not supported on virtual machines. You cannot apply power plans to
virtual machines, nor can you or report power data from them.
IMPORTANT
Do not apply power plans to computers in your site until you collect and analyze the power data from client computers. If
you apply new power management settings to computers without first examining the existing settings, you might
experience an increase in power consumption.
Enforcement phase
Power management lets you create power plans that you can apply to collections of computers in your site.
These power plans configure Windows power management settings on computers. You can use the power plans
that are included with Configuration Manager, or you can configure your own custom power plans. You can use
the power data that is collected during the monitoring and planning phase as a baseline to help you evaluate
power savings after you apply a power plan to computers. For more information, see Administrator checklist for
power management.
Compliance phase
In the compliance phase, you can run reports that help you to evaluate power usage and power cost savings in
your organization. You can also run reports that describe the improvements in the amount of CO2 generated by
computers. Reports are also available that help you validate that power settings were correctly applied to
computers and that help you troubleshoot problems with the power management feature.
Prerequisites for power management in
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
DEP EN DEN C Y M O RE IN F O RM AT IO N
Client computers must be able to support the required To use all features of power management, client computers
power states must be able to support the sleep, hibernate, wake from
sleep, and wake from hibernate actions. You can use the
Power Capabilities report to determine if computers can
support these actions. For more information, see Power
Capabilities report in the topic How to monitor and plan for
power management.
DEP EN DEN C Y M O RE IN F O RM AT IO N
Power management must be enabled before you can create For information about how to enable and configure power
and monitor power plans. management, see Configuring power management.
Reporting services point You must configure a reporting services point before you
can view power management reports. For more information,
see Introduction to reporting.
Recommendations for power management in
Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
Exclude servers
Power management for computers that run Windows Server isn't supported. Add servers to a collection and
exclude it from power management.
NOTE
Although Configuration Manager doesn't support power management of Windows Server, it still collects power usage
data for analysis and reporting.
IMPORTANT
Do not apply power plans to computers in your hierarchy until you have collected and analyzed power data from client
computers. If you apply new power management settings to computers without first examining the existing settings, this
might lead to an increase in power consumption.
TA SK DETA IL S
Review the power management concepts in the See Introduction to power management.
Configuration Manager documentation library.
Review the power management prerequisites in the See Prerequisites for power management.
Configuration Manager documentation library.
Review the best practices information for power See Best practices for power management.
management.
Configure your collections to manage power consumption Use the Collection for repor ting of baseline data ,
from computers within your environment. Collection for repor ting of baseline data , Collection
of computers incapable of power management ,
Collections of computers to which power plans will
be applied , Collections of computers to which power
plans will be applied , and Collections of computers
that are running Windows Ser ver to help you manage
power settings for computers in your hierarchy. You can
create multiple collections and apply different power plans to
each collection.
Enable power management. Before you can begin to use power management, you must
enable it and configure the required client settings. For more
information, see Configuring power management.
Collect power management information from client Power management data is reported by clients through
computers. Configuration Manager hardware inventory. Depending on
the hardware inventory schedule that you have configured,
it might take some time to retrieve inventory from all client
computers.
Monitoring and planning phase
TA SK DETA IL S
Run the report Computer Activity . The Computer Activity report displays a graph showing
monitor, computer, and user activity for a specified collection
over a specified time period. This report links to the
Computer Activity Details report which displays the
sleep and wake capabilities of computers in the specified
collection. For more information, see How to monitor and
plan for power management.
Run the report Energy Consumption or Energy The Energy Consumption and Energy Consumption
Consumption by Day . by Day reports display the total monthly power
consumption in kilowatt per hour (kWh) for a specified
collection over a specified time period. For more information,
see How to monitor and plan for power management.
Run the report Environmental Impact or Environmental The Environmental Impact and Environmental Impact
Impact by Day . by Day reports display a graph showing carbon dioxide
(CO2) emissions saved by a specified collection of computers
for a specified period of time. For more information, see How
to monitor and plan for power management.
Run the report Energy Cost or Energy Cost by Day . The Energy Cost and Energy Cost by Day reports
display the total power consumption cost for a specified
period of time. For more information, see How to monitor
and plan for power management.
Run the report Power Capabilities . The Power Capabilities report displays the power
management capabilities of computers in the specified
collection. For more information, see How to monitor and
plan for power management.
Run the report Power Settings . The Power Settings report displays an aggregated list of
the current power settings used by computers in a specified
collection. For more information, see How to monitor and
plan for power management.
Exclude any required collections of computers from power See Configuring power management.
management.
IMPORTANT
Ensure that you save the information from power management reports generated during the monitoring and planning
phase. You can compare this data to power management information generated during the enforcement and compliance
phases to help you evaluate, the power usage, power cost and environmental impact savings from applying a power plan
to computers in your hierarchy.
Enforcement phase
TA SK DETA IL S
Select existing power plans or create new power plans for See How to create and apply power plans.
collections of computers in your organization.
TA SK DETA IL S
Apply these power plans to computers. See How to create and apply power plans.
Compliance phase
TA SK DETA IL S
Run the report Computer Activity . The Computer Activity report displays a graph showing
monitor, computer, and user activity for a specified collection
over a specified time period. This report links to the Power
Computer Activity Details report which displays the
sleep and wake capabilities of computers in the specified
collection. For more information, see How to monitor and
plan for power management.
Run the report Energy Consumption or Energy The Energy Consumption and Energy Consumption
Consumption by Day . by Day reports display the total monthly power
consumption in kilowatt per hour (kWh) for a specified
collection over a specified time period. For more information,
see How to monitor and plan for power management.
Run the report Environmental Impact or Environmental The Environmental Impact and Environmental Impact
Impact by Day . by Day reports display a graph showing carbon dioxide
(CO2) emissions saved by a specified collection of computers
for a specified period of time. For more information, see How
to monitor and plan for power management.
Run the report Energy Cost or Energy Cost by Day . The Energy Cost and Energy Cost by Day reports
display the total power consumption cost for a specified
period of time. For more information, see How to monitor
and plan for power management.
Troubleshooting
TA SK DETA IL S
If computers in your hierarchy have not entered sleep or The Insomnia Repor t displays a list of common causes
hibernate, run the report Insomnia Repor t to display that prevented computers from entering sleep or hibernate
possible causes. and the number of computers affected by each cause for a
specified time period. For more information, see How to
monitor and plan for power management.
If multiple power plans are applied to one computer, then See Computers with Multiple Power Plans in How to
the least restrictive power plan is applied. Run the report monitor and plan for power management.
Computers with Multiple Power Plans to see
computers with multiple power plans applied.
Configure power management in Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
Exclude computers
You can prevent collections of computers from receiving power management settings. If a computer is a
member of any collection that you exclude from power management settings, that computer doesn't apply
power management settings. This behavior applies even if it's a member of another collection that does apply
power management settings.
You might want to exclude computers from power management for the following reasons:
You have a business requirement for computers to be turned on at all times.
You have a control collection of computers on which you don't want to apply power management
settings.
Some of your computers are incapable of applying power management settings.
You want to exclude computers that run Windows Server from power management.
NOTE
If you configure the client setting to Allow users to exclude their device from power management , users can
exclude their own computers from power management by using Software Center.
To find out which computers are excluded from power management, run the report Computers Excluded . For
more information about this report see How to monitor and plan for power management.
IMPORTANT
Excluding a computer from power management causes all power settings to be reverted to their original values. You
cannot revert individual power settings to their original values.
Next steps
How to create and apply power plans
How to monitor and plan for power management
How to create and apply power plans in
Configuration Manager
2/16/2022 • 6 minutes to read • Edit Online
IMPORTANT
Systems that you enable for Modern Standby (S0) won't apply Configuration Manager power policies. You'll see a
message similar to the following in the PwrProvider.log:
The "Required idleness to sleep" setting (<738eddaa-52e2-467f-b453-821ef2884d47>) is not supported on
this operating system. This setting will be ignored.
NOTE
You can also select Browse , and copy the power management settings from another collection to this collection.
5. Specify the Star t and End time for peak (or business) hours.
6. To specify a time when a desktop computer wakes from sleep or hibernate, Enable Wakeup time
(desktop computers) . When the client wakes up, it can install scheduled software updates or other
deployments.
IMPORTANT
Power management uses the internal Windows wakeup time feature to wake computers from sleep or hibernate.
Wakeup time settings aren't applied to portable computers to prevent scenarios in which they might wake when
not plugged in. The wake up time is randomized and computers will be woken over a one hour period from the
specified wakeup time.
7. If you want to configure a custom power plan for business hours, select Customized Peak
(ConfigMgr) from the Peak plan list, and then select Edit . If you want to configure a power plan for
non-business hours, select Customized Non-Peak (ConfigMgr) from the Non-peak plan list, and
then select Edit .
NOTE
You can use the Computer Activity report to help you decide the schedules to use for peak and non-peak
hours when you apply power plans to collections of computers. For more information, see How to monitor and
plan for power management.
You can also select from the built-in power plans: Balanced (ConfigMgr) , High Performance
(ConfigMgr) , and Power Saver (ConfigMgr) . Select View to display the properties of each power
plan.
NOTE
You can't modify the built-in power plans.
IMPORTANT
When the Configuration Manager client applies the power plan to the device, it applies the enabled
settings. If you unselect a power setting in the policy, the value on the client computer doesn't change
when it applies the power plan. This action also doesn't restore the power setting to its previous value
before a power plan was applied.
Turn off display after (minutes) Specifies the length of time, in minutes, that the computer
must be inactive before the display is turned off. If you don't
want power management to turn off the display, specify a
value of 0 .
Sleep after (minutes) Specifies the length of time, in minutes, that the computer
must be inactive before it enters sleep. If you don't want the
device to sleep, specify a value of 0 .
Require a password on wakeup Yes specifies that a user has to unlock the computer when
it wakes up.
Power button action Specifies the action when you press the computer's power
button: Do nothing , Sleep , Hibernate , or Shut down .
Star t menu power button Specifies the action when you press the computer's Star t
menu power button: Sleep , Hibernate , or Shut down .
Sleep button action Specifies the action when you press the computer's Sleep
button: Do nothing , Sleep , Hibernate , or Shut down .
Lid close action Specifies the action when the user closes the lid of a portable
computer: Do nothing , Sleep , Hibernate , and Shut
down .
Turn off hard disk after (minutes) Specifies the length of time, in minutes, that the computer's
hard disk must be inactive before it's turned off. If you don't
want power management to turn off the computer's hard
disk, specify a value of 0 .
Hibernate after (minutes) Specifies the length of time, in minutes, that the computer
must be inactive before it hibernates. If you don't want the
device to hibernate, specify a value of 0 .
Low batter y action Specifies the action when the computer's battery reaches the
specified low battery notification level: Do nothing , Sleep ,
Hibernate , or Shut down .
Critical batter y action Specifies the action when the computer's battery reaches the
specified critical battery notification level. When it's on
battery: Sleep , Hibernate, or Shut down . When it's
plugged in: Do nothing , Sleep , Hibernate, or Shut
down .
NAME DESC RIP T IO N
Allow hybrid sleep On specifies that Windows saves a hibernation file when it
enters sleep. If there's a power loss while it's asleep, Windows
uses this file to restore the computer's state.
Allow standby state when sleeping action On enables the computer to be on standby. This state still
consumes some power, but enables the computer to wake
faster. If this setting is Off , the computer can only
hibernate or turn off.
Required idleness to sleep (%) Specifies the percentage of idle time on the computer
processor time required for the computer to enter sleep. For
computers running Windows 7 and alter, this value is always
0 .
Enable Windows wake up timer for desktop Set Enable to enable the built-in Windows timer to wake a
computers desktop computer. When this timer wakes a desktop
computer, it stays awake for 10 minutes by default. This time
period allows the client to install any updates or to receive
policy.
NOTE
Power management information used by daily reports is retained in the Configuration Manager site database for 31 days.
Power management information used by monthly reports is retained in the Configuration Manager site database for 13
months.
When you run reports during the monitoring and planning and compliance phases of power management, save or export
the results from any reports for which you want to retain the data for later comparison in case they are later removed by
Configuration Manager.
NOTE
Power management reports display the number of physical computers and the number of virtual computers in a selected
collection. However, only power management information from physical computers is displayed in power management
reports.
PA RA M ET ER N A M E DESC RIP T IO N
Star t date From the drop-down list, select the start date for this report.
End date (Optional) From the drop-down list, select an optional end date for this
report.
Collection name From the drop-down list, select a collection to use for this
report.
Device type From the drop-down list, select the type of computer for
which you want a report. Valid values are All (both desktop
and portable computers), Desktop (desktop computers
only), and Laptop (portable computers only).
REP O RT N A M E DETA IL S
Computer Activity Details Click the Click for detailed information link to see a list
of active, inactive and non-reporting computers for the
specified date.
PA RA M ET ER N A M E DESC RIP T IO N
Repor t date From the drop-down list, select a date for this report.
Computer name Enter a computer name for which you want a report.
REP O RT N A M E DETA IL S
Computer Details Click the Click for detailed information link to see the
power capabilities, power settings, and applied power plans
for the selected computer.
PA RA M ET ER N A M E DESC RIP T IO N
Collection name From the drop-down list, select a collection to use for this
report.
Repor t date From the drop-down list, select a date to use for this report.
Repor t hour From the drop-down list, select an hour from the specified
date for which to run this report. Valid values are between
12am and 11pm .
Computer state From the drop-down list, select the computer state for which
to run this report. Valid values are All (computers that were
turned on or off), On (computers that were turned on), and
Off (computers that were turned off, in sleep, or in
hibernate). These values are only returned for the chosen
reporting period.
PA RA M ET ER N A M E DESC RIP T IO N
Device type From the drop-down list, select the type of computer for
which you want a report. Valid values are All (both desktop
and portable computers), Desktop (desktop computers
only), and Laptop (portable computers only). These values
are only returned for the chosen reporting period.
Sleep capable From the drop-down list, select if you want to display
computers capable of sleep in the report. Valid values are All
(both computers capable and incapable of sleep), No
(computers that are incapable of sleep), and Yes (computers
that are capable of sleep).
Wake from sleep capable From the drop-down list, select if you want to display
computers capable of wake from sleep in the report. Valid
values are All (both computers capable and incapable of
wake from sleep), No (computers that are incapable of wake
from sleep), and Yes (computers that are capable of wake
from sleep).
Power plan From the drop-down list, select the power plan types you
want to display in the report. Valid values are All (computers
that do not have any power management plans applied;
computers that have a power management plan applied;
computers excluded from power management), Not
specified (computers that do not have a power
management plan applied), Defined (computers that have a
power management plan applied), and Excluded
(computers that have been excluded from power
management).
Operating system From the drop-down list, select the computer operating
systems that you want to display in the report or select All
to display all operating systems.
REP O RT N A M E DETA IL S
Computer Activity by Computer Click a computer name to see specific activity for that
computer over a chosen reporting period. These activities
include Computer on (has the computer been turned on?),
Monitor on (has the monitor been turned on?), and User
Active (activity has been detected from the computer's
mouse, keyboard, or a remote desktop connection).
PA RA M ET ER N A M E DESC RIP T IO N
Computer name Enter a computer name for which you want a report.
Power mode From the drop down list, select the type of power settings
you want to display in the report results. Select Plugged In
to view the power settings configured for when the
computer is plugged in and On Batter y to view the power
settings configured for when the computer is running on
battery power.
NOTE
Computers report power management information as part of their hardware inventory schedule. Before you consider a
computer to not be reporting, ensure it has reported hardware inventory.
PA RA M ET ER N A M E DESC RIP T IO N
Collection name From the drop-down list, select a collection to use for this
report.
Repor t date From the drop-down list, select a date for this report.
Repor t hour From the drop-down list, select an hour from the specified
date for which to run this report. Valid values are between
12am and 11pm .
Device type From the drop-down list, select the type of computer for
which you want a report. Valid values are All (both desktop
and portable computers), Desktop (desktop computers
only), and Laptop (portable computers only). These values
are only returned for the chosen reporting period.
PA RA M ET ER N A M E DESC RIP T IO N
Collection From the drop-down list, select a collection for this report.
Reason From the drop-down list, select the reason why the
computers were excluded from power management. You can
display All (all excluded computers), Excluded by
administrator (only computers that were excluded by an
administrative user), and Excluded by user (only
computers that were excluded by a user of Software Center).
REP O RT N A M E DETA IL S
Power Computer Details Click a computer name to see the power capabilities, power
settings, and applied power plans for the selected computer.
IMPORTANT
If a computer is a member of multiple collections, where each collection has different power plans, then the least
restrictive power plan will be applied.
If a computer is a member of multiple collections, where each collection has different wakeup times, then the time closest
to midnight will be used.
PA RA M ET ER N A M E DESC RIP T IO N
Collection name From the drop-down list, select a collection for this report.
Hidden report parameters
This report has no hidden parameters that you can set.
Report links
This report contains links to the following report which provides further information about the selected item.
REP O RT N A M E DETA IL S
Power Computer Details Click a computer name to see the power capabilities, power
settings, and applied power plans for the selected computer.
NOTE
If you add or remove members to the collection after you have applied a power plan, this will affect the results shown by
the Energy Consumption report and might make it more difficult to compare the results from the monitoring and
planning phase and the enforcement phase.
PA RA M ET ER N A M E DESC RIP T IO N
Star t date From the drop-down list, select a start date for this report.
End date From the drop-down list, select an end date for this report.
Collection name From the drop-down list, select a collection for this report.
Device type From the drop-down list, select the type of computer for
which you want a report. Valid values are All (both desktop
and portable computers), Desktop (desktop computers
only), and Laptop (portable computers only). These values
are only returned for the chosen reporting period.
Desktop computer sleep Specify the power consumption of a desktop computer that
has entered sleep. The default value is 0.003 kW per hour.
Laptop computer sleep Specify the power consumption of a portable computer that
has entered sleep. The default value is 0.001 kW per hour.
