Microsoft Connected Cache

Microsoft Connected Cache

Since version 1906 of Configuration Manager, it is possible to install a Microsoft Connected Cache server on distribution points. This functionnality has been renamed Microsoft Connected Cache with version 1910 of Configuration Manager. This server is a Transparent on-demand caching server for uploaded content through distribution optimization. It is possible to limit the use of this server using client settings. So it is easy to limit access to this feature only to the local Configuration Manager client.

Continue reading

Tenant Attach

Cloud Attach

What is Tenant attach ?

The tenant attach solution allows devices present in SCCM to be managed by Microsoft Intune. This will make it possible to manage them in Microsoft Intune as well.

The tenant attach functionality requires the following prerequisites.

  • An account with Global administrator rights in the Intune tenant.
  • The AD user is synchronised with Azure AD
Continue reading

Power BI with SCCM

Power BI with SCCM

With sccm, it is possible to use reports natively using SQL reporting. If you want more advanced reports, more ergonomic, … It is possible to integrate Power BI with SCCM. This way you will be able to use all the power of Power Bi with SCCM.

Continue reading

Approve Application request

Approve Application request

The Configuration Manager solution is enriched with a new functionality at the application deployment level. Introduced with the latest versions of Configuration Manager, feature Approve Application request feature can now be used.

Continue reading

Application groups

Application group

This functionnality is implemented from sccm 1906. He permit to deploy multiple application as a single deployment. With SCCM 1910, users can uninstall the app group. The App group can be deployed to a user collection. It is possible to specify the order in which the applications are installed in the group.

Continue reading

Using MBAM with SCCM

Using MBAM with SCCM

Using MBAM with SCCM

SCCM 1910 provides full BitLocker lifecycle management. He replace MBAM(Microsoft BitLocker Administration and Monitoring). Configuration Manager provides these capabilities for BitLocker Drive Encryption:

Continue reading

Site Server high availability

Site Server high availability

Site Server high availability

With System Center Configuration Manager, you can have redunndancy role with multiple instance of role (Distribution point, …). Configuration Manager 1806 permit to have high availability for Site Server role (it’s not possible before 1806 version of Configuration Manager). For the central administration site and child primary site, you need have 1810 version of Configuration Manager.

Continue reading

SCCM PXE without WDS

SCCM PXE without WDS

SCCM PXE without WDS

SCCM 1806 brings an interesting new feature for anyone wishing to deploy workstations at a remote site. Before this version, it’s necessary to have a server to perform a PXE boot. Indeed, this type of startup requires to use a WDS (Windows Deployment Service) server. Since version 1806 of SCCM, it is possible to do a PXE boot without a WDS server.However, it is not possible to do a Multicast deployment without WDS. So if you want deploy operating system with SCCM and multicast you must use a WDS server.

Continue reading

CMPivot into SCCM

CMPivot into SCCM

CMPivot into SCCM

SCCM contains a large amount of data, which can be used to create reports. CMPivot was introduced in SCCM with version 1806 of SCCM. This feature has the advantage of accessing the status of the devices in real time. This feature has the advantage of accessing the status of the devices in real time. A query is executed on a target group (computer), then the result is returned.

Continue reading

Secure your desktop with Bitlocker

Secure your desktop with Bitlocker

Secure your desktop with BitLocker

Today, mobility means securing your workstations. BitLocker functionality has been integrated into operating systems for many years. This functionnalitty permit to ensures data confidentiality in the event of computer is loss or theft.

Continue reading