{"id":679,"date":"2015-07-26T14:23:08","date_gmt":"2015-07-26T14:23:08","guid":{"rendered":"http:\/\/www.davidpapkin.net\/?p=679"},"modified":"2015-07-26T14:23:08","modified_gmt":"2015-07-26T14:23:08","slug":"discovering-and-organizing-resources-in-system-center-2012-r2-configuration-manager","status":"publish","type":"post","link":"https:\/\/davidpapkin.com\/?p=679","title":{"rendered":"Discovering and Organizing Resources in SCCM 2012 R2 by David Papkin"},"content":{"rendered":"<p>You can manage computer and user resources within a System Center 2012 R2 Configuration Manager environment only when Configuration Manager has discovered these resources and assigned them to a site. In this post\u00a0, you will learn about boundaries and boundary groups that help create logical network locations that contain discovered computers based upon IP addresses or Active Directory\u00ae sites.<br \/>\nYou can use these boundary configurations for client site assignment and for helping clients find content from associated site systems. You also will learn about the discovery processes that you can use to identify computers, users, and the network infrastructure within your network environment. You then will learn about collections that support logical groupings of resources. You use these groupings for management\u00a0tasks such as targeting software updates, managing applications, or deploying compliance settings to resources.<br \/>\nAdditionally, you will learn to implement role-based administration by using security roles, security scopes, and collections. Role-based administration determines both the tasks that an administrative user can perform, and the objects and resources on which the user can perform those task<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Overview of Client Assignment<\/strong><br \/>\nBefore you can use some Configuration Manager features to manage a computer resource, you<br \/>\nmust install the client software on that computer, and the computer must join a primary site.<br \/>\nSite assignment is the process of a client joining a primary site, and you assign clients only to<br \/>\nprimary sites. You cannot assign clients to a central administration site or a secondary site<\/p>\n<div id=\"attachment_681\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/07\/Overview-of-Client-Assignment.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-681\" class=\"size-medium wp-image-681\" src=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/07\/Overview-of-Client-Assignment-300x200.jpg\" alt=\"Overview of Client Assignment\" width=\"300\" height=\"200\" srcset=\"\/wp-content\/uploads\/2015\/07\/Overview-of-Client-Assignment-300x200.jpg 300w, \/wp-content\/uploads\/2015\/07\/Overview-of-Client-Assignment.jpg 670w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-681\" class=\"wp-caption-text\">Overview of Client Assignment<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>What Is a Boundary?<\/strong><br \/>\nA boundary is a network location that contains\u00a0one or more devices that you want to manage or<br \/>\nresources that you want to provide to clients.\u00a0Your network infrastructure is most likely<br \/>\nseparated into several network locations, each of\u00a0which contains network clients. Configuration<br \/>\nManager can use each of these network locations\u00a0to organize clients into boundaries, and you can\u00a0define a boundary as one of the following types:<br \/>\n\u2022 IP subnet. You can use this boundary type to\u00a0specify network locations based on individual<br \/>\nsubnet IDs. You can be very specific about\u00a0each network location. However, frequent IP subnet changes or additions require additional\u00a0boundary administration, such as moving a site to another site manually.<br \/>\n\u2022 Active Directory site. A boundary based upon an Active Directory site is the easiest method for<br \/>\nmaintaining network locations. Active Directory administrators create Active Directory sites, which\u00a0typically represent distinct network locations. One main advantage for using Active Directory sites for\u00a0Configuration Manager boundaries is that any subnet changes to the Active Directory sites are\u00a0reflected within the boundaries automatically. However, one disadvantage is that you must rely on\u00a0the proper configuration of the Active Directory sites. If the Active Directory administrator has not\u00a0configured the site settings properly, you may have unmanaged clients within the improperly\u00a0configured subnets or clients assigned to the wrong Configuration Manager site.<br \/>\n\u2022 IPv6 prefix. You can use this boundary type if your network infrastructure uses IP addresses based\u00a0upon the Internet Protocol version 6 (IPv6) architecture. This supports the current and future\u00a0operating systems that rely on this IP addressing method.<br \/>\n\u2022 IP address range. You can use this boundary type if you need to be very granular when specifying\u00a0clients. You can use a range to specify a single client for testing purposes, or you can add a range of\u00a0client addresses to represent any number of client devices. This method requires careful planning and\u00a0administration to ensure that the IP ranges are not used as part of an IP subnet or another site\u2019s\u00a0Active Directory site-boundary configuration.<br \/>\nConfiguration Manager boundaries are global, and each boundary definition is available from every\u00a0primary site, secondary site, and the central administration site, within the hierarchy. A boundary itself\u00a0does not enable client management at the network location. You have to add a boundary to a boundary\u00a0group before the clients can be assigned to a specific site automatically or access content within a specific\u00a0boundary.<br \/>\n<strong>Configure boundaries<\/strong><br \/>\nTo configure boundaries, open the Configuration Manager console, right-click the Boundaries node, and\u00a0then select Create Boundary. The Create Boundary dialog box provides an option to select one of the four\u00a0boundary types and configure the related settings, as necessary.<br \/>\nYou also can manage boundaries with the following Configuration Manager cmdlets:<br \/>\n\u2022 New-CMBoundary. Use this cmdlet to create a new boundary.<br \/>\n\u2022 Get-CMBoundary. Use this cmdlet to view an existing boundary\u2019s information.<br \/>\n\u2022 Set-CMBoundary. Use this cmdlet to alter an existing boundary\u2019s properties.<br \/>\n\u2022 Remove-CMBoundary. Use this cmdlet to remove an existing boundary<\/p>\n<p><strong>What Is Resource Discovery?<\/strong><br \/>\nResource discovery is a process through which you can search a network for resources that you can use and manage with Configuration Manager. A resource is an object that is discovered by one of the available Configuration Manager discovery methods. During resource discovery, resource information can come from a variety of sources including Active Directory objects, such as users, groups, and computers; site systems; routers; printers; and other IP-addressable devices on your network. You can use the discovered resources to<br \/>\ncreate custom queries and organize resources into collections that you can use for management tasks, such as software deployments.<\/p>\n<div id=\"attachment_683\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/07\/What-Is-Resource-Discovery.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-683\" class=\"size-medium wp-image-683\" src=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/07\/What-Is-Resource-Discovery-300x200.jpg\" alt=\"Resource discovery is a process through which you can search a network for resources that you can use and manage with Configuration Manager.\" width=\"300\" height=\"200\" srcset=\"\/wp-content\/uploads\/2015\/07\/What-Is-Resource-Discovery-300x200.jpg 300w, \/wp-content\/uploads\/2015\/07\/What-Is-Resource-Discovery.jpg 670w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-683\" class=\"wp-caption-text\">Resource discovery is a process through which you<br \/>can search a network for resources that you can use and manage with Configuration Manager.<\/p><\/div>\n<p><strong>Discovery data records<\/strong><br \/>\nWhen Configuration Manager discovers resources, it creates discovery data records (DDRs) that it submits to the Configuration Manager database. Each generated file has a DDR extension, and the specific information that each record contains varies depending on the resource that Configuration Manager discovered and the discovery method it used. However, records can include data such as the NetBIOS name of a computer, IP address and IP subnet of a computer or device, operating system, and media access control (MAC) address.<br \/>\nThe Discovery Data Manager component loads the discovered data from the DDR file into the site database. Depending on the configuration of the discovery method used, resource DDRs are regenerated periodically to update the discovery data and to verify that each resource is still a valid resource within the Configuration Manager site.<\/p>\n<p><strong>Note<\/strong>: If the primary site is connected to a central administration site, DDR records for<br \/>\nunknown resources are transferred to the central administration site by using file-based<br \/>\nreplication and then entered into the database. Then, Microsoft SQL Server\u00ae database replication replicates the discovery information throughout the hierarchy\u2019s primary sites. However, DDRs for known resources are processed at the primary site and are then replicated to the central administration site by using database replication. After a discovered resource becomes a client of a specific site, the discovery information is no longer replicated between other primary sites throughout the hierarchy.<br \/>\nIf a resource\u2019s discovery data is not updated within a specific amount of time, a site-maintenance task called Delete Aged Discovery Data will remove the resource\u2019s data from the database. This task is, by default, configured to delete data older than 90 days. You can modify this site-maintenance task in the Administration workspace by expanding the Site Configuration node, clicking the Sites node, rightclicking the site name, and then clicking Site Maintenance.<br \/>\n<strong>Overview of Discovery Methods<\/strong><br \/>\nConfiguration Manager provides five configurable methods that you can use to discover network resources. Each of these methods returns a different set of discovered resources. Each of the discovery methods, except Heartbeat Discovery, is disabled by default.<\/p>\n<p>&nbsp;<\/p>\n<div id=\"attachment_682\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/07\/Overview-of-Discovery-Methods.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-682\" class=\"size-medium wp-image-682\" src=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/07\/Overview-of-Discovery-Methods-300x200.jpg\" alt=\"Configuration Manager provides five configurable methods that you can use to discover network resources.\" width=\"300\" height=\"200\" srcset=\"\/wp-content\/uploads\/2015\/07\/Overview-of-Discovery