- Views: 10
- Report Article
- Articles
- Computers
- Software
SCCM Training in Bangalore,Best SCCM 2012 Training in Bangalore | Certification | India
Posted: May 15, 2017
I want to take this opportunity to define for you the discovery process in config manager 2012 verylike the discovery process that you might have had in previous versions of config manager. Discovery is all about from a central console in your config manager. Site discovering devices that might become potential clients or could become clients. Now a client in the config manager environment is any system that has the client software installed and that's what makes it manageable. But a discovered device can still have information in the database about that device like its computer name, maybe its operating system, maybe some basic information MAC address and so on.
So, we need to discover every single device every single potential client in the environment and then once it's discovered we could push out the client and we can start to manage those devices. So, we want to go through this discovery process now as a quick side note we're not only discovering computers or devices but also discovering users. We want to have information about the people in our environment as well so let's go ahead and diagram for you this process at the center of our site is us primary site server which is connected to the database and in the databases information about everything all the configuration as well as the information about discovered devices. So, every single computer that is either a client or just simply a discovered device in the environment will have a record in the database so we have tables and tables full of information about devices on our network now somewhere out on our network our computers. We got some servers we got some desktops we got some laptopsmany different devices that exist on the network.
Some of these devices might be on subnet a some of them might be are on subnet in a completely different branch office location on a totally different network in different sets of subnets and IP ranges and so on. Some of these computers exist in our Active Directory because they are domained joined computers so this triangle is representative of an Active Directory environment computers join the Active Directory domain. Whenthey're a part of your corporate environment and so a computer will haveinformation in the Active Directory. Already if it's a domain joined computer however some of these computers may not be a part or a member of your Active Directory domain, they might be workgroup computers or they could be a member of a different domain they're not a part ofyour Active Directory. But here lies the computers and devices on our network and how they're associated with our corporate Active Directory. Now we come along in our config manager environment and we want to get information about all our computers and mobile devices andother types of devices.
We want to get records in the database so, we should perform discovery is the process where our site server will send out signals on the network where it's scanning the network and gathering information from computers that respond. So,several ways that we can do this we can send out a network discovery as it's called and there's a couple of different ways to do that I could scan a subnet where I'm running a scan across all the IP addresses on thatsubnet and seeing if any of those computers respond. When they respond, they're going to respond with some basic information the name of the computer, the IP address of the computer, the mac address of the computer some basic information that is being sent back. Now we can scan multiple subnets we can scan a range of IP addresses. When we do that, we might be scanning across several subnets at the same because they're included in that range of IP addresses those could be ipv4 ranges it could also be ipv6 scans. if we're going to be working in an ipv6environment not many of us are working in ipv6 yet but you might be we could also send a network discovery information across to other sites inother locations and we designate them by specifying that we have a particular subnet. Now another thing that, we could do is we could scan an active directory site so a branch office location may be defined as an ad site now to get that information we would queried the active directory to pull in information about all of the sites thatwe already have, network ranges or subnets to those sites are associated with and we can utilize that infrastructure to say hey let's discover computers in our Houston office and we already have that office defined in our Active Directory. So we could scan for sites these are all examples of network discovery problem with network discovery is we don't necessarily get particularly detailed information we may not get information about the operating system on those computers. we may not getinformation about well first of all we may not even get certain responses if we've got a windows firewall running on those computers it may block the scan completely and so we may not discover those computers at all in those instances so there's another type of discovery that would be particularly useful for an Active Directory corporate environment which is called ad discovery or Active Directory discovery this is where we're going to instead of just scanning the network we're going to runa query against our Active Directory the query may run against a certain subset of the Active Directory maybe a particular oh you or organizational unit or a whole structure of a no you maybe we're going to scan the entire Active Directory domain and we might do an Active Directory computer discovery which would scan the entire designated namespace for computer objects in the active directory it could be an Active Directory user discovery and this is really the only way to gather information about users and the people in our organization is to scan the active directory either way whether we're doing a network discovery and pulling in information on those users or on those devices rather or whether we'redoing an Active Directory query and pulling in device information and userinformation we are getting information into our database and what it generates is what's called a DDR a device discovery record those are records then they get entered into the database so that we can see through the config manager console we can see all of this information and start to manage these elements we need to run a user discovery at some point if we plan on deploying applications to users as an example now we can always it once we've discovered devices we can always deploy applications to devices but there's some advanced functionality now in the 2012 version of config manager that allows us to deploy to users and have some intelligence about which computers belong to those users so there's a lot of flexibility in how we work in this environment but the one of the first tasks that we have to perform is the process of discovery.
About the Author
Sccm Training in Bangalore,Sccm Institute in Bangalore,Scom Institutes, Virtualization, Sccm 2012,Sccm 2012, System Center Training,Best, Institute, Course, In, Online
Rate this Article
Leave a Comment