Desktop computer off Specify the power consumption of a desktop computer when
it is turned off. The default value is 0 kW per hour.
Report links
This report does not link to any other power management reports.
Energy Consumption by Day report
The Energy Consumption by Day report displays the following information:
A graph showing the total daily power consumption of computers in kiloWatt per hour (kWh) in the
specified collection for the last 31 days.
A graph showing the average daily power consumption in kiloWatt per hour (kWh) of each computer in
the specified collection for last 31 days.
A table showing the total daily power consumption in kiloWatt per hour (kWh) and the average daily
power consumption of computers in the specified collection for the last 31 days.
This information can be used to help you to understand power consumption trends in your environment.
After applying a power plan to computers in the selected collection, the power consumption of
computers should decrease.
NOTE
If you add or remove members to the collection after you have applied a power plan, this will affect the results shown by
the Energy Consumption report and might make it more difficult to compare the results from the monitoring and
planning phase and the enforcement phase.
Collection From the drop-down list, select a collection for this report.
Device Type From the drop-down list, select the type of computer for
which you want to report. Valid values are All (both desktop
and portable computers), Desktop (desktop computers
only), and Laptop (portable computers only). These values
are only returned for the chosen reporting period.
PA RA M ET ER N A M E DESC RIP T IO N
Desktop computer sleep Specify the power consumption of a desktop computer that
has entered sleep. The default value is 0.003 kW per hour.
Laptop computer sleep Specify the power consumption of a portable computer that
has entered sleep. The default value is 0.001 kW per hour.
Desktop computer off Specify the power consumption of a desktop computer when
it is turned off. The default value is 0 kW per hour.
Report links
This report does not link to any other power management reports.
Energy Cost report
The Energy Cost report displays the following information:
A graph showing the total monthly power cost for computers in the specified collection for specified time
period.
A graph showing the average monthly power cost for each computer in the specified collection for the
specified time period.
A table showing the total monthly power cost and the average monthly power cost for computers in the
specified collection for the last 31 days.
This information can be used to help you to understand power cost trends in your environment. After
applying a power plan to computers in the selected collection, the power cost for computers should
decrease.
Use the following parameters to configure this report.
Required report parameters
The following parameters must be specified to run this report.
PA RA M ET ER N A M E DESC RIP T IO N
Star t date From the drop-down list, select a start date for this report.
End date From the drop-down list, select an end date for this report.
Cost of KwH Specify the cost per kWh of electricity. The default value is
0.09 .
Collection name From the drop-down list, select a collection to use for this
report.
Device type From the drop-down list, select the type of computer for
which you want to report. Valid values are All (both desktop
and portable computers), Desktop (desktop computers
only), and Laptop (portable computers only). These values
are only returned for the chosen reporting period.
PA RA M ET ER N A M E DESC RIP T IO N
Desktop computer sleep Specify the power consumption of a desktop computer that
has entered sleep. The default value is 0.003 kW per hour.
Laptop computer sleep Specify the power consumption of a portable computer that
has entered sleep. The default value is 0.001 kW per hour.
Desktop computer off Specify the power consumption of a desktop computer when
it is turned off. The default value is 0 kW per hour.
Currency Specify the currency label to use for this report. The default
value is USD ($) .
Report links
This report does not link to any other power management reports.
Energy Cost by Day report
The Energy Cost by Day report displays the following information:
A graph showing the total daily power cost for computers in the specified collection for the last 31 days.
A graph showing the average daily power cost for each computer in the specified collection for the last
31 days.
A table showing the total daily power cost and the average daily power cost for computers in the
specified collection for the last 31 days.
This information can be used to help you to understand power cost trends in your environment. After
applying a power plan to computers in the selected collection, the power cost for computers should
decrease.
Use the following parameters to configure this report.
Required report parameters
The following parameters must be specified to run this report.
PA RA M ET ER N A M E DESC RIP T IO N
Collection name From the drop-down list, select a collection to use for this
report.
Device type From the drop-down list, select the type of computer you
want to report about. Valid values are All (both desktop and
portable computers), Desktop (desktop computers only),
and Laptop (portable computers only). These values are
only returned for the chosen reporting period.
Cost of KwH Specify the cost per kWh of electricity. The default value is
0.09 .
PA RA M ET ER N A M E DESC RIP T IO N
Desktop computer sleep Specify the power consumption of a desktop computer that
has entered sleep. The default value is 0.003 kW per hour.
Laptop computer sleep Specify the power consumption of a portable computer that
has entered sleep. The default value is 0.001 kW per hour.
Desktop computer off Specify the power consumption of a desktop computer when
it is turned off. The default value is 0 kW per hour.
Currency Specify the currency label to use for this report. The default
value is USD ($) .
Report links
This report does not link to any other power management reports.
Environmental Impact report
The Environmental Impact report displays the following information:
A graph showing the total monthly CO2 generated (in tons) for computers in the specified collection for
the specified time period.
A graph showing the average monthly CO2 generated (in tons) for each computer in the specified
collection for the specified time period.
A table showing the total monthly CO2 generated and the average monthly CO2 generated for
computers in the specified collection for specified time period.
The Environmental Impact report calculates the amount of CO2 generated (in tons) by using the time
that a computer or monitor was turned on in a 24 hour period.
Use the following parameters to configure this report.
Required report parameters
The following parameters must be specified to run this report.
PA RA M ET ER N A M E DESC RIP T IO N
Repor t star t date From the drop-down list, select a start date for this report.
Repor t end date From the drop-down list, select an end date for this report.
PA RA M ET ER N A M E DESC RIP T IO N
Collection name From the drop-down list, select a collection for this report.
Device type From the drop-down list, select the type of computer for
which you want a report. Valid values are All (both desktop
and portable computers), Desktop (desktop computers
only), and Laptop (portable computers only). These values
are only returned for the chosen reporting period.
PA RA M ET ER N A M E DESC RIP T IO N
Desktop computer sleep Specify the power consumption of a desktop computer that
has entered sleep. The default value is 0.003 kW per hour.
Laptop computer sleep Specify the power consumption of a portable computer that
has entered sleep. The default value is 0.001 kW per hour.
Desktop computer off Specify the power consumption of a desktop computer when
it is turned off. The default value is 0 kW per hour.
Carbon Factor (tons/kWh) (CO2Mix) Specify the value for carbon factor (in tons/kWh) that you
typically can obtain from your power company. The default
value is 0.0015 tons per kWh.
Report links
This report does not link to any other power management reports.
Environmental Impact by Day report
The Environmental Impact by Day report displays the following information:
A graph showing the total daily CO2 generated (in tons) for computers in the specified collection for the
last 31 days.
A graph showing the average daily CO2 generated (in tons) for each computer in the specified collection
for the last 31 days.
A table showing the total daily CO2 generated and the average daily CO2 generated for computers in the
specified collection for the last 31 days.
The Environmental Impact by Day report calculates the amount of CO2 generated (in tons) by using
the time that a computer or monitor was turned on in a 24 hour period.
Required report parameters
The following parameters must be specified to run this report.
PA RA M ET ER N A M E DESC RIP T IO N
Collection name From the drop-down list, select a collection for this report.
Device type From the drop-down list, select the type of computer you
want to report about. Valid values are All (both desktop and
portable computers), Desktop (desktop computers only),
and Laptop (portable computers only). These values are
only returned for the chosen reporting period.
PA RA M ET ER N A M E DESC RIP T IO N
Desktop computer off Specify the power consumption of a desktop computer when
it is turned off. The default value is 0 kWh.
Desktop computer sleep Specify the power consumption of a desktop computer that
has entered sleep. The default value is 0.003 kWh.
Laptop computer sleep Specify the power consumption of a portable computer has
entered sleep. The default value is 0.001 kWh.
Carbon Factor (tons/kWh) (CO2Mix) Specify a value for the carbon factor (in tons/kWh) that you
typically can obtain from your power company. The default
value is 0.0015 tons per kWh.
Report links
This report does not link to any other power management reports.
Insomnia Computer Details report
The Insomnia Computer Details report displays a list of computers that did not sleep or hibernate for a
specific reason within a specified time period. This report is called by the Insomnia Repor t and is not designed
to be run directly by the site administrator.
The Insomnia Repor t displays computers as Not sleep capable when they are not capable of sleep and have
been turned on during the entire specified report interval. The report displays computers as Not hibernate
capable when they are not capable of hibernate and have been turned on during the entire specified report
interval.
NOTE
Power management can only collect causes that prevented computers from entering sleep or hibernate from computers
running Windows 7 or Windows Server 2008 R2.
PA RA M ET ER N A M E DESC RIP T IO N
Collection name From the drop-down list, select a collection to use for this
report.
Repor t inter val (days) Specify the number of days to report. The default value is 7
days.
Cause of Insomnia From the drop-down list, select one of the causes that can
prevent computers from entering sleep or hibernate.
REP O RT N A M E DETA IL S
Computer Details Click the Click for detailed information link to see the
power capabilities, power settings, and applied power plans
for the selected computer.
Insomnia report
The Insomnia Repor t displays a list of common causes that prevented computers from entering sleep or
hibernate and the number of computers affected by each cause for a specified time period. There are a number
of causes that might prevent a computer from entering sleep or hibernate such as a process running on the
computer, an open Remote Desktop session, or that the computer is incapable of sleep or hibernate. From this
report, you can open the Insomnia Computer Details report which displays a list of computers affected by
each cause of computers not sleeping or hibernating.
The Power Insomnia report displays computers as Not sleep capable when they are not capable of sleep and
have been turned on during the entire specified report interval. The report displays computers as Not
hibernate capable when they are not capable of hibernate and have been turned on during the entire
specified report interval.
NOTE
Power management can only collect causes that prevented computers from entering sleep or hibernate from computers
running Windows 7 or Windows Server 2008 R2.
PA RA M ET ER N A M E DESC RIP T IO N
Collection name From the drop-down list, select a collection to use for this
report.
Repor t inter val (days) Specify the number of days to report. The default value is 7
days. The maximum value is 365 days. Specify 0 to run the
report for today.
REP O RT N A M E DETA IL S
Insomnia Computer Details Click a number in the Affected Computers column to see
a list of computers that could not sleep or hibernate because
of the selected cause.
PA RA M ET ER N A M E DESC RIP T IO N
Collection From the drop-down list, select a collection for this report.
Display Filter From the drop-down list, select Not Suppor ted to display
only computers in the specified collection that are incapable
of sleep, hibernate, wake from sleep, or wake from hibernate.
Select Show All to display all computers in the specified
collection.
REP O RT N A M E DETA IL S
Computer Details Click a computer name to see the power capabilities, power
settings, and applied power plans for the selected computer.
NOTE
The settings displayed are collected from client computers during hardware inventory. Depending on the time at which
hardware inventory runs, settings from applied peak or non-peak power plans might be collected.
PA RA M ET ER N A M E DESC RIP T IO N
Collection name From the drop-down list, select a collection for this report.
PA RA M ET ER N A M E DESC RIP T IO N
PA RA M ET ER N A M E DESC RIP T IO N
Report links
This report contains links to the following report which provides further information about the selected item.
REP O RT N A M E DETA IL S
Power Settings Details Click the number of computers in the Computers column
to see a list of all computers that use the power settings in
that row.
PA RA M ET ER N A M E DESC RIP T IO N
Collection From the drop-down list, select a collection to use for this
report.
Power Setting GUID From the drop-down list, select the power setting GUID on
which you want to report. For a list of all power settings and
their uses, see Available power management plan settings in
the topic How to create and apply power plans.
Power Mode From the drop down list, select the type of power settings
you want to display in the report results. Select Plugged In
to view the power settings configured for when the
computer is plugged in and On Batter y to view the power
settings configured for when the computer is running on
battery power.
Setting Index From the drop-down list, select the value for the selected
power setting name on which you want to report. For
example, if you want to display all computers with the turn
off hard disk after setting set to 10 minutes, select turn
off hard disk after for Power Setting Name and 10 for
Setting Index.
Report links
This report contains links to the following report which provides further information about the selected item.
REP O RT N A M E DETA IL S
Computer Details Click a computer name to see the power capabilities, power
settings, and applied power plans for the selected computer.
TIP
If you are upgrading your server infrastructure from System Center 2012 Configuration Manager, before upgrading the
Configuration Manager clients, complete the server upgrades including installing all current branch updates. This process
makes sure that you'll have the most recent version of the client software.
NOTE
Client piloting isn't good for large scale as it doesn't randomize at all.
Can be used to automatically keep clients in your site at the latest version.
Requires minimal administration.
Disadvantages:
Can only be used to upgrade the client software and can't be used to install a new client.
Applies to all clients in the hierarchy that are assigned to a site. Can't be scoped by collection.
Limited scheduling options.
For more information, see How to upgrade clients for Windows computers.
Client testing
Supported client platform: Windows
Advantages:
Can be used to test new client versions in a smaller pre-production collection.
When testing is complete, clients in pre-production are promoted to production and automatically
upgraded across the Configuration Manager site.
Disadvantages:
Can only be used to upgrade the client software and can't be used to install a new client.
For more information, see How to test client upgrades in a pre-production collection.
Next steps
How to test client upgrades in a pre-production collection
How to exclude clients from upgrade
How to upgrade clients for Windows computers
How to test client upgrades in a pre-production
collection
2/16/2022 • 3 minutes to read • Edit Online
NOTE
Only a user with the Full Administrator security role and the All security scope can promote a test client to production.
For more information, see Fundamentals of role-based administration. This action is only available when connected to the
central administration site (CAS) or a standalone primary site.
1. Set up a collection that contains the computers to which you want to deploy the pre-production client.
2. In the Configuration Manager console, go to the Administration workspace, expand Site
Configuration , and select the Sites node. In the ribbon, select Hierarchy Settings .
3. Switch to the Client Upgrade tab, and configure the following settings:
Select Upgrade all clients in the pre-production collection automatically using pre-
production client .
Select a collection to use as the Pre-production collection .
NOTE
Only a user with the Full Administrator security role and the All security scope can change these settings.
NOTE
For computers in a pre-production collection that also host site system roles, their deployment status may report as Not
compliant . This state may show even when the client was successfully updated. When you promote the client to
production, the deployment status reports correctly.
2. Review the client versions in production and pre-production, and make sure the correct pre-production
collection is specified. When ready, select Promote , and then select Yes to confirm.
The updated client version now replaces the client version in use in your hierarchy. You can then upgrade the
clients for your whole site. For more information, see How to upgrade clients for Windows computers.
NOTE
To enable the pre-production client, or to promote a pre-production client to a production client, your account must be a
member of a security role that has Read and Modify permissions for the Update Packages object.
Client upgrades honor any Configuration Manager maintenance windows you have configured.
Next steps
How to exclude clients from upgrade
How to upgrade clients for Windows computers
How to exclude clients from upgrade in
Configuration Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
Although the user interface states that clients won't upgrade via any method, there are two methods you can use to
override these settings. Use client push or manual client installation to override this configuration. For more information,
see How to upgrade an excluded client.
Configure exclusion
1. In the Configuration Manager console, go to the Administration workspace. Expand Site
Configuration , select the Sites node, and then select Hierarchy Settings in the ribbon.
2. Switch to the Client Upgrade tab.
3. Select the option to Exclude specified clients from upgrade . Then select the Exclusion collection
you want to exclude. You can only select a single collection for exclusion.
4. Select OK to close and save the configuration.
After clients in the excluded collection update policy, they don't automatically install client updates. For more
information, see How to upgrade clients for Windows computers.
NOTE
Excluded clients still download and run Ccmsetup, but don't upgrade.
When you remove a client from the exclude collection, it doesn't automatically upgrade until the next auto-
upgrade cycle.
Next steps
How to upgrade clients for Windows computers
Extended interoperability client
How to upgrade clients for Windows computers in
Configuration Manager
2/16/2022 • 4 minutes to read • Edit Online
TIP
If upgrade your server infrastructure from a previous version of Configuration Manager, complete the server upgrades
before upgrading the Configuration Manager clients. This process includes installing all current branch updates. The latest
current branch update contains the latest version of the client. Upgrade clients after you have installed all of the
Configuration Manager updates.
NOTE
If you plan to reassign the site for the clients during upgrade, specify the new site using the SMSSITECODE client.msi
property. If you use the value of AUTO for the SMSSITECODE , also specify SITEREASSIGN=TRUE . This property allows for
automatic site reassignment during upgrade. For more information, see Client installation properties - SMSSITECODE.
NOTE
To identify the different versions of the Configuration Manager client in your hierarchy, use the report Count of
Configuration Manager clients by client versions in the report folder Site - Client Information .
Configuration Manager creates an upgrade package by default. It automatically sends the package to all
distribution points in the hierarchy. If you make changes to the client package on the CAS, Configuration
Manager automatically updates the package, and redistributes it. An example change is when you add a client
language pack. If you enable automatic client upgrade, every client automatically installs the new client
language package.
Enable automatic client upgrade across your hierarchy. This configuration keeps your clients up to date with less
effort.
If you also manage your Configuration Manager site systems as clients, determine whether to include them as
part of the automatic upgrade process. You can exclude all servers, or a specific collection from client upgrade.
Some Configuration Manager site roles share the client framework. For example, the management point and
pull distribution point. These roles upgrade when you update the site, so the client version on these servers
updates at the same time.
NOTE
A computer must be running to upgrade the client. If a computer isn't running when it's scheduled to receive the
upgrade, the upgrade doesn't occur. When the computer turns on, and it receives policy, it schedules the upgrade
for a random time within the allowed number of days. If this occurs after the number of days to upgrade has
expired, it schedules the upgrade at a random time within 24 hours after the computer was turned on.
Because of this behavior, computers that are routinely shut down may take longer to upgrade than expected if the
randomly scheduled upgrade time isn't within the normal working hours.
7. To exclude clients from upgrade, select Exclude specified clients from upgrade , and specify the
collection to exclude. For more information, see Exclude clients from upgrade.
8. If you want the site to copy the client installation package to distribution points that you've enabled for
prestaged content, select the option to Automatically distribute client installation package to
distribution points that are enabled for prestaged content .
9. Select OK to save the settings and close Hierarchy Settings Properties.
Clients receive these settings when they next download policy.
NOTE
Client upgrades honor any Configuration Manager maintenance windows you've configured. The ClientServicing thread
only runs the client setup bootstrap program (ccmsetup.exe) during a maintenance window. If the device runs an edition
of Windows with a write filter, ccmsetup tries to download and install at the same time. Otherwise, ccmsetup randomizes
a time to download content. After it downloads content and compiles the local policy, ClientServicing schedules the client
upgrade during the next maintenance window.
Next steps
For alternative methods to upgrade clients, see How to deploy clients to Windows computers.
Exclude specific clients from automatic upgrade. For more information, see How to exclude clients from
upgrade.
How to upgrade clients on Mac computers in
Configuration Manager
2/16/2022 • 3 minutes to read • Edit Online
IMPORTANT
Starting in January 2022, this feature of Configuration Manager is deprecated. For more information, see Mac computers.
Follow the high-level steps in this article to upgrade the client for Mac computers by using a Configuration
Manager application. You can also download the Mac client installation file, copy it to a shared network location
or a local folder on the Mac computer, and then instruct users to manually run the installation.
NOTE
Before you do these steps, make sure that your Mac computer meets the prerequisites. For more information, see
Supported operating systems for Mac computers.
NOTE
The macOS client installation package isn't available for new deployments, but existing deployments are supported until
December 31, 2022.
#!/bin/sh
echo "Starting script\n"
echo "Changing directory to MAC Client\n"
cd /Users/Administrator/Desktop/'MAC Client'/
echo "Import root cert\n"
/usr/bin/sudo /usr/bin/security import /Users/Administrator/Desktop/'MAC Client'/Root.pfx -A -k
/Library/Keychains/System.Keychain -P ROOT
echo "Using openssl to convert pfx to a crt\n"
/usr/bin/sudo openssl pkcs12 -in /Users/Administrator/Desktop/'MAC Client'/Root.pfx -out Root1.crt -
nokeys -clcerts -passin pass:ROOT
echo "Adding trust to root cert\n"
/usr/bin/sudo /usr/bin/security add-trusted-cert -d -r trustRoot -k
/Library/Keychains/System.Keychain Root1.crt
echo "Import client cert\n"
/usr/bin/sudo /usr/bin/security import /Users/Administrator/Desktop/'MAC Client'/MacClient.pfx -A -k
/Library/Keychains/System.Keychain -P MAC
echo "Executing ccmclient with MP\n"
sudo ./ccmsetup -MP https://SCCM34387.SCCM34387DOM.NET/omadm/cimhandler.ashx
echo "Editing Plist file\n"
sudo /usr/libexec/Plistbuddy -c 'Add:SubjectName string CMMAC003L' /Library/'Application
Support'/Microsoft/CCM/ccmclient.plist
echo "Changing directory to CCM\n"
cd /Library/'Application Support'/Microsoft/CCM/
echo "Making connection to the server\n"
sudo open ./CCMClient
echo "Ending Script\n"
exit
4. Add the configuration item to a configuration baseline. Then deploy the configuration baseline to all Mac
computers that install a certificate independently from Configuration Manager.
Manage clients over the internet with Configuration
Manager
2/16/2022 • 2 minutes to read • Edit Online
NOTE
You can have a combination of both services for a single site. If a device gets policy from the site for both IBCM and CMG,
then it randomizes between them for communication. The only mechanism available to control communication is client
authentication. For example, if an Azure AD-joined client doesn't trust the server authentication certificate of the internet-
based management point, it can only use the CMG. If a domain-joined client doesn't trust the server authentication
certificate of the CMG, it can only use the internet-based management point.
Next steps
Overview of cloud management gateway
Plan for internet-based client management
Cloud management gateway overview
2/16/2022 • 2 minutes to read • Edit Online
After establishing the prerequisites, creating the CMG consists of the following three steps in the Configuration
Manager console:
1. Deploy the CMG cloud service to Azure.
2. Add the CMG connection point role.
3. Configure the site and site roles for the service.
Once deployed and configured, clients seamlessly access on-premises site roles whether they're on the intranet
or internet.
This article provides the foundational knowledge to learn about the CMG and the scenarios where you can use
it.
Scenarios
There are several scenarios for which a CMG is beneficial. The following scenarios are some of the more
common:
Manage traditional Windows clients with Active Directory domain-joined identity. These clients include
any supported version of Windows. It uses PKI certificates to secure the communication channel.
Management activities include:
Software updates and endpoint protection
Inventory and client status
Compliance settings
Software distribution to the device
Windows in-place upgrade task sequence
Manage traditional Windows 10 or later clients with modern identity, either hybrid or pure cloud domain-
joined with Azure Active Directory (Azure AD). Clients use Azure AD to authenticate rather than PKI
certificates. Using Azure AD is simpler to set up, configure and maintain than more complex PKI systems.
Management activities are the same as the first scenario plus:
Software distribution to the user
Install the Configuration Manager client on Windows 10 or later devices over the internet. Using Azure
AD allows the device to authenticate to the CMG for client registration and assignment. You can install the
client manually, or using another software distribution method, such as Microsoft Intune.
New device provisioning with co-management. When auto-enrolling existing clients, CMG isn't required
for co-management. It's required for new devices involving Windows Autopilot, Azure AD, Microsoft
Intune, and Configuration Manager. For more information, see Paths to co-management.
Specific use cases
Across these scenarios, the following specific device use cases may apply:
Roaming devices such as laptops
Remote/branch office devices that are less expensive and more efficient to manage over the internet than
across a WAN or through a VPN.
Mergers and acquisitions, where it may be easiest to join devices to Azure AD and manage through a
CMG.
Workgroup clients. These devices may require other configurations, such as certificates.
To help with management of remote workgroup clients, use Configuration Manager token-based
authentication. For more information, see Token-based authentication for CMG.
IMPORTANT
By default all clients receive policy for a CMG, and start using it when they become internet-based. Depending upon the
scenario and use case that applies to your organization, you may need to scope usage of the CMG. For more information,
see the Enable clients to use a cloud management gateway client setting.
Next steps
Develop your design and plan for implementing a CMG in your environment:
Plan for the CMG
Plan for the CMG in Configuration Manager
2/16/2022 • 7 minutes to read • Edit Online
NOTE
Some sections that were previously in this article have moved:
Hierarchy design : CMG hierarchy design
Performance and scale : CMG performance and scale
Planning checklist
The overall CMG planning process is divided into the following parts:
Components and requirements: This article summarizes the components that make up the CMG system.
It also lists the system requirements.
Client authentication: Determine which authentication method you'll use for clients from potentially
untrusted networks.
Hierarchy design: Plan where to place the CMG in your environment.
Supported configurations: Understand which Configuration Manager features you can support on
internet-based clients that connect to the CMG.
Performance and scale: Decide how many service components you'll need to best support your number
of clients.
Cost: Understand the cost of the Azure-based components.
CMG components
Deployment and operation of the CMG includes the following components:
The CMG cloud ser vice in Azure authenticates and forwards Configuration Manager client requests
over the internet to the on-premises CMG connection point.
The CMG connection point site system role enables a consistent and high-performance connection
from the on-premises network to the CMG service in Azure. It also publishes settings to the CMG
including connection information and security settings. The CMG connection point forwards client
requests from the CMG to on-premises roles according to URL mappings. For example, the management
point and software update point.
The ser vice connection point site system role runs the cloud service manager component, which
handles all CMG deployment tasks. Additionally, it monitors and reports service health and logging
information from Azure Active Directory (Azure AD). Make sure your service connection point is in online
mode.
The management point and software update point site system roles service client requests per
normal.
The CMG uses a cer tificate-based HTTPS web service to help secure network communication with
clients.
Internet-based clients connect to the CMG to access on-premises Configuration Manager components.
There are multiple options for client identity and authentication:
Azure AD
PKI certificates
Configuration Manager site-issued tokens
For more information, see Plan for CMG client authentication.
The CMG creates an Azure storage account , which it uses for its standard operations. By default, the
CMG is also content-enabled to provide deployment content to internet-based clients. This storage
account doesn't support customizations, such as virtual network restrictions.
NOTE
The cloud-based distribution point (CDP) is deprecated. Starting in version 2107, you can't create new CDP
instances. To provide content to internet-based devices, enable the CMG to distribute content.
NOTE
CMG deployments with the cloud ser vice (classic) method don't support subscriptions for Azure Cloud Service
Providers (CSP). The CMG deployment with Azure Resource Manager continues to use the classic cloud service, which the
CSP doesn't support. For more information, see Azure services available in the Azure CSP program. In version 2006 and
earlier, this deployment method is the only option.
The option to deploy a CMG as a cloud ser vice (classic) is deprecated. All CMG deployments should use a virtual
machine scale set. For more information, see Removed and deprecated features.
Starting in version 2010, customers with a Cloud Solution Provider (CSP) subscription can deploy the CMG with
a vir tual machine scale set in Azure. This support is only if they don't currently have a CMG deployed using
classic cloud services to another subscription.
Starting in version 2107, all customers can deploy a CMG with a virtual machine scale set. If you have an
existing CMG deployed with the classic cloud service, conver t the CMG to use a virtual machine scale set.
With a few exceptions, the configuration, operation, and functionality of the CMG remains the same.
Other Azure resource providers in your Azure subscription.
Different deployment names, for example, GraniteFalls.EastUS.CloudApp.Azure.Com for a
deployment in the East US Azure region. This name change can affect how you create and manage the
CMG server authentication certificate.
The CMG connection point only communicates with the virtual machine scale set in Azure over HTTPS. It
doesn't require TCP-TLS ports.
Limitations for a CMG with a virtual machine scale set
Limitations with versions 2107 and later
NOTE
Starting in version 2111, CMG deployments with a virtual machine scale set support Azure US Government cloud
environments.
Users may experience a delay of up to three seconds for actions in Software Center.
You can't approve/deny application requests through the CMG.
Version 2107 doesn't support Azure US Government cloud environments.
Limitations with versions 2010 and 2103
If you require more than one CMG instance, they all have to use the same deployment method.
The supported number of concurrent client connections is 2,000 per VM instance. For more information, see
CMG performance and scale.
It's only supported with a standalone primary site.
It doesn't support Azure US Government cloud environments.
Users may experience a delay of up to three seconds for actions in Software Center.
Configuration Manager currently creates the Azure storage container based on the name of the resource
group. Azure has different naming requirements for resource groups and storage containers. Make sure the
name of the resource group for this service only has lowercase letters, numbers, and hyphens. If you have an
existing resource group that doesn't work, rename it in the Azure portal, or create a new resource group.
If you have more than one HTTPS management point, then you can't install the Configuration Manager client
on devices over the internet. If you need to Install off-premises clients using a CMG, then you can only have
one HTTPS management point. You also need to enable the CMG for content.
You can't approve/deny application requests through the CMG.
Requirements
TIP
To clarify some Azure terminology:
The Azure AD tenant is the directory of user accounts and app registrations. One tenant can have multiple
subscriptions.
An Azure subscription separates billing, resources, and services. It's associated with a single tenant.
For more information, see Subscriptions, licenses, accounts, and tenants for Microsoft's cloud offerings.
An Azure subscription to host the CMG. This subscription can be in one of the following environments:
Global Azure cloud
Azure US Government cloud
Customers with a Cloud Service Provider (CSP) subscription need to use version 2010 or later with a
vir tual machine scale set deployment.
Integrate the site with Azure AD to deploy the service with Azure Resource Manager. For more
information, see Configure Azure AD for CMG.
When you onboard the site to Azure AD, you can optionally enable Azure AD user discover y . It isn't
required to create the CMG, but required if you plan to use Azure AD authentication with hybrid
identities. For more information, see Install clients using Azure AD and see About Azure AD user
discovery.
An Azure administrator needs to participate in the initial creation of certain components. This persona
can be the same as the Configuration Manager administrator, or separate. If separate, they don't require
permissions in Configuration Manager.
When you integrate the site with Azure AD for deploying the CMG using Azure Resource Manager,
you need a Global Administrator .
When you create the CMG, you need an account that is an Azure Subscription Owner and an
Azure AD Global Administrator .
Your user account needs to be a Full administrator or Infrastructure administrator in Configuration
Manager.
At least one on-premises Windows server to host the CMG connection point . You can colocate this role
with other Configuration Manager site system roles.
The ser vice connection point must be in online mode.
Configure the management point to allow traffic from the CMG. It also needs to require HTTPS, or
configure the site for Enhanced HTTP.
A ser ver authentication cer tificate for the CMG.
Other cer tificates may be required, depending upon your client OS version and authentication model.
For more information, see Configure client authentication.
Clients must use IPv4 .
Make sure the following client settings in the Cloud ser vices group are enabled for devices that will use
the CMG:
Enable clients to use a cloud management gateway
Allow access to cloud distribution point
NOTE
If you enable the client setting to Download delta content when available, the content for third-party updates
won't download to clients.
Next steps
Next, determine how clients will authenticate with the CMG:
Plan for CMG client authentication
CMG client authentication
2/16/2022 • 3 minutes to read • Edit Online
Microsoft recommends joining devices to Azure AD. Internet-based devices can use Azure AD modern
authentication with Configuration Manager. It also enables both device and user scenarios whether the device is
on the internet or connected to the internal network.
You can use one or more methods. All clients don't have to use the same method.
Which ever method you choose, you may also need to reconfigure one or more management points. For more
information, see Configure client authentication for CMG.
Azure AD
If your internet-based devices are running Windows 10 or later, consider using Azure AD modern authentication
with the CMG. This authentication method is the only one that enables user-centric scenarios. For example,
deploying apps to a user collection.
First, the devices need to be either cloud domain-joined or hybrid Azure AD-joined, and the user also needs an
Azure AD identity. If your organization is already using Azure AD identities, then you should be set with this
prerequisite. If not, talk with your Azure administrator to plan for cloud-based identities. For more information,
see Azure AD device identity. Until that process is complete, consider token-based authentication for internet-
based clients with your CMG.
There are a few other requirements, depending upon your environment:
Enable user discovery methods for hybrid identities
Enable ASP.NET 4.5 on the management point
Configure client settings
For more information on these prerequisites, see Install clients using Azure AD.
NOTE
If your devices are in an Azure AD tenant that's separate from the tenant with a subscription for the CMG compute
resources, starting in version 2010 you can disable authentication for tenants not associated with users and devices. For
more information, see Configure Azure services.
PKI certificate
If you have a public key infrastructure (PKI) that can issue client authentication certificates to devices, then
consider this authentication method for internet-based devices with your CMG. It doesn't support user-centric
scenarios, but supports devices running any supported version of Windows.
TIP
Windows devices that are hybrid or cloud domain-joined don't require this certificate because they use Azure AD to
authenticate.
Site token
If you can't join devices to Azure AD or use PKI client authentication certificates, then use Configuration Manager
token-based authentication. Site-issued client authentication tokens work on all supported client OS versions,
but only support device scenarios.
If clients occasionally connect to your internal network, they're automatically issued a token. They need to
communicate directly with an on-premises management point to register with the site and get this client token.
If you can't register clients on the internal network, you can create and deploy a bulk registration token. The bulk
registration token enables the client to initially install and communicate with the site. This initial communication
is long enough for the site to issue the client its own, unique client authentication token. The client then uses its
authentication token for all communication with the site while it's on the internet.
Next steps
Next, design how to use a CMG in your hierarchy:
CMG hierarchy design
CMG hierarchy design
2/16/2022 • 4 minutes to read • Edit Online
Design examples
Example 1: Standalone primary site
Contoso has a standalone primary site in an on-premises datacenter at their headquarters in New York City.
They create a CMG in the East US Azure region to reduce network latency.
They create two CMG connection points, both linked to the single CMG service.
As clients roam onto the internet, they communicate with the CMG in the East US Azure region. The CMG
forwards this communication through both of the CMG connection points.
Example 2: Hierarchy
Fourth Coffee has a CAS in an on-premises datacenter at their headquarters in Seattle. One primary site is in the
same datacenter, and the other primary site is in their main European office in Paris.
On the CAS, they create a CMG service in the West US Azure region. They scale the number of VMs for the
expected load of roaming clients in the entire hierarchy.
On the Seattle-based primary site, they create a CMG connection point linked to the single CMG.
On the Paris-based primary site, they create a CMG connection point linked to the single CMG.
As clients roam onto the internet, they communicate with the CMG in the West US Azure region. The CMG
forwards this communication to the CMG connection point in the client's assigned primary site.
TIP
You don't need to deploy more than one CMG for the purposes of geolocation. The Configuration Manager client is
mostly unaffected by the slight latency that can occur with the cloud service, even when geographically distant.
Test environments
Many organizations have separate environments for production, test, development, or quality assurance. When
you plan your CMG deployment, consider the following questions:
How many Azure AD tenants does your organization have?
Is there a separate tenant for testing?
Are user and device identities in the same tenant?
How many subscriptions are in each tenant?
Are there subscriptions that are specific for testing?
Configuration Manager's Azure service for Cloud management supports multiple tenants. Multiple
Configuration Manager sites can connect to the same tenant. A single site can deploy multiple CMG services
into different subscriptions. Multiple sites can deploy CMG services into the same subscription. Configuration
Manager provides flexibility depending upon your environment and business requirements.
For more information, see the following FAQ: Do the user accounts have to be in the same Azure AD tenant as
the tenant associated with the subscription that hosts the CMG cloud service?
Boundary groups
You can associate a CMG with a boundary group. This configuration allows clients to default or fall back to the
CMG for client communication according to boundary group relationships. This behavior is especially useful in
branch office and VPN scenarios. You can direct client traffic away from expensive and slow WAN links to
instead use faster services in Microsoft Azure.
Starting in version 2006, intranet clients can access a CMG-enabled software update point when it's assigned to
a boundary group. For more information, see Configure boundary groups.
Internet-based clients don't rely on boundary groups. They only use internet-facing or cloud content sources. If
you're only using content-enabled CMGs for these types of clients, then you don't need to include them in
boundary groups.
If you want clients on your internal network to get content from a CMG, then it needs to be in the same
boundary group as the clients. By default, clients prioritize cloud-based sources last in their list of content
sources. This behavior is because there's a cost associated with downloading content from Azure. Cloud-based
sources are typically used as a fallback source for intranet-based clients. If you want a cloud-first design, then
design your boundary groups to meet this business requirement. For more information, see Configure
boundary groups. For more information on content location priority and when intranet-based clients use a
cloud-based content source, see Content source priority.
Even though you install the CMG in a specific region of Azure, clients aren't aware of the Azure regions. They
randomly select an available CMG as a content source. If you have CMGs in multiple regions, and a client
receives more than one in the content location list, it may not download content from the same Azure region.
Next steps
Next, review the features and configurations that the CMG supports:
Supported configurations for CMG
Supported configurations for cloud management
gateway
2/16/2022 • 3 minutes to read • Edit Online
Specifications
All Windows versions listed in Supported operating systems for clients and devices are supported for
CMG.
CMG only supports the management point and software update point roles.
CMG doesn't support clients that only communicate with IPv6 addresses.
Software update points using a network load balancer don't work with CMG.
CMG deployments with the cloud ser vice (classic) method don't support subscriptions for Azure
Cloud Service Providers (CSP). The CMG deployment with Azure Resource Manager continues to use the
classic cloud service, which the CSP doesn't support. For more information, see Azure services available
in the Azure CSP program. In version 2006 and earlier, this deployment method is the only option.
Starting in version 2010, customers with a Cloud Solution Provider (CSP) subscription can deploy the
CMG with a vir tual machine scale set in Azure. For more information, see Topology design: Virtual
machine scale sets.
Software updates
Endpoint protection No te 1
Run scripts
CMPivot
Compliance settings
F EAT URE SUP P O RT
Client install
(with Azure AD integration)
Client install
(with token authentication)
Client push
Remote tools No te 3
F EAT URE SUP P O RT
Reporting website
Wake on LAN
macOS clients
Peer cache
On-premises MDM
Prestage content
K EY
= This feature is supported with CMG by all supported versions of Configuration Manager
(YYMM) = This feature is supported with CMG starting with version YYMM of Configuration Manager
Support notes
Note 1: Support for endpoint protection
Starting in version 2006, clients that communicate via a CMG can immediately apply endpoint protection
policies without an active connection to Active Directory.
In version 2002 and earlier, for domain-joined devices to apply endpoint protection policy, they require access to
the domain. Devices with infrequent access to the internal network may experience delays in applying endpoint
protection policy. If you require that devices immediately apply endpoint protection policy after they receive it,
consider one of the following options:
Update the site and clients to version 2006.
Use co-management and switch the Endpoint Protection workload to Intune, and manage Microsoft
Defender Antivirus from the cloud.
Use configuration items instead of the native antimalware polices feature to apply endpoint protection
policy.
Note 2: Support for task sequences
For more information about support for deploying a task sequence to a client via the CMG, see Deploy a task
sequence over the internet.
Note 3: Support for remote tools
As announced at Microsoft Ignite 2021, a public preview of the new remote assistance solution is now available
in the Microsoft Endpoint Manager admin center. This cloud-based tool can help you more securely support
users of Windows devices.
For more information, see the following resources:
Remote help: a new remote assistance tool from Microsoft (blog post)
Enable remote help scenarios with Microsoft Endpoint Manager (demo video)
Use remote help with Intune and Microsoft Endpoint Manager
Note 4: Support for alternate content providers
Alternate content providers aren't supported to get content from a content-enabled CMG. You can still use them
on a client that communicates with a CMG and gets content from other supported content locations.
Next steps
Next, plan how the design the CMG for the best performance at the appropriate scale:
CMG performance and scale
CMG performance and scale
2/16/2022 • 4 minutes to read • Edit Online
NOTE
Sizing guidance for management points and software update points doesn't change whether they service on-premises or
internet-based clients. For more information, see Size and scale numbers.
TIP
In a hierarchy, create the CMG at the CAS.
One CMG supports up to 16 virtual machine (VM) instances in the Azure cloud service.
Simultaneous client connections per each CMG VM instance depend upon the deployment model and
VM size:
Cloud ser vice (classic) : 6,000
Vir tual machine scale set (version 2010 and 2103 for Cloud Service Provider (CSP)
subscriptions): 2,000
Vir tual machine scale-set (version 2107 or later)
Lab (B2s) : 10
Standard (A2_v2) : 6,000
Large (A4_v2) : 10,000
IMPORTANT
The Lab (B2s) size VM is only intended for lab testing and small proof-of-concept environments. They
aren't intended for production use with the CMG. The B2s VMs are low cost and low performing. The
Configuration Manager technical preview branch only supports 10 clients, which is why this size supports
that number of clients.
When the CMG is under high load with more than the supported number of clients, it still handles
requests but there may be delay.
NOTE
When considering hardware requirements for the CMG connection point, see Recommended hardware for remote site
system servers.
Improve performance
The following recommendations can help you improve CMG performance:
The connection between the Configuration Manager client and the CMG isn't region-aware. Client
communication is largely unaffected by latency and geographic separation. It's generally not necessary to
deploy multiple CMG for the purposes of geo-proximity. Deploy the CMG at the top-level site in your
hierarchy. To increase scale, add VM instances.
For high availability of the service, create a CMG with at least two VM instances and two CMG connection
points per site.
Scale the CMG to support more clients by adding more VM instances. The Azure load balancer controls
client connections to the service.
Create more CMG connection points to distribute the load among them. The CMG distributes the traffic
to its connecting CMG connection points in a round-robin fashion.
NOTE
The CMG connection point creates a TCP connection to the management point for each client. While Configuration
Manager has no hard limit on the number of clients for a CMG connection point, Windows Server has a default maximum
TCP dynamic port range of 16,384. If a Configuration Manager site manages more than 16,384 clients with a single CMG
connection point, add another site system or increase the Windows Server limit. All clients maintain a channel for client
notifications, which holds a port open on the CMG connection point. For more information on how to increase this limit,
see Microsoft Support article 929851.
Content performance
As with any distribution point design, consider the following factors for a content-enabled CMG:
Number of concurrent client connections
The size of the content that clients download
The length of time allowed to meet your business requirements
Depending upon your design, if clients have the option of more than one CMG for any given content, then they
naturally randomize across those cloud sources. If you only distribute a certain piece of content to a single CMG,
and a large number of clients try to download this content at the same time, it puts higher load on that single
CMG. Adding another CMG includes a separate Azure storage service. For more information on how the client
communicates with the CMG components and downloads content, see Data flow.
NOTE
The Azure storage service supports 500 requests per second for a single file. Performance testing of a single cloud-based
content source supported distribution of a single 100-MB file to 50,000 clients in 24 hours.
Next steps
Next, understand the costs associated with operating an Azure service for the CMG:
Cost of CMG
Cost of CMG
2/16/2022 • 5 minutes to read • Edit Online
IMPORTANT
The following cost information is for estimating purposes only. Your environment may have other variables that affect the
overall cost of using CMG.
NOTE
Virtual machine costs vary by region.
NOTE
Pricing for data transfer is tiered. The more you use, the less you pay per gigabyte.
Compute costs
CMG uses Azure platform as a service (PaaS), which uses virtual machines (VMs). These VMs incur compute
costs. The specific type to use when estimating costs depends upon which deployment method you use.
Virtual machine scale set
If you deploy the CMG as a virtual machine scale set, use this section.
In version 2103 and earlier, CMG uses a Standard A2_v2 VM. The VM size isn't configurable.
In version 2107 and later, you can configure the VM size, which will affect this cost.
Lab (B2s)
Standard (A2_v2)
Large (A4_v2)
IMPORTANT
The Lab (B2s) size VM is only intended for lab testing and small proof-of-concept environments. It isn't intended
for production use with the CMG. The B2s VMs are low cost and low performing.
You can't change the VM size after you deploy the CMG. To change the VM size, you need to Redeploy the
service.
You select how many VM instances support the CMG. One is the default, and 16 is the maximum. This
number is set when you create the CMG, but you can change it afterwards to scale the service as needed.
For more information on how many VMs you need to support your clients, see CMG performance and
scale.
Virtual machine
If you deploy the CMG as a classic cloud service, this deployment method replaces the virtual machine scale set
when estimating cost. The specific details are otherwise the same. With this deployment method, it uses a
Standard A2_v2 VM. The VM size isn't configurable.
The cost difference between a virtual machine and a virtual machine scale set should be negligible, but may
vary by Azure region.
NOTE
Other administrative actions can increase the amount of outbound data transfer from Azure. For example,
deployments for software updates or applications.
Internet-based clients get Microsoft software update content from Windows Update at no charge. Don't
distribute update packages with Microsoft update content to a content-enabled CMG. If you do distribute
software update packages to your cloud content sources, you may incur storage and data egress costs.
Misconfiguration of the CMG option to Verify client cer tificate revocation can cause more traffic
from clients to the CMG. This other traffic can increase the Azure egress data, which can increase your
Azure costs. For more information, see Publish the certificate revocation list.
TIP
Any data flows into Azure are free. These flows are otherwise referred to as ingress or upload. When you distribute
content from the site to the content-enabled CMG, you're uploading the content to Azure.
Content storage
Internet-based clients get Microsoft software update content from Windows Update at no charge. Don't
distribute update packages with Microsoft update content to a content-enabled CMG. If you do distribute
software update packages to your cloud content sources, you may incur storage and data egress costs.
NOTE
The cloud-based distribution point (CDP) is deprecated. Starting in version 2107, you can't create new CDP instances. To
provide content to internet-based devices, enable the CMG to distribute content.
CMG uses Azure locally redundant storage (LRS). For more information, see Locally redundant storage.
For any other necessary content, distribute it to a content-enabled CMG. This other content includes
applications or third-party software updates.
NOTE
If you enable the client setting to Download delta content when available, the content for third-party updates
won't download to clients.
Other costs
Each distinct CMG has one Basic (ARM) dynamic IP address. If you add other VMs to a CMG, it doesn't increase
the number of these IP addresses. For more information, see IP addresses pricing.
If you deploy the CMG as a virtual machine scale set, it uses Azure Key Vault . The CMG usage of Key Vault is
low, significantly less than 10,000 operations per month. For more information, see Key Vault pricing.
If you get a CMG server authentication certificate from a public provider, there's generally a cost associated with
this certificate. For more information, see CMG server authentication certificate.
NOTE
To enable a content-enabled CMG to use Windows BranchCache, install the BranchCache feature on the site
server. For more information, see Set up CMG: BranchCache
Terminology
The following terms are used in the context of setting up a CMG. They're defined here for clarity.
Azure AD tenant: The directory of user accounts and app registrations. One tenant can have multiple
subscriptions.
Azure subscription: A subscription separates billing, resources, and services. It's associated with a single
tenant.
TIP
For more information, see Subscriptions, licenses, accounts, and tenants for Microsoft's cloud offerings.
Azure resource group: A container that holds related resources for an Azure solution. The resource group
includes those resources that you want to manage as a group. You decide which resources belong in a
resource group based on what makes the most sense for your organization. For more information, see
Resource groups.
CMG service name: The common name (CN) of the CMG server authentication certificate. Clients and the
CMG connection point site system role communicate with this service name. For example,
GraniteFalls.Contoso.Com or GraniteFalls.WestUS.CloudApp.Azure.Com .
CMG deployment name: The first part of the service name plus the Azure location for the cloud service
deployment. The cloud service manager component of the service connection point uses this name when
it deploys the CMG in Azure. The deployment name is always in an Azure domain. The Azure location
depends upon the deployment method, for example:
Virtual machine scale set: GraniteFalls.WestUS.CloudApp.Azure.Com
Classic deployment: GraniteFalls.CloudApp.Net
Checklist
Use the following checklist to make sure you have the necessary information and prerequisites to create a CMG:
The Azure environment to use. For example, the Azure Public Cloud or the Azure US Government Cloud.
The Azure region for this CMG deployment.
How many VM instances you need for scale and redundancy.
An Azure global administrator role to register apps in Azure AD.
An Azure subscription owner role for when you create the CMG in Azure.
At least one existing site system server on which you plan to add the CMG connection point role.
You'll set up other prerequisite components during the next steps in the process.
Next steps
Get started with your CMG setup by getting a server authentication certificate:
CMG server authentication certificate
CMG server authentication certificate
2/16/2022 • 7 minutes to read • Edit Online
NOTE
You may need additional certificates for clients and management points. These certificates are covered in the third step of
the CMG setup process, Configure client authentication.
Deployment name : The first part of the service name plus the Azure location for the cloud service
deployment. The cloud service manager component of the service connection point uses this name when
it deploys the CMG in Azure. The deployment name is always in an Azure domain. The Azure location
depends upon the deployment method, for example:
Virtual machine scale set: GraniteFalls.WestUS.CloudApp.Azure.Com
Classic deployment: GraniteFalls.CloudApp.Net
IMPORTANT
This article uses examples with a virtual machine scale set as the recommended deployment method in version
2107 and later. If you use a classic deployment, note the difference as you read this article and prepare the server
authentication certificate.
IMPORTANT
Before you get this certificate, make sure the service name is globally unique for the cloud service and storage account.
Also make sure the name uses supported characters. For more information, see Globally unique name.
NOTE
The CMG server authentication certificate supports wildcards. Some certificate authorities issue certificates using a
wildcard character for the service name prefix. For example, *.contoso.com . Some organizations use wildcard certificates
to simplify their PKI and reduce maintenance costs.
For more information on how to use a wildcard certificate with a CMG, see Set up a CMG.
IMPORTANT
Don't create the service in the portal, just use this process to check the name availability.
IMPORTANT
The DNS name prefix should be 3 to 24 characters long, and contain numbers and lowercase letters only. Don't use special
characters, like a dash ( - ). For example: granitefalls .
NOTE
If the Azure deployment name changes, you'll need to redeploy the service to change this service name.
For example, if your service name is in the cloudapp.net domain, you can't convert the classic cloud
service CMG to a virtual machine scale set. If you use your domain name for the CMG service name, then
you can update the DNS CNAME for the new deployment name.
Use this service name for the certificate common name (CN).
When you create the CMG, while the certificate has GraniteFalls.contoso.com as the CN, Configuration
Manager only extracts the service name prefix, for example: GraniteFalls . It appends this prefix to the Azure
service domain ( cloudapp.azure.com ) with the region ( westus ) to create the deployment name. For example,
GraniteFalls.WestUS.CloudApp.Azure.Com . The CNAME alias in the DNS namespace for your domain (
contoso.com ) maps together these two FQDNs.
The Configuration Manager client policy includes the CMG service name, GraniteFalls.contoso.com . The client
resolves the service name via the CNAME alias to the deployment name,
GraniteFalls.WestUS.CloudApp.Azure.Com . It then can resolve the IP address of the deployment name to
communicate with the service in Azure.
Next steps
Continue your CMG setup by configuring Azure Active Directory (Azure AD):
Configure Azure AD
Configure Azure Active Directory for CMG
2/16/2022 • 6 minutes to read • Edit Online
TIP
This article provides prescriptive guidance to integrate the site specifically for the cloud management gateway. For more
information on this process and other uses of the Azure Ser vices node in the Configuration Manager console, see
Configure Azure services.
When you integrate the site, you create app registrations in Azure AD. The CMG requires two app registrations:
Web app (also referred to as a server app in Configuration Manager)
Native app (also referred to as a client app in Configuration Manager)
There are two methods to create these apps, both of which require a global administrator role in Azure AD:
Use Configuration Manager to automate the creation of the apps when you integrate the site.
Manually create the apps in advance, and then import them when you integrate the site.
This article primarily follows the first method. For more information on the other method, see Manually register
Azure AD apps for CMG.
Before you start, make sure you have an Azure AD global administrator available.
NOTE
If you plan to import precreated app registrations, you first need to create them in Azure AD. Start with the article to
Manually register Azure AD apps for CMG. Then return to this article to run the Azure Services wizard and import the
apps to Configuration Manager.
Secret key validity period : choose either 1 year or 2 years from the drop-down list. One year
is the default value.
Azure AD admin account : Select Sign in to authenticate to Azure AD as a global administrator.
Configuration Manager doesn't save these credentials. This persona doesn't require permissions in
Configuration Manager, and doesn't need to be the same account that runs the Azure Services
Wizard. After successfully authenticating to Azure, the page shows the Azure AD tenant name
for reference.
4. Select OK to create the web app in Azure AD and close the Create Server Application window.
5. In the Server App window, make sure your new app is selected, then select OK to save and close the
window.
Next steps
Continue your CMG setup by deciding which type of client authentication to use:
Configure client authentication
Configure client authentication for cloud
management gateway
2/16/2022 • 7 minutes to read • Edit Online
Azure AD
If your internet-based devices are running Windows 10 or later, use Azure AD modern authentication with the
CMG. This authentication method is the only one that enables user-centric scenarios.
This authentication method requires the following configurations:
The devices need to be either cloud domain-joined or hybrid Azure AD-joined, and the user also needs an
Azure AD identity.
TIP
To check if a device is cloud-joined, run dsregcmd.exe /status in a command prompt. If the device is Azure AD-
joined or hybrid-joined, the AzureAdjoined field in the results shows YES. For more information, see dsregcmd
command - device state.
One of the primary requirements for using Azure AD authentication for internet-based clients with a
CMG is to integrate the site with Azure AD. You already completed that action in the prior step.
There are a few other requirements, depending upon your environment:
Enable user discovery methods for hybrid identities
Enable ASP.NET 4.5 on the management point
Configure client settings
For more information on these prerequisites, see Install clients using Azure AD.
PKI certificate
Use these steps if you have a public key infrastructure (PKI) that can issue client authentication certificates to
devices.
This certificate may be required on the CMG connection point. For more information, see CMG connection point.
Issue the certificate
Create and issue this certificate from your PKI, which is outside of the context of Configuration Manager. For
example, you can use Active Directory Certificate Services and group policy to automatically issue client
authentication certificates to domain-joined devices. For more information, see Example deployment of PKI
certificates: Deploy the client certificate.
The CMG client authentication certificate supports the following configurations:
2048-bit or 4096-bit key length
This certificate supports key storage providers for certificate private keys (v3). For more information, see
CNG v3 certificates overview.
Export the client certificate's trusted root
The CMG has to trust the client authentication certificates to establish the HTTPS channel with clients. To
accomplish this trust, export the trusted root certificate chain. Then supply these certificates when you create the
CMG in the Configuration Manager console.
Make sure to export all certificates in the trust chain. For example, if the client authentication certificate is issued
by an intermediate CA, export both the intermediate and root CA certificates.
NOTE
Export this certificate when any client uses PKI certificates for authentication. When all clients use either Azure AD or
tokens for authentication, this certificate isn't required.
After you issue a client authentication certificate to a computer, use this process on that computer to export the
trusted root certificate.
1. Open the Start menu. Type "run" to open the Run window. Open mmc .
2. From the File menu, choose Add/Remove Snap-in....
3. In the Add or Remove Snap-ins dialog box, select Cer tificates , then select Add .
a. In the Certificates snap-in dialog box, select Computer account , then select Next .
b. In the Select Computer dialog box, select Local computer , then select Finish .
c. In the Add or Remove Snap-ins dialog box, select OK .
4. Expand Cer tificates , expand Personal , and select Cer tificates .
5. Select a certificate whose Intended Purpose is Client Authentication .
a. From the Action menu, select Open .
b. Go to the Cer tification Path tab.
c. Select the next certificate up the chain, and select View Cer tificate .
6. On this new Certificate dialog box, go to the Details tab. Select Copy to File....
7. Complete the Certificate Export Wizard using the default certificate format, DER encoded binar y
X.509 (.CER) . Make note of the name and location of the exported certificate.
8. Export all of the certificates in the certification path of the original client authentication certificate. Make
note of which exported certificates are intermediate CAs, and which ones are trusted root CAs.
CMG connection point
To securely forward client requests, the CMG connection point requires a secure connection with the
management point. If you're using PKI client authentication, and the internet-enabled management point is
HTTPS, issue a client authentication certificate to the site system server with the CMG connection point role.
NOTE
The CMG connection point doesn't require a client authentication certificate in the following scenarios:
Clients use Azure AD authentication.
Clients use Configuration Manager token-based authentication.
The site uses Enhanced HTTP.
Site token
If you can't join devices to Azure AD or use PKI client authentication certificates, then use Configuration Manager
token-based authentication. For more information, or to create a bulk registration token, see Token-based
authentication for cloud management gateway.
If your environment has multiple management points, you don't have to HTTPS-enable them all for CMG.
Configure the CMG-enabled management points as Internet only . Then your on-premises clients don't try to
use them.
Management point client connection mode summary
These tables summarize whether the management point requires HTTP or HTTPS, depending upon the type of
client. They use the following terms:
Workgroup: The device isn't joined to a domain or Azure AD, but has a client authentication certificate.
AD domain-joined: You join the device to an on-premises Active Directory domain.
Azure AD-joined: Also known as cloud domain-joined, you join the device to an Azure AD tenant. For more
information, see Azure AD joined devices.
Hybrid-joined: You join the device to your on-premises Active Directory and register it with your Azure AD.
For more information, see Hybrid Azure AD joined devices.
HTTP: On the management point properties, you set the client connections to HTTP .
HTTPS : On the management point properties, you set the client connections to HTTPS .
E-HTTP: On the site properties, Communication Security tab, you set the site system settings to HTTPS or
HTTP , and you enable the option to Use Configuration Manager-generated cer tificates for HTTP site
systems . You configure the management point for HTTP, and the HTTP management point is ready for both
HTTP and HTTPS communication.
IMPORTANT
Starting in Configuration Manager version 2103, sites that allow HTTP client communication are deprecated. Configure
the site for HTTPS or Enhanced HTTP. For more information, see Enable the site for HTTPS-only or enhanced HTTP.
F o r i n t e r n e t - b a se d c l i e n t s c o m m u n i c a t i n g w i t h t h e C M G
Configure an on-premises management point to allow connections from the CMG with the following client
connection mode:
NOTE
Note 1 : This configuration requires the client has a client authentication certificate, and only supports device-centric
scenarios.
F o r o n - p r e m i se s c l i e n t s c o m m u n i c a t i n g w i t h t h e o n - p r e m i se s m a n a g e m e n t p o i n t
Configure an on-premises management point with the following client connection mode:
O N - P REM ISES C L IEN T M A N A GEM EN T P O IN T
NOTE
On-premises AD domain-joined clients support both device- and user-centric scenarios communicating with an HTTP or
HTTPS management point.
On-premises Azure AD-joined and hybrid-joined clients can communicate via HTTP for device-centric scenarios, but need
E-HTTP or HTTPS to enable user-centric scenarios. Otherwise they behave the same as workgroup clients.
Next steps
You're now ready to create the CMG in Configuration Manager:
Set up CMG
Set up CMG for Configuration Manager
2/16/2022 • 9 minutes to read • Edit Online
Set up a CMG
TIP
Deploying a CMG with a vir tual machine scale set in Azure was first introduced in version 2010 as a pre-release
feature. Beginning with version 2107, it's no longer a pre-release feature.
Do this procedure on the top-level site. That site is either a standalone primary site, or the central administration
site (CAS).
1. In the Configuration Manager console, go to the Administration workspace, expand Cloud Ser vices ,
and select Cloud Management Gateway .
2. Select Create Cloud Management Gateway in the ribbon.
3. On the General page of the wizard, first specify the Azure environment for this CMG:
AzurePublicCloud : Create the service in the global Azure cloud.
AzureUSGovernmentCloud : Create the service in the Azure US Government cloud.
4. Next choose how you want to deploy the CMG in Azure:
NOTE
In version 2006 and earlier, you don't have this choice. All deployments use the cloud ser vice (classic) method.
IMPORTANT
The option to deploy a CMG as a cloud ser vice (classic) is deprecated. All CMG deployments should
use a virtual machine scale set. For more information, see Removed and deprecated features.
5. Select Sign in . Authenticate with an Azure Subscription Owner account. The wizard automatically
populates the remaining fields from the information stored during the Azure AD integration prerequisite.
If you own multiple subscriptions, select the Subscription ID of the subscription you want to use.
Select Next , and wait as the site tests the connection to Azure.
6. On the Settings page of the wizard, first Browse to the .PFX file for the CMG server authentication
certificate (Cer tificate file ). The common name from this certificate is used to populate the Ser vice
name and Deployment name fields.
If you use a wildcard certificate, replace the asterisk ( * ) in the Ser vice name field with the globally
unique deployment name prefix for your CMG.
a. Optionally specify a Description to further identify this CMG in the Configuration Manager
console.
b. Select an Azure Region for this CMG. The list of available regions may vary based on the selected
subscription.
c. Select a Resource Group option:
If you choose Use existing , then select an existing resource group from the list. This
resource group needs to already exist in the same region you selected for the CMG. If you
select an existing resource group, and it's in a different region than the previously selected
region, the CMG will fail to deploy.
If you choose Create new , then enter the new resource group name.
d. By default, the VM Size is Standard (A2_V2) . Select another option as your design specifies. For
example, Large (A4_v2) for increased client capacity per VM, or Lab (B2s) in a small test
environment.
IMPORTANT
The Lab (B2s) size VM is only intended for lab testing and small proof-of-concept environments. For
example, with the Configuration Manager technical preview branch. The B2s VMs aren't intended for
production use with the CMG. They are low cost and low performing.
e. In the VM Instance field, enter the number of VMs for this service. The default is one, but you can
scale up to 16 VMs per CMG.
f. If you're using client authentication certificates, select Cer tificates to add trusted root certificates.
Add all of the certificates in the trust chain.
NOTE
A trusted root certificate isn't required when using Azure Active Directory (Azure AD) or site-issued tokens
for client authentication.
g. By default, the wizard enables the option to Verify Client Cer tificate Revocation . A certificate
revocation list (CRL) must be publicly published for this verification to work. For more information,
see Publish the certificate revocation list.
h. By default, the wizard enables the option to Enforce TLS 1.2 . This setting requires the Azure VM
to use the TLS 1.2 encryption protocol. It doesn't apply to any on-premises Configuration Manager
site servers or clients. Starting in version 2107 with the update rollup, this setting also applies to
the CMG storage account. For more information, see How to enable TLS 1.2.
i. By default, the wizard enables the option to Allow CMG to function as a cloud distribution
point and ser ve content from Azure storage . If you plan on targeting deployments with
content to clients, you need to configure the CMG to serve content.
7. Next is the Aler ts page of the wizard. To monitor CMG traffic with a 14-day threshold, enable the
threshold alert. Then specify the threshold, and the percentage at which to raise the different alert levels.
You can also enable a storage alert threshold. Choose Next when you're done.
8. Review the settings, and complete the wizard.
Configuration Manager starts to set up the service. The amount of time it takes to completely provision the
service in Azure is dependent upon the settings that you specified. To determine when the service is ready, view
the Status column for the new CMG.
To troubleshoot CMG deployments, use CloudMgr.log and CMGSetup.log . For more information, see Monitor
CMG.
TIP
Starting in version 2010, you can also use the PowerShell cmdlet New-CMCloudManagementGateway for this
process. Optionally use this cmdlet to create the CMG service. While it was available in earlier versions, version 2010
includes significant improvements to this cmdlet. For more information, see New-CMCloudManagementGateway.
IMPORTANT
If you're using client authentication certificates, the CMG connection point needs this certificate. For more information,
see client authentication certificate.
To troubleshoot CMG service health, use CMGSer vice.log and SMS_Cloud_ProxyConnector.log . For more
information, see Log files.
TIP
Optionally, you can also use the PowerShell cmdlet Add-CMCloudManagementGatewayConnectionPoint to add
the CMG connection point role to a site system server.
For more information, see Add-CMCloudManagementGatewayConnectionPoint.
BranchCache
To enable a content-enabled CMG to use Windows BranchCache, install the BranchCache feature on the site
server.
If the site server has an on-premises distribution point site system role, configure the option in that role's
properties to Enable and configure BranchCache . For more information, see Configure a distribution
point.
If the site server doesn't have a distribution point role, install the BranchCache feature in Windows. For
more information, see Install the BranchCache feature.
If you've already distributed content to a CMG, and then decide to enable BranchCache, first install the feature.
Then redistribute the content to the CMG.
Next steps
Continue your CMG setup by configuring clients for CMG:
Configure clients for CMG
Configure clients for cloud management gateway
2/16/2022 • 3 minutes to read • Edit Online
NOTE
By default all clients receive CMG policy. Control this behavior with the client setting, Enable clients to use a cloud
management gateway . For more information, see About client settings.
Client location
The Configuration Manager client automatically determines whether it's on the intranet or the internet. If the
client can contact a domain controller or an on-premises management point, it sets its connection type to
Currently intranet . Otherwise, it switches to Currently Internet , and uses the location of the CMG service to
communicate with the site.
NOTE
You can force the client to always use the CMG regardless of whether it's on the intranet or internet. This configuration is
useful for testing purposes, or for clients that you want to force to always use the CMG. Set the following registry key on
the client:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CCM\Security, ClientAlwaysOnInternet = 1
You can also specify this setting during client installation using the CCMALWAYSINF property.
This setting will always apply, even if the client roams into a location where boundary group configurations would
otherwise leverage local resources.
To verify that clients have the policy specifying the CMG, open a Windows PowerShell command prompt as an
administrator on the client computer, and run the following command:
This command displays any internet-based management points the client knows about. While the CMG isn't
technically an internet-based management point, clients view it as one.
NOTE
To troubleshoot CMG client traffic, use CMGSer vice.log and SMS_Cloud_ProxyConnector.log . For more information,
see Log files.
If the Configuration Manager client doesn't have a current CMG or internet-facing management point set in the
registry, it automatically checks the CMGFQDNs registry value. This check occurs every 25 hours, when the SMS
Agent Host service starts, or when it detects a network change. When the client connects to the site and learns
of a CMG, it automatically updates this value.
Next steps
Your CMG is now set up and functional with clients communicating to the site. Next, understand how to monitor
the CMG service and clients:
Monitor CMG
Monitor the CMG
2/16/2022 • 7 minutes to read • Edit Online
Monitor clients
Clients connected through the CMG appear in the Configuration Manager console the same way on-premises
clients do. For more information, see how to monitor clients.
Monitor content
Monitor content that you distribute to a CMG the same as with any other distribution point. For more
information, see Monitor content.
When you view the list of CMGs in the console, you can add more columns to the list. For example, the Storage
egress (GB) column shows the amount of data that clients downloaded from the service in the last 30 days.
Monitor logs
The following table lists the log files that contain information related to the cloud management gateway.
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
CloudMgr.log Records details about deploying the The installdir folder on the primary site
cloud management gateway service, server or CAS.
ongoing service status, and use data
associated with the service. To
configure the logging level, edit the
Logging level value in the following
registry key:
HKLM\SOFTWARE\
Microsoft\SMS\COMPONENTS\
SMS_CLOUD_ SERVICES_MANAGER
LO G N A M E DESC RIP T IO N C O M P UT ER W IT H LO G F IL E
CMGSetup.log No te 1 Records details about the second The %approot%\logs on your Azure
phase of the cloud management server, or the SMS/Logs folder on the
gateway deployment (local site system server
deployment in Azure). To configure the
logging level, use the setting Trace
level (Information (Default),
Verbose , Error ) on the Azure
por tal\Cloud ser vices
configuration tab.
CMGService.log No te 1 Records details about the cloud The %approot%\logs on your Azure
management gateway service core server, or the SMS/Logs folder on the
component in Azure. To configure the site system server
logging level, use the setting Trace
level (Information (Default),
Verbose , Error ) on the Azure
por tal\Cloud ser vices
configuration tab.
CMGContentService.log No te 1 When you enable a CMG to also serve The %approot%\logs on your Azure
content from Azure storage, this log server, or the SMS/Logs folder on the
records the details of that service. site system server
IMPORTANT
Even if the service isn't running, there are still costs associated with the cloud service. Stopping the service doesn't
eliminate all associated Azure costs. To remove all cost for the cloud service, delete the CMG.
When you stop the CMG service, internet-based clients can't communicate with Configuration Manager.
The total data transfer (egress) includes data from the cloud service and storage account. This data comes from
the following flows:
CMG to client
CMG to site, including CMG log files
If you enable CMG for content, storage account to client
For more information on these data flows, see CMG ports and data flow.
The storage alert threshold is separate. That alert monitors the capacity of your Azure storage instance.
When you select the CMG instance in the Cloud Management Gateway node in the console, you can see the
total data transfer in the details pane.
Configuration Manager checks the threshold value every six minutes. If there's a sudden spike in usage,
Configuration Manager can take up to six minutes to detect that it exceeded the threshold and then stop the
service.
Process to stop the cloud service when it exceeds threshold
1. Set up outbound traffic alerts.
2. On the Aler ts tab of the CMG properties window, enable the option to Stop this ser vice when the
critical threshold is exceeded .
To test this feature, temporarily reduce one of the following values:
14-day threshold for outbound data transfer (GB) . The default value is 10000 .
Percentage of threshold for raising Critical aler t . The default value is 90 .
Next steps
If you need to change the configuration, you can modify the CMG:
Modify a CMG
Modify a CMG
2/16/2022 • 8 minutes to read • Edit Online
Configure properties
After you create a CMG, you can modify some of its settings. Select the CMG in the Configuration Manager
console and select Proper ties . Configure settings on the following tabs:
Settings tab
Cer tificate file : Change the server authentication certificate for the CMG. This option is useful when you
renew the certificate before it expires. When you get a new certificate, make sure its common name is the
same.
NOTE
When you renew the server authentication certificate for the CMG, the FQDN that you specify for the certificate's
common name (CN) is case-sensitive. For example, if the CN of the current certificate is
granitefalls.contoso.com , create the new certificate with the same lowercase CN. The wizard won't accept a
certificate with the CN GRANITEFALLS.CONTOSO.COM .
If you make significant changes to the certificate, you may need to Redeploy the service. For example, changing
the organization name on the certificate.
Description : Specify an optional description to further identify this CMG in the Configuration Manager
console.
VM Instance : Change the number of virtual machines that the service uses in Azure. This setting allows
you to dynamically scale the service up or down based on usage or cost considerations.
Cer tificates : Add or remove trusted root or intermediate CA certificates. This option is useful when
adding new CAs, or retiring expired certificates.
Verify Client Cer tificate Revocation : If you didn't originally enable this setting when you created the
CMG, you can enable it afterwards after you publish the CRL. For more information, see Publish the
certificate revocation list.
Enforce TLS 1.2 : The CMG enables this option by default. Require it to use the TLS 1.2 encryption
protocol. Starting in version 2107 with the update rollup, this setting also applies to the CMG storage
account. For more information, see How to enable TLS 1.2.
Allow CMG to function as a cloud distribution point and ser ve content from Azure storage :
The CMG enables this option by default. If you plan on targeting deployments with content to clients, you
need to configure the CMG to serve content.
Alerts tab
Reconfigure the alerts at any time after you create the CMG. For more information, see Monitor the CMG: Set up
outbound traffic alerts.
Content tab
View the packages that are assigned to the cloud storage account for this CMG. See how much space each
package uses in the storage account. When you select a package, you can redistribute or remove the content
files.
To verify that the content files for a package are available on the content-enabled CMG, go to the Content
Status node in the Monitoring workspace. For more information, see Monitor content you distribute.
Convert
Starting in version 2107, if you have a CMG that uses the classic cloud service, convert it to use a virtual
machine scale set.
TIP
This process reuses the underlying storage account.
SET T IN G C O N VERT
VM size
VM instances
Verify CRL
Require TLS
Serve content
Azure environment
Subscription
Azure AD app
Region
Resource group
To make changes that the conversion process doesn't support, you need to Redeploy the service.
IMPORTANT
If your CMG's service name is in the cloudapp.net domain, you can't convert it to a virtual machine scale set. For
example, you issued a server authentication certificate from your internal PKI with a common name of
GraniteFalls.cloudapp.net . Since Microsoft owns the cloudapp.net domain, you can't create a DNS CNAME to map
this service name to the new deployment name in the cloudapp.azure.com domain.
1. Issue a new server authentication certificate from your internal PKI with a new service name. Consider using your
domain name instead of a Microsoft domain. For more information, see Use an enterprise PKI certificate.
2. Deploy a new CMG as a virtual machine scale set with the new certificate.
3. Once clients refresh policy to get this new CMG, delete the old CMG.
For more information, see Replace a CMG with a new service name.
NOTE
In version 2107 and later, you can have multiple CMGs that use different deployment methods. You can also convert a
cloud ser vice (classic) CMG to a vir tual machine scale set . For more information, see Convert.
In versions 2010 and 2103, if you already deployed a CMG with the cloud ser vice (classic) method, you can't deploy
another CMG as a vir tual machine scale set , and vice versa. First delete the existing CMG, and then create a new one
with the other deployment method. All CMG instances for the site need to use the same deployment method. For more
information, see Plan for CMG: Virtual machine scale sets.
IMPORTANT
This process assumes that you already have at least two CMG services, and are replacing one of them at a time. You need
to have at least one active CMG for internet-based clients.
IMPORTANT
Even if the service isn't running, there are still costs associated with the cloud service. Stopping the service doesn't
eliminate all associated Azure costs. To remove all cost for the cloud service, delete the CMG.
When you stop the CMG service, internet-based clients can't communicate with Configuration Manager.
IMPORTANT
CMG deployments using Azure Service Manager are deprecated. Support will be removed in a later version of
Configuration Manager. Redeploy a new CMG to use the Azure Resource Manager deployment method.
You can also add the Deployment Model attribute as a column to the list view.
TIP
This article provides prescriptive guidance to integrate the site specifically for the cloud management gateway. For more
information on this process and other uses of the Azure Ser vices node in the Configuration Manager console, see
Configure Azure services.
When you integrate the site, you create app registrations in Azure AD. The CMG requires two app registrations:
Web app (also referred to as a server app in Configuration Manager)
Native app (also referred to as a client app in Configuration Manager)
There are two methods to create these apps, both of which require a global administrator role in Azure AD:
Use Configuration Manager to automate the creation of the apps when you integrate the site.
Manually create the apps in advance, and then import them when you integrate the site.
This article provides the specific details for the second method. Pair these instructions with the procedures in the
Configure Azure AD for CMG article to complete the process.
First, you need to make note of the Azure AD tenant name and tenant ID . These values are the first two
pieces of information that you need to import the app registrations in Configuration Manager.
1. In the Azure portal, select Azure Active Director y .
2. In the Azure AD menu, select Custom domain names .
3. Note the tenant name. For example, contoso.onmicrosoft.com .
4. In the Azure AD menu, select Proper ties .
5. Copy the Tenant ID GUID value.
"oauth2AllowIdTokenImplicitFlow": true,
Select Save .
The web (server) app for CMG is now registered in Azure AD.
Select Save .
The native (client) app for CMG is now registered in Azure AD. This step also concludes the process in the Azure
portal. The role of the Azure global administrator is done.
After entering the information, select Verify . Then select OK to close the Import apps window.
IMPORTANT
When you use an imported Azure AD app, you aren't notified of an upcoming expiration date from console notifications.
Next steps
After you manually register the two apps in the Azure portal, use the process in the following article to import
the apps:
Configure Azure AD for CMG
Security and privacy for the cloud management
gateway
2/16/2022 • 4 minutes to read • Edit Online
Security details
The CMG accepts and manages connections from CMG connection points. It uses mutual authentication using
certificates and connection IDs.
The CMG accepts and forwards client requests using the following methods:
Pre-authenticates connections using mutual HTTPS with the PKI-based client authentication certificate or
Azure Active Directory (Azure AD).
IIS on the CMG VM instances verifies the certificate path based on the trusted root certificates that
you upload to the CMG.
If you enable certificate revocation, IIS on the VM instance also verifies client certificate revocation.
For more information, see Publish the certificate revocation list.
The certificate trust list (CTL) checks the root of the client authentication certificate. It also does the same
validation as the management point for the client. For more information, see Review entries in the site's
certificate trust list.
Validates and filters client requests (URLs) to check if any CMG connection point can service the request.
Checks content length for each publishing endpoint.
Uses round-robin behavior to load-balance CMG connection points in the same site.
The CMG connection point uses the following methods:
Builds consistent HTTPS/TCP connections to all VM instances of the CMG. It checks and maintains these
connections every minute.
Uses mutual authentication with the CMG using certificates.
Forwards client requests based on URL mappings.
Reports connection status to show service health status in the console.
Reports traffic per endpoint every five minutes.
Starting in version 2010, Configuration Manager rotates the storage account key for the CMG. This process
happens automatically every 180 days.
Configuration Manager client-facing roles
The management point and software update point host endpoints in IIS to service client requests. The CMG
doesn't expose all internal endpoints. Every endpoint published to the CMG has a URL mapping.
The external URL is the one the client uses to communicate with the CMG.
The internal URL is the CMG connection point used to forward requests to the internal server.
URL-mapping example
When you enable CMG traffic on a management point, Configuration Manager creates an internal set of URL
mappings for each management point server. For example: ccm_system, ccm_incoming, and sms_mp. The
external URL for the management point ccm_system endpoint might look like:
https://<CMG service name>/CCM_Proxy_MutualAuth/<MP Role ID>/CCM_System
The URL is unique for each management point. The Configuration Manager client then puts the CMG-enabled
management point name into its internet management point list. This name looks like:
<CMG service name>/CCM_Proxy_MutualAuth/<MP Role ID>
The site automatically uploads all published external URLs to the CMG. This behavior allows the CMG to do URL
filtering. All URL mappings replicate to the CMG connection point. It then forwards the communication to
internal servers according to the external URL from the client request.
Security guidance
Publish the certificate revocation list
Publish your PKI's certificate revocation list (CRL) for internet-based clients to access. When deploying a CMG
using PKI, configure the service to Verify client cer tificate revocation on the Settings tab. This setting
configures the service to use a published CRL. For more information, see Plan for PKI certificate revocation.
This CMG option verifies the client authentication certificate.
If the client is using Azure AD or Configuration Manager token-based authentication, the CRL doesn't
matter.
If you use PKI, and externally publish the CRL, then enable this option (recommended).
If you use PKI, don't publish the CRL, then disable this option.
If you misconfigure this option, it can cause more traffic from clients to the CMG. This traffic can increase
the Azure egress data, which can increase your Azure costs.
Review entries in the site's certificate trust list
Each Configuration Manager site includes a list of trusted root certification authorities, the certificate trust list
(CTL). View and modify the list by going to the Administration workspace, expand Site Configuration , and
select Sites . Select a site, and then select Proper ties in the ribbon. Switch to the Communication Security
tab, and then select Set under Trusted Root Certification Authorities.
Use a more restrictive CTL for a site with a CMG using PKI client authentication. Otherwise, clients with client
authentication certificates issued by any trusted root that already exists on the management point are
automatically accepted for client registration.
This subset provides administrators with more control over security. The CTL restricts the server to only accept
client certificates that are issued from the certification authorities in the CTL. For example, Windows ships with
certificates for many public and globally trusted certificate providers. By default, the computer running IIS trusts
certificates that chain to these well-known certificate authorities (CA). Without configuring IIS with a CTL, any
computer that has a client certificate issued from these CAs are accepted as a valid Configuration Manager
client. If you configure IIS with a CTL that didn't include these CAs, client connections are refused if the certificate
chained to these CAs.
Enforce TLS 1.2
Use the CMG setting to Enforce TLS 1.2 . It only applies to the Azure cloud service VM. It doesn't apply to any
on-premises Configuration Manager site servers or clients.
Starting in version 2107 with the update rollup, this setting also applies to the CMG storage account.
For more information on TLS 1.2, see How to enable TLS 1.2.
Use token-based authentication
If you have devices that have one or more of the following conditions, consider using Configuration Manager
token-based authentication:
An internet-based device that doesn't often connect to the internal network
The device isn't able to join Azure AD
You don't have a method to install a PKI-issued certificate
With token-based authentication, the site automatically issues tokens for devices that register on the internal
network. You can create a bulk registration token for internet-based devices. For more information, see Token-
based authentication for CMG.
Data flow for CMG
2/16/2022 • 7 minutes to read • Edit Online
1. The service connection point connects to Azure over HTTPS port 443. It authenticates using Azure Active
Directory (Azure AD). The service connection point deploys the CMG in Azure. The CMG creates the
HTTPS service using the server authentication certificate.
2. The CMG connection point connects to the CMG in Azure. It holds the connection open, and builds the
channel for future two-way communication.
When you deploy the CMG as a virtual machine scale set, this flow is over HTTPS.
If you deploy the CMG as a classic cloud service, it first tries TCP-TLS. If that connection fails, it
switches to HTTPS.
For more information, see Note 2: CMG connection point HTTPS ports for one VM.
3. The client connects to the CMG over HTTPS port 443. It authenticates using Azure AD, the client
authentication certificate, or a site-issued token.
NOTE
If you enable the CMG to serve content, the client connects directly to Azure blob storage over HTTPS port 443.
For more information, see Content data flow.
4. The CMG forwards the client communication over the existing connection to the on-premises CMG
connection point. You don't need to open any inbound firewall ports.
5. The CMG connection point forwards the client communication to the on-premises management point
and software update point.
For more information when you integrate with Azure AD, see Configure Azure services: Cloud management data
flow.
Content data flow
When a client uses a CMG as a content location:
1. The management point gives the client an access token along with the list of content sources. This token
is valid for 24 hours, and gives the client access to the cloud-based content source.
2. The management point responds to the client's location request with the service name of the CMG. This
property is the same as the common name of the server authentication certificate.
If you're using your domain name, for example, WallaceFalls.contoso.com , then the client first tries to
resolve this FQDN. Clients use the CNAME alias in your domain's internet-facing DNS to resolve the
Azure deployment name.
3. The client next resolves the deployment name to a valid IP address. This response is handled by Azure's
DNS.
4. The client connects to the CMG. Azure load balances the connection to one of the VM instances. The client
authenticates itself using the access token.
5. The CMG authenticates the client's access token, and then gives the client the exact content location in
Azure storage.
6. If the client trusts the CMG's server authentication certificate, it connects to Azure storage to download
the content.
Required ports
This table lists the required network ports and protocols. The Client is the device that starts the connection,
requiring an outbound port. The Server is the device that accepts the connection, requiring an inbound port.
CMG connection HTTPS or HTTP 443 or 80 / 8530 or Software update On-premises traffic,
point 8531 point port depends upon
software update
point configuration
Notes on ports
Note 1: CMG connection point TCP-TLS ports
These ports only apply when you deploy the CMG as a cloud ser vice (classic) , which was the only method
available in version 2006 and earlier.
The CMG connection point first tries to establish a long-lived TCP-TLS connection with each CMG VM instance. It
connects to the first VM instance on port 10140. The second VM instance uses port 10141, up to the 16th on
port 10155. A TCP-TLS connection has the best performance, but it doesn't support internet proxy. If the CMG
connection point can't connect via TCP-TLS, then it falls back to HTTPS Note 2.
Note 2: CMG connection point HTTPS ports for one VM
If you deploy the CMG in a vir tual machine scale set , the CMG connection point only communicates with the
service in Azure over HTTPS. It doesn't require TCP-TLS ports to build the CMG communication channel.
For a CMG deployed as a classic cloud service, it only uses this port if the TCP-TLS connection fails. If the CMG
connection point can't connect to the CMG via TCP-TLS Note 1, it connects to the Azure network load balancer over
HTTPS 443. This behavior is only for one VM instance.
Note 3: CMG connection point HTTPS ports for two or more VMs
If there are two or more VM instances, the CMG connection point uses HTTPS 10124 to the first VM instance,
not HTTPS 443. It connects to the second VM instance on HTTPS 10125, up to the 16th on HTTPS port 10139.
The following sections list the endpoints by role. Some endpoints refer to a service by <prefix> , which is the
prefix name of the CMG. For example, if your CMG is GraniteFalls.WestUS.CloudApp.Azure.Com , then the actual
storage endpoint is GraniteFalls.blob.core.windows.net .
TIP
To clarify some terminology:
CMG service name: The common name (CN) of the CMG server authentication certificate. Clients and the CMG
connection point site system role communicate with this service name. For example, GraniteFalls.contoso.com
or GraniteFalls.WestUS.CloudApp.Azure.Com .
CMG deployment name: The first part of the service name plus the Azure location for the cloud service
deployment. The cloud service manager component of the service connection point uses this name when it
deploys the CMG in Azure. The deployment name is always in an Azure domain. The Azure location depends upon
the deployment method, for example:
Virtual machine scale set: GraniteFalls.WestUS.CloudApp.Azure.Com
Classic deployment: GraniteFalls.CloudApp.Net
This article uses examples with a virtual machine scale set as the recommended deployment method in version 2107 and
later. If you use a classic deployment, note the difference as you read this article and configure internet access.
The CMG connection point site system supports using a web proxy. For more information on configuring this
role for a proxy, see Proxy server support.
The CMG connection point only needs to connect to the CMG service endpoints. It doesn't need access to other
Azure endpoints.
Configuration Manager client for cloud services
Any Configuration Manager client that needs to communicate with a CMG needs access to the following
endpoints:
Client communications
The following site system roles at primary sites support connections from clients that are in untrusted locations:
NOTE
While IBCM primarily focuses on the internet-based scenario, the same behaviors apply to clients in an untrusted Active
Directory forest. Secondary sites don't support client connections from untrusted locations.
Certificate registration point for the Configuration Manager policy module (NDES)
Distribution point
Content-enabled cloud management gateway (CMG)
Enrollment proxy point
Fallback status point
Management point
Software update point
About internet facing site systems
There's no requirement to have a trust between a client's forest and that of the site system server. However,
when the forest that contains an internet-facing site system trusts the forest that contains the user accounts, this
configuration supports user-based policies for devices on the internet when you enable the Client Policy client
setting Enable user policy requests from internet clients .
For example, the following configurations illustrate when IBCM supports user policies for devices on the
internet:
The internet-based management point is in the perimeter network. That network also has a read-only
domain controller to authenticate the user. A firewall between the perimeter and internal networks allows
Active Directory packets.
The user account is in the intranet-based forest. The internet-based management point is in the
perimeter-based forest. The perimeter forest trusts the internal forest. A firewall between the perimeter
and internal networks allows the authentication packets.
The user account and the internet-based management point are both in the intranet-based forest. You
publish the management point to the internet with a web proxy server.
Use a web proxy server
You can place internet-based site systems in the intranet when you publish them to the internet with a web
proxy server. Configure these site systems for client connections from the internet only, or client connections
from the internet and intranet. When you use a web proxy server, you can configure it for Secure Sockets Layer
(SSL) bridging to SSL or SSL tunneling.
SSL bridging to SSL
SSL bridging to SSL is the recommended and more secure configuration, because it uses SSL termination with
authentication. It authenticates client computers with computer authentication. Mobile devices that you enroll
with Configuration Manager don't support SSL bridging.
With SSL termination at the proxy, it inspects packets from the internet before it forwards them to the internal
network. The proxy authenticates the connection from the client, terminates it, and then opens a new
authenticated connection to the internet-based site systems. When Configuration Manager clients use a proxy,
the client securely contains its identity (GUID) in the packet payload. The management point doesn't consider the
proxy to be the client. Configuration Manager doesn't support bridging with HTTP to HTTPS, or from HTTPS to
HTTP.
NOTE
Configuration Manager doesn't support setting third-party SSL bridging configurations. For example, Citrix Netscaler or
F5 BIG-IP. Please work with your device vendor to configure it for use with Configuration Manager.
Tunneling
If your proxy web server can't support the requirements for SSL bridging, Configuration Manager also supports
SSL tunneling. You can also use SSL tunneling to support mobile devices that you enroll with Configuration
Manager. It's a less secure option because the proxy forwards the SSL packets from the internet to the site
systems without SSL termination. The proxy doesn't inspect the packets for malicious content. When you use
SSL tunneling, there are no certificate requirements for the proxy web server.
NOTE
If you configure a management point to support internet-based clients, clients that connect to this management point
will become internet-capable when they next refresh their list of available management points.
You don't have to restrict the configuration of internet-only client management to the internet. You can also use it on the
intranet.
Clients that you configure for internet-only management only communicate with the site systems that you
configure for client connections from the internet. Use this configuration in the following scenarios:
For computers that you know will never connect to your intranet. For example, point of sale computers in
remote locations.
To restrict client communication to HTTPS only. For example, to support firewall and restricted security
policies.
When you install internet-based site systems in a perimeter network, and you want to manage these servers
as Configuration Manager clients.
NOTE
When you want to manage workgroup clients on the internet, install them as internet-only.
When you configure a mobile device to use an internet-based management point, it automatically configures as internet-
only.
You can configure other clients for both internet and intranet client management. When they detect a change of
network, they automatically switch between IBCM and intranet client management. If these clients can find and
connect to a management point that supports client connections on the intranet, these clients are managed as
intranet clients. Intranet clients have full Configuration Manager functionality. If the clients can't find or connect
to a management point that supports client connections on the intranet, they attempt to connect to an internet-
based management point. If this action succeeds, these clients are then managed by the internet-based site
systems in their assigned site.
The benefit in automatic switching is that clients can use all features when they connect to the intranet, and
receive essential management when they're on the internet. Content download that begins on the internet can
seamlessly resume on the intranet, and the other way around.
Prerequisites
IBCM in Configuration Manager has the following dependencies:
Clients require an internet connection. Configuration Manager uses the device's existing internet
connection. Mobile devices must have a direct internet connection. Full client computers can have either a
direct internet connection or connect by using a proxy web server.
Site systems that support IBCM require an internet connection, and must be in an Active Directory
domain. The internet-based site systems don't require a trust relationship with the Active Directory forest
of the site server. However, when the internet-based management point can authenticate the user by
using Windows authentication, it supports user policies. If Windows authentication fails, it only supports
device policies.
NOTE
To support user policies, also enable the following client settings in the Client Policy group:
Enable user policy polling on clients
Enable user policy requests from Internet clients
A public key infrastructure (PKI) to deploy and manage the required certificates for internet-based clients
and site system servers. For more information, see PKI certificate requirements.
Register public DNS host entries for the internet fully qualified domain names (FQDN) of site systems
that support IBCM.
Enable the option to Use PKI client cer tificate (client authentication capability) when available
on the Communication Security tab of the site properties. Starting with the update rollup for version
2006, this option is required.
Client communication requirements
Intervening firewalls or proxy servers must allow the client communication for internet-based site systems:
Support HTTP 1.1
Allow HTTP content type of multipart MIME attachment (multipart/mixed and application/octet-stream)
Verbs
Allow the following verbs for the internet-based site system server roles:
RO L E VERB S
HTTP headers
Allow the following HTTP headers for the internet-based site system server roles:
RO L E H T T P H EA DERS
For similar communication requirements when you use the software update point for client connections from
the internet, see the documentation for Windows Server Update Services (WSUS).
Unsupported features
Not all client management functionality is appropriate for the internet. Configuration Manager doesn't support
some features for clients on the internet. These unsupported features typically rely on Active Directory Domain
Services or aren't appropriate for a public network.
The following features aren't supported when you manage clients on the internet with IBCM:
Client deployment over the internet, such as client push and software update-based client deployment.
Use manual client installation.
Automatic site assignment
Wake-on-LAN
OS deployment. However, you can deploy task sequences that don't deploy an OS.
Remote control
Software deployment to users. This feature relied upon the application catalog, which is no longer
supported.
Client roaming. Roaming enables clients to always find the closest distribution points to download
content. Clients non-deterministically select one of the internet-based site systems, whatever the
bandwidth or physical location.
When you configure a software update point to accept connections from the internet, internet-based clients
always scan against this software update point to determine which software updates are required. When these
clients are on the internet, they first try to download the software updates from Microsoft Update, rather than
from an internet-based distribution point. If this behavior fails, they then try to download the required software
updates from an internet-based distribution point.
TIP
The Configuration Manager client automatically determines whether it's on the intranet or the internet. If the client can
contact a domain controller or an on-premises management point, it sets its connection type to "Currently intranet".
Otherwise, it switches to "Currently internet", and communicates with the site systems assigned to its site.
Install and assign Configuration Manager clients
using Azure AD for authentication
2/16/2022 • 4 minutes to read • Edit Online
To install the Configuration Manager client on Windows devices using Azure Active Directory (Azure AD)
authentication, integrate Configuration Manager with Azure AD. Clients can be on the intranet communicating
directly with an HTTPS-enabled management point or any management point in a site enabled for Enhanced
HTTP. They can also be internet-based communicating through the CMG or with an Internet-based management
point. This process uses Azure AD to authenticate clients to the Configuration Manager site. Azure AD replaces
the need to configure and use client authentication certificates.
Setting up Azure AD may be easier for some customers than setting up a public key infrastructure for
certificate-based authentication. There are features that require you onboard the site to Azure AD, but don't
necessarily require the clients to be Azure AD-joined. For more information, see the following articles:
Plan for Azure Active Directory
Use Azure AD for co-management
TIP
Configuration Manager extends its support for internet-based devices that don't often connect to the internal network,
aren't able to join Azure Active Directory (Azure AD), and don't have a method to install a PKI-issued certificate. For more
information, see Token-based authentication for CMG.
NOTE
If your devices are in an Azure AD tenant that's separate from the tenant with a subscription for the CMG compute
resources, starting in version 2010 you can disable authentication for tenants not associated with users and devices. For
more information, see Configure Azure services.
TIP
Hybrid-joined devices are joined to an on-premises Active Directory domain and registered with Azure AD.
For more information, see Hybrid Azure AD joined devices.
NOTE
The device needs access to the internet to contact Azure AD, but doesn't need to be internet-based.
The following example shows the general structure of the command line:
ccmsetup.exe /mp:<source management point> CCMHOSTNAME=<internet-based management point> SMSSITECODE=<site
code> SMSMP=<initial management point> AADTENANTID=<Azure AD tenant identifier> AADCLIENTAPPID=<Azure AD
client app identifier> AADRESOURCEURI=<Azure AD server app identifier>
The site publishes additional Azure AD information to the cloud management gateway (CMG). An Azure AD-
joined client gets this information from the CMG during the ccmsetup process, using the same tenant to which
it's joined. This behavior further simplifies installing the client in an environment with more than one Azure AD
tenant. The only two required ccmsetup properties are CCMHOSTNAME and SMSSITECODE .
To automate the client install using Azure AD identity via Microsoft Intune, see How to prepare internet-based
devices for co-management.
Next steps
Once complete, you can continue to monitor and manage clients.
Token-based authentication for cloud management
gateway
2/16/2022 • 5 minutes to read • Edit Online
NOTE
These methods only support device-centric management scenarios.
Microsoft recommends joining devices to Azure AD. Internet-based devices can use Azure AD to authenticate with
Configuration Manager. It also enables both device and user scenarios whether the device is on the internet or connected
to the internal network. For more information, see Install and register the client using Azure AD identity.
Make sure to Enable clients to use a cloud management gateway in the Cloud ser vices group of client
settings. Even with a site token, clients can't communicate with a CMG if client settings don't allow it. For more
information, see About client settings: Cloud services.
NOTE
With an HTTPS management point, the client needs to first register regardless of internet/intranet management point.
The client needs to present a valid PKI-issued certificate, an Azure AD token, or a bulk registration token.
NOTE
Don't confuse bulk registration tokens with those that Configuration Manager issues to individual clients. The bulk
registration token enables the client to initially install and communicate with the site. This initial communication is long
enough for the site to issue the client its own, unique client authentication token. The client then uses its authentication
token for all communication with the site while it's on the internet. Beyond the initial registration, the client doesn't use or
store the bulk registration token.
To create a bulk registration token for use during client installation on internet-based devices, complete the
following actions:
1. Sign in to the top-level site server in the hierarchy with local administrator privileges.
2. Open a command prompt as an administrator.
3. Run the tool from the \bin\X64 folder of the Configuration Manager installation directory on the site
server: BulkRegistrationTokenTool.exe . Create a new token with the /new parameter. For example,
BulkRegistrationTokenTool.exe /new . For more information, see Bulk registration token tool usage.
/?
Display this usage information.
Example: BulkRegistrationTokenTool.exe /?
/new
Create a new bulk registration token.
Example: BulkRegistrationTokenTool.exe /new
Token renewal
The client renews its unique, Configuration Manager-issued token once a month, and it's valid for 90 days. A
client doesn't need to connect to the internal network to renew its token. As long as the token is still valid,
connecting to the site using a CMG is sufficient. If the token isn't renewed within 90 days, the client must directly
connect to a management point on an internal network to receive a new token.
You can't renew a bulk registration token. Once a bulk registration token expires, generate a new one for
internet-based device registration using a CMG.
See also
Overview of cloud management gateway
Install and assign Configuration Manager clients using Azure AD for authentication
Azure AD authentication workflow
2/16/2022 • 9 minutes to read • Edit Online
NOTE
Windows clients get a workplace join (WPJ) certificate when they join an Azure AD tenant. If the certificate isn't found, the
Configuration Manager client can't request Azure AD tokens. Without a token, the client can't use the Configuration
Manager security token service (CCM_STS) communication channel for Azure AD authentication with Configuration
Manager site systems.
Client installation
In this workflow sample, you installed the Configuration Manager client on a Windows device over the internet
with the following ccmsetup command-line properties:
CCMHOSTNAME="CMG.CLOUDAPP.NET/CCM_Proxy_MutualAuth/72186325152220500" SMSSITECODE="MEM"
IMPORTANT
During ccmsetup, the device has to validate the CMG server authentication certificate. The root certificate authority (CA)
certificate for the CMG server authentication certificate needs to be available on the client for the chain validation. If you
use PKI, when the root CA isn't published on the internet, add the root CA certificate to the device's root CAs store.
If the root CA certificate revocation list (CRL) isn't published on internet, add the /nocrlcheck parameter in the ccmsetup
command line.
If the device token request fails, ccmsetup falls back to try requesting an Azure AD user token. If the device can't
get either an Azure AD device or user token, ccmsetup doesn't continue.
NOTE
If the device has a valid PKI client authentication certificate, ccmsetup always prefers the certificate. In this case, the client
installs as a PKI client and doesn't use Azure AD authentication.
WAM token request failed. Status 5, Details 'AAD WAM extension error'
Failed to get AAD token..
Unknown error (Error: D0090016; Source: Unknown)
Failed to get AAD token for 'S-1-5-18' from WAM API. Error 0xd0090016
Falling back to get user 'S-1-5-21-1527250992-855612568-2252598708-1604' token for system...
Getting AAD (user) token with: ClientId = 0b7c8ab3-9ea1-4ffa-b2b9-8ffdd944bd8, ResourceUrl =
https://ConfigMgrService, AccountId = 149FC29A-ECE3-123-A3C1-123456F035A6E
Retrieved AAD token for AAD user 'e8838041-db7a-42d5-b9ae-78813910e4cc'
TIP
Configuration Manager synchronizes the CMGSer vice.log to the site server logs folder every five minutes as
CMG-<CMGname>-ProxyService_IN_<%>-CMGService.log .
3.3 CMG connection point transforms CMG client request to management point client request
The following entries are logged in SMS_CLOUD_PROXYCONNECTOR.log (verbose mode) of the site system
that hosts the CMG connection point role:
ProcessRequest - Start
Incoming request URL: https://MP.MYCORP.COM/CCM_STS
Validated AAD token. TokenType: UDA TenantId: 2ca9a796-a1a6-43ec-88f1-5935b32155c5 UserId: e8838041-db7a-
42d5-b9ae-78813910e4cc DeviceId: 8d2b4ff9-0172-4998-9851-b5324303385f OnPrem_UserSid: S-1-5-21-1527250992-
855612568-2252598708-1604 OnPrem_DeviceSid:
TokenType is UDA
Created SCCM token, token type: UDA, hierarchyId: 8ed3174b-e814-41b5-b51c-fb368f0d4003, userId: 23bbbba2-
702e-4db4-8fd9-3b4fe3a5175d, deviceId: GUID:13E80CEF-5698-4C63-9ED6-E58FBFF78C38
Issued token
Return token to client
NOTE
If the client finds the content from a content-enabled CMG, ccmsetup downloads the content from the cloud storage. If
the latest client version isn't available on the cloud, it downloads the content from the management point via a CMG
request.
Client registration
3. Registration request
The registration component on the management point handles the client registration process. The client sends a
registration message to the MP_ClientRegistration endpoint.
3.1 CMG forwards the client registration request to the management point
The following entries are logged in the MP_RegistrationManager.log of the site system that hosts the
management point that handles the client request:
4.1 CMG gets and forwards CCM_Token request to CMG connection point
The following entries are logged in CMGSer vice.log of the CMG VM and the site system that hosts the CMG
connection point role:
ProcessRequest - Start
Incoming request URL: https://MP.MYCORP.COM/CCM_STS
Validated AAD token. TokenType: UDA TenantId: 2ca9a796-a1a6-43ec-88f1-5935b32155c5 UserId: e8838041-db7a-
42d5-b9ae-78813910e4cc DeviceId: 8d2b4ff9-0172-4998-9851-b5324303385f OnPrem_UserSid: S-1-5-21-1527250992-
855612568-2252598708-1604 OnPrem_DeviceSid:
TokenType is UDA
Created SCCM token, token type: UDA, hierarchyId: 8ed3174b-e814-41b5-b51c-fb368f0d4003, userId: 23bbbba2-
702e-4db4-8fd9-3b4fe3a5175d, deviceId: GUID:13E80CEF-5698-4C63-9ED6-E58FBFF78C38
Issued token
Return token to client
The server returns the CCM token to the client for the rest of client-to-site communication.
NOTE
During client registration, certificate validation always runs. This process happens even if you're using the Azure AD
authentication method to register the client. This behavior is a fallback option, in case Azure AD authentication doesn't
succeed.
Common issues
Root CA not present: Clients need the root CA certificate to validate the CMG server authentication
certificate.
CRL check is enabled: Publish the CRL on the internet. As an alternative, use the /NoCRLCheck
parameter for ccmsetup. You can also disable the following option: Clients check the cer tificate
revocation list (CRL) for site systems . Find this setting on the Communication Security tab of the
site properties.
The WPJ certificate isn't found: Make sure the device is Azure AD-joined. Use dsregcmd.exe. For example,
dsregcmd /status and look at the Device State section.
TIP
Client communication via CMG, CMG connection point, and management point runs over HTTPS. If you configure the site
for enhanced HTTP, you can still configure the management point for HTTP.
Client verifies the CMG server authentication certificate:
PKI certificate: Client requires the root CA of the CMG certificate in its local store.
Third-party certificate: Clients automatically validate a certificate with its root CA published on the internet.
CMG, CMG connection point, and management point validate Azure AD and CCM tokens.
Communication between CMG connection point and management point is also secured in both ends:
CMG connection point uses client auth certificate.
MP uses a PKI certificate for HTTPS configuration, or a self-signed certificate for enhanced HTTP.
Use a cloud distribution point in Configuration
Manager
2/16/2022 • 15 minutes to read • Edit Online
WARNING
The implementation for sharing content from Azure has changed. Use a content-enabled cloud management gateway by
enabling the option to Allow CMG to function as a cloud distribution point and ser ve content from Azure
storage . For more information, see Modify a CMG.
Starting in version 2107, you can't create a traditional cloud distribution point (CDP).
A cloud distribution point is a Configuration Manager distribution point that is hosted as Platform-as-a-Service
(PaaS) in Microsoft Azure. This service supports the following scenarios:
Provide software content to internet-based clients without additional on-premises infrastructure
Cloud-enable your content distribution system
Reduce the need for traditional distribution points
This article helps you learn about the cloud distribution point, plan for its use, and design your implementation.
It includes the following sections:
Features and benefits
Topology design
Requirements
Specifications
Cost
Performance and scale
Ports and data flow
Certificates
Frequently asked questions (FAQ)
Topology design
Deployment and operation of the cloud distribution point includes the following components:
A cloud ser vice in Azure. The site distributes content to this service, which stores it in Azure cloud
storage. The management point provides to clients this content location in the list of available sources as
appropriate.
A management point site system role services client requests per normal.
On-premises clients typically use an on-premises management point.
Internet-based clients either use a cloud management gateway, or an internet-based management
point.
The cloud distribution point uses a cer tificate-based HTTPS web service to help secure network
communication with clients. Clients must trust this certificate.
Azure Resource Manager
Create a cloud distribution point using an Azure Resource Manager deployment . Azure Resource Manager
is a modern platform for managing all solution resources as a single entity, called a resource group. When
deploying a cloud distribution point with Azure Resource Manager, the site uses Azure Active Directory (Azure
AD) to authenticate and create the necessary cloud resources.
NOTE
This feature doesn't enable support for Azure Cloud Service Providers (CSP). The cloud distribution point deployment with
Azure Resource Manager continues to use the classic cloud service, which the CSP doesn't support. For more information,
see available Azure services in Azure CSP.
Azure Resource Manager is the only deployment mechanism for new instances of the cloud distribution point.
Existing deployments continue to work.
Hierarchy design
Where you create the cloud distribution point depends upon which clients need to access the content.
Azure Resource Manager deployment: Create this type at a primary site or the central administration site.
The cloud management gateway (CMG) can also serve content to clients. This functionality reduces the
required certificates and cost of Azure VMs. For more information, see Overview of cloud management
gateway.
To determine whether to include cloud distribution points in boundary groups, consider the following behaviors:
Internet-based clients don't rely on boundary groups. They only use internet-facing distribution points or
cloud distribution points. If you're only using cloud distribution points to service these types of clients,
then you don't need to include them in boundary groups.
If you want clients on your internal network to use a cloud distribution point, then it needs to be in the
same boundary group as the clients. Clients prioritize cloud distribution points last in their list of content
sources, because there's a cost associated with downloading content out of Azure. So a cloud distribution
point is typically used as a fallback source for intranet-based clients. If you want a cloud-first design, then
design your boundary groups to meet this business requirement. For more information, see Configure
boundary groups.
Even though you install cloud distribution points in specific regions of Azure, clients aren't aware of the Azure
regions. They randomly select a cloud distribution point. If you install cloud distribution points in multiple
regions, and a client receives more than one in the content location list, the client might not use a cloud
distribution point from the same Azure region.
Backup and recovery
When you use a cloud distribution point in your hierarchy, use the following information to help you plan for
backup and recovery:
When you use the Backup Site Ser ver maintenance task, Configuration Manager automatically
includes the configurations for the cloud distribution point.
Back up and save a copy of the server authentication certificate. When you restore the Configuration
Manager primary site to a different server, reimport the certificate.
Requirements
You need an Azure subscription to host the service.
An Azure administrator needs to participate in the initial creation of certain components,
depending upon your design. This persona doesn't require permissions in Configuration Manager.
The site server requires internet access to deploy and manage the cloud service.
When using the Azure Resource Manager deployment method, integrate Configuration Manager with
Azure AD for Cloud Management . Azure AD user discovery isn't required.
A ser ver authentication cer tificate . For more information, see the Certificates section below.
To reduce complexity, use a public certificate provider for the server authentication certificate. When
doing so, you also need a DNS CNAME alias for clients to resolve the name of the cloud service.
Set the client setting, Allow access to cloud distribution points , to Yes in the Cloud Ser vices
group. By default, this value is set to No .
Client devices require internet connectivity , and must use IPv4 .
Specifications
The cloud distribution point supports all Windows versions listed in Supported operating systems for
clients and devices.
An administrator distributes the following types of supported software content:
Applications
Packages
OS upgrade packages
Third-party software updates
IMPORTANT
While the Configuration Manager console doesn't block the distribution of Microsoft software updates
to a cloud distribution point, you're paying Azure costs to store content that clients don't use. Internet-
based clients always get Microsoft software update content from the Microsoft Update cloud service.
Don't distribute Microsoft software updates to a cloud distribution point.
When using a CMG for content storage, the content for third-party updates won't download to clients
if the Download delta content when available client setting is enabled.
Configure a pull-distribution point to use a cloud distribution point as a source. For more information,
see About source distribution points.
Deployment settings
Download content locally when needed by the running task sequence . The task sequence engine
can download packages on-demand from a content-enabled CMG or a cloud distribution point. This
option provides additional flexibility with your Windows in-place upgrade deployments to internet-based
devices.
Download all content locally before star ting task sequence . With this option, the Configuration
Manager client downloads the content from the cloud source before starting the task sequence.
A cloud distribution point doesn't support package deployments with the option to Run program from
distribution point . Use the deployment option to Download content from distribution point and
run locally .
Limitations
You can't use a cloud distribution point for PXE or multicast-enabled deployments.
A cloud distribution point doesn't support App-V streaming applications.
A cloud distribution point doesn't support content for Microsoft 365 Apps updates.
You can't prestage content on a cloud distribution point. The distribution manager of the primary site that
manages the cloud distribution point transfers all content.
You can't configure a cloud distribution point as a pull-distribution point.
Cost
IMPORTANT
The following cost information is for estimating purposes only. Your environment may have other variables that affect the
overall cost of using a cloud distribution point.
Configuration Manager includes the following options to help control costs and monitor data access:
Control and monitor the amount of content that you store in a cloud service. For more information, see
Monitor cloud distribution points.
Configure Configuration Manager to alert you when thresholds for client downloads meet or exceed
monthly limits. For more information, see Data transfer threshold alerts.
To help reduce the number of data transfers from cloud distribution points by clients, use one of the
following peer caching technologies:
Configuration Manager peer cache
Windows BranchCache
Windows Delivery Optimization
For more information, see Fundamental concepts for content management.
Components
A cloud distribution point uses the following Azure components, which incur charges to the Azure subscription
account:
TIP
The cloud management gateway can also serve content to clients. This functionality reduces the cost by consolidating the
Azure VMs. For more information, see Cost for cloud management gateway.
Virtual machine
The cloud distribution point uses Azure Cloud Services as platform as a service (PaaS). This service uses
virtual machines (VMs) that incur compute costs.
Each cloud distribution point service uses two Standard A0 VMs.
See the Azure pricing calculator to help determine potential costs.
NOTE
Virtual machine costs vary by region.
IMPORTANT
When you update Configuration Manager, the site redeploys the cloud service. If you manually reconfigure the cloud
service in the Azure portal, the number of instances resets to the default of two.
The Azure storage service supports 500 requests per second for a single file. Performance testing of a single
cloud distribution point supported distribution of a single 100-MB file to 50,000 clients in 24 hours.
Certificates
Depending upon your cloud distribution point design, you need one or more digital certificates.
General information
Certificates for cloud distribution points support the following configurations:
4096-bit key length
Version 3 certificates. For more information, see CNG certificates overview.
When you configure Windows with the following policy: System cr yptography: Use FIPS compliant
algorithms for encr yption, hashing, and signing
Support for TLS 1.2. For more information, see Cryptographic controls technical reference.
Server authentication certificate
This certificate is required for all cloud distribution point deployments.
For more information, see CMG server authentication certificate, and the following subsections, as necessary:
CMG trusted root certificate to clients
Server authentication certificate issued by public provider
Server authentication certificate issued from enterprise PKI
The cloud distribution point uses this type of certificate in the same way as the cloud management gateway.
Clients also need to trust this certificate. To reduce complexity, Microsoft recommends using a certificate issued
by a public provider.
Unless you use a wildcard certificate, don't reuse the same certificate. Each instance of the cloud distribution
point and cloud management gateway requires a unique server authentication certificate.
For more information on creating this certificate from a PKI, see Deploy the service certificate for cloud
distribution points.
Next steps
Install cloud distribution points
Install a cloud distribution point for Configuration
Manager
2/16/2022 • 14 minutes to read • Edit Online
WARNING
The implementation for sharing content from Azure has changed. Use a content-enabled cloud management gateway by
enabling the option to Allow CMG to function as a cloud distribution point and ser ve content from Azure
storage . For more information, see Modify a CMG.
Starting in version 2107, you can't create a traditional cloud distribution point (CDP).
This article details the steps to install a Configuration Manager cloud distribution point in Microsoft Azure. It
includes the following sections:
Before you begin
Set up
Configure DNS
Set up site server proxy
Distribute content and configure clients
Manage and monitor
Modify
Advanced troubleshooting
TIP
Before requesting the server authentication certificate that uses this service name, confirm that the desired Azure
domain name is unique. For example, WallaceFalls.CloudApp.Net.
1.Sign in to the Azure portal.
2.Select All resources , and then select Add .
3.Search for Cloud ser vice . Select Create .
4.In the DNS name field, type the prefix you want, for example WallaceFalls. The interface reflects whether the
domain name is available or already in use by another service.
Don't create the service in the portal, just use this process to check the name availability.
Set up
WARNING
Starting in version 2107, this action isn't available. You can't create a traditional cloud distribution point (CDP). Use a
content-enabled cloud management gateway by enabling the option to Allow CMG to function as a cloud
distribution point and ser ve content from Azure storage . For more information, see Modify a CMG.
Perform this procedure on the site to host this cloud distribution point as determined by your design.
1. In the Configuration Manager console, go to the Administration workspace, expand Cloud Ser vices ,
and select Cloud Distribution Points . In the ribbon, select Create Cloud Distribution Point .
2. On the General page of the Create Cloud Distribution Point Wizard, configure the following settings:
a. First specify the Azure environment .
b. Select Azure Resource Manager deployment as the deployment method. Select Sign in to
authenticate with an Azure subscription admin account. The wizard auto-populates the remaining
fields from the information stored during the Azure AD integration prerequisite. If you own
multiple subscriptions, select the Subscription ID of the desired subscription to use.
3. Select Next . Wait as the site tests the connection to Azure.
4. On the Settings page, specify the following settings, and then select Next :
Region : Select the Azure region where you want to create the cloud distribution point.
Resource Group (Azure Resource Manager deployment method only)
Use existing : Select an existing resource group from the drop-down list.
Create new : Enter the new resource group name to create in your Azure subscription.
Primar y site : Select the primary site to distribute content to this distribution point.
Cer tificate file : Select Browse and select the .PFX file for this cloud distribution point's server
authentication certificate. The common name from this certificate populates the required Ser vice
FQDN and Ser vice name fields.
NOTE
The cloud distribution point server authentication certificate supports wildcards. If you use a wildcard
certificate, replace the asterisk ( * ) in the Ser vice FQDN field with the desired hostname for the service.
5. On the Aler ts page, set up storage quotas, transfer quotas, and at what percentage of these quotas you
want Configuration Manager to generate alerts. Then select Next .
6. Complete the wizard.
Monitor installation
The site starts to create a new hosted service for the cloud distribution point. After you close the wizard, monitor
the installation progress of the cloud distribution point in the Configuration Manager console. Also monitor the
CloudMgr.log file on the primary site server. If necessary, monitor the provisioning of the cloud service in the
Azure portal.
NOTE
It can take up to 30 minutes to provision a new distribution point in Azure. The CloudMgr.log file repeats the following
message until the storage account is provisioned:
Waiting for check if container exists. Will check again in 10 seconds
After it provisions the storage account, the service is created and configured.
Verify installation
Verify that the cloud distribution point installation is complete by using the following methods:
In the Configuration Manager console, go to the Administration workspace. Expand Cloud Ser vices ,
and select the Cloud Distribution Points node. Find the new cloud distribution point in the list. The
Status column should be Ready .
In the Configuration Manager console, go to the Monitoring workspace. Expand System Status , and
select the Component Status node. Show all messages from the
SMS_CLOUD_SERVICES_MANAGER component, and look for status message ID 9409 .
If necessary, go to the Azure portal. The Deployment for the cloud distribution point displays a status of
Ready .
Configure DNS
Before clients can use the cloud distribution point, they must be able to resolve the name of the cloud
distribution point to an IP address that Azure manages. The management point gives them the Ser vice FQDN
of the cloud distribution point. The cloud distribution point exists in Azure as the Ser vice name . See these
values on the Settings tab of the cloud distribution point properties.
NOTE
The Cloud Distribution Points node in the console includes a column named Ser vice Name , but actually shows the
Ser vice FQDN value. To see both values, open Proper ties for the cloud distribution point and switch to the Settings
tab.
The server authentication certificate common name should include your domain name. This name is required
when you purchase a certificate from a public provider. It's recommended when issuing this certificate from
your PKI. For example, WallaceFalls.contoso.com . When you specify this certificate in the Create Cloud
Distribution Point Wizard, the common name populates the Ser vice FQDN property (
WallaceFalls.contoso.com ). The Ser vice name takes the same hostname ( WallaceFalls ) and appends it to the
Azure domain name, cloudapp.net . In this scenario, clients need to resolve your domain's Ser vice FQDN (
WallaceFalls.contoso.com ) to the Azure Ser vice name ( WallaceFalls.cloudapp.net ). Create a CNAME alias to
map these names.
Create CNAME alias
Create a canonical name record (CNAME) in your organization's public, internet-facing DNS. This record creates
an alias for the cloud distribution point's Ser vice FQDN property that clients receive, to the Azure Ser vice
name . For example, create a new CNAME record for WallaceFalls.contoso.com to WallaceFalls.cloudapp.net .
Client name resolution process
The following process shows how a client resolves the name of the cloud distribution point:
1. The client gets the Ser vice FQDN of the cloud distribution point in the list of content sources. For
example, WallaceFalls.contoso.com .
2. It queries DNS, which resolves the Service FQDN using the CNAME alias to the Azure Ser vice name . For
example, WallaceFalls.cloudapp.net .
3. It queries DNS again, which resolves the Azure service name to the Azure public IP address.
4. The client uses this IP address to start communication with the cloud distribution point.
5. The cloud distribution point presents the server authentication certificate to the client. The client uses the
trust chain of the certificate to validate.
IMPORTANT
Configuration Manager monitors the transfer of data, but does not stop the transfer of data beyond the specified
transfer alert threshold.
Specify thresholds for each cloud distribution point during installation, or use the Aler ts tab of the cloud
distribution point properties.
NOTE
Alerts for a cloud distribution point depend on usage statistics from Azure, which can take up to 24 hours to become
available. For more information about Storage Analytics for Azure, see Storage Analytics.
In an hourly cycle, the primary site that monitors the cloud distribution point downloads transaction data from
Azure. It stores this transaction data in the CloudDP-<ServiceName>.log file on the site server. Configuration
Manager then evaluates this information against the storage and transfer quotas for each cloud distribution
point. When the transfer of data reaches or exceeds the specified volume for either warnings or critical alerts,
Configuration Manager generates the appropriate alert.
WARNING
Because the site downloads information about data transfers from Azure every hour, the usage might exceed a warning
or critical threshold before Configuration Manager can access the data and raise an alert.
Modify
View high-level information about the distribution point in the Cloud Distribution Points node under Cloud
Ser vices in the Administration workspace of the Configuration Manager console. Select a distribution point
and select Proper ties to see more details.
When you edit the properties of a cloud distribution point, the following tabs include settings to edit:
Settings
Description
Cer tificate file : Before the server authentication certificate expires, issue a new certificate with the same
common name. Then add the new certificate here for the service to start using. If the certificate expires,
clients won't trust and use the service.
Alerts
Adjust the data thresholds for storage and monthly transfer alerts.
Content
Manage content the same as for an on-premises distribution point.
Redeploy the service
More significant changes, such as the following configurations, require redeploying the service:
Classic deployment method to Azure Resource Manager
Subscription
Service name
Private to public PKI
Azure region
If you have an existing cloud distribution point on the classic deployment method, in order to use the Azure
Resource Manager deployment method you need to deploy a new cloud distribution point. There are two
options:
If you want to reuse the same service name:
1. First delete the classic cloud distribution point. If there isn't another cloud distribution point, then
clients may not be able to get content.
2. Create a new cloud distribution point using a Resource Manager deployment. Reuse the same
server authentication certificate.
3. Distribute the necessary software package content to the new cloud distribution point.
If you want to use a new service name:
1. Create a new cloud distribution point using a Resource Manager deployment. Use a new server
authentication certificate.
2. Distribute the necessary software package content to the new cloud distribution point.
3. Delete the classic cloud distribution point.
TIP
To determine the current deployment model of a cloud distribution point:
1. In the Configuration Manager console, go to the Administration workspace, expand Cloud Ser vices , and select the
Cloud Distribution Points node.
2. Add the Deployment Model attribute as a column to the list view. For a Resource Manager deployment, this
attribute is Azure Resource Manager .
Advanced troubleshooting
If you need to collect diagnostic logging from the Azure VMs to help troubleshoot problems with your cloud
distribution point, use the following PowerShell sample to enable the service diagnostic extension for the
subscription:
# Change these variables for your Azure environment. The current values are provided as examples. You can
find the values for these from the Azure portal.
$storage_name="4780E3836835850223C071" # The name of the storage account that goes with the CloudDP
$key="3jSyvMssuTyAyj5jWHKtf2bV5JF^aDN%z%2g*RImGK8R4vcu3PE07!P7CKTbZhT1Sxd3l^t69R8Cpsdl1xhlhZtl" # The
storage access key from the Storage Account view
$service_name="4780E3836835850223C071" # The name of the cloud service for the CloudDP, which for a Cloud DP
is the same as the storage name
$azureSubscriptionName="8ba1cb83-84a2-457e-bd37-f78d2dd371ee" # The subscription name the tenant is using
$subscriptionId="8ba1cb83-84a2-457e-bd37-f78d2dd371ee" # The subscription ID the tenant is using
# This variable is the path to the config file on the local computer.
$public_config="F:\PowerShellDiagFile\diagnostics.wadcfgx"
# These variables are for the Azure management certificate. Install it in the Current User certificate store
on the system running this script.
$thumbprint="dac9024f54d8f6df94935fb1732638ca6ad77c13" # The thumbprint of the Azure management certificate
$mycert = Get-Item cert:\\CurrentUser\My\$thumbprint
Select-AzureSubscription $azureSubscriptionName
The following sample is an example diagnostics.wadcfgx file as referenced in the public_config variable in
the above PowerShell script. For more information, see Azure Diagnostics extension configuration schema.
<?xml version="1.0" encoding="utf-8"?>
<PublicConfig xmlns="http://schemas.microsoft.com/ServiceHosting/2010/10/DiagnosticsConfiguration">
<WadCfg>
<DiagnosticMonitorConfiguration overallQuotaInMB="4096">
<Directories scheduledTransferPeriod="PT1M">
<IISLogs containerName ="wad-iis-logfiles" />
<FailedRequestLogs containerName ="wad-failedrequestlogs" />
</Directories>
<WindowsEventLog scheduledTransferPeriod="PT1M">
<DataSource name="Application!*" />
</WindowsEventLog>
<Logs scheduledTransferPeriod="PT1M" scheduledTransferLogLevelFilter="Information" />
<CrashDumps dumpType="Full">
<CrashDumpConfiguration processName="WaAppAgent.exe" />
<CrashDumpConfiguration processName="WaIISHost.exe" />
<CrashDumpConfiguration processName="WindowsAzureGuestAgent.exe" />
<CrashDumpConfiguration processName="WaWorkerHost.exe" />
<CrashDumpConfiguration processName="DiagnosticsAgent.exe" />
<CrashDumpConfiguration processName="w3wp.exe" />
</CrashDumps>
<PerformanceCounters scheduledTransferPeriod="PT1M">
<PerformanceCounterConfiguration counterSpecifier="\Memory\Available MBytes" sampleRate="PT3M" />
<PerformanceCounterConfiguration counterSpecifier="\Web Service(_Total)\ISAPI Extension
Requests/sec" sampleRate="PT3M" />
<PerformanceCounterConfiguration counterSpecifier="\Web Service(_Total)\Bytes Total/Sec"
sampleRate="PT3M" />
<PerformanceCounterConfiguration counterSpecifier="\ASP.NET Applications(__Total__)\Requests/Sec"
sampleRate="PT3M" />
<PerformanceCounterConfiguration counterSpecifier="\ASP.NET Applications(__Total__)\Errors
Total/Sec" sampleRate="PT3M" />
<PerformanceCounterConfiguration counterSpecifier="\ASP.NET\Requests Queued" sampleRate="PT3M" />
<PerformanceCounterConfiguration counterSpecifier="\ASP.NET\Requests Rejected" sampleRate="PT3M" />
<PerformanceCounterConfiguration counterSpecifier="\Processor(_Total)\% Processor Time"
sampleRate="PT3M" />
</PerformanceCounters>
</DiagnosticMonitorConfiguration>
</WadCfg>
</PublicConfig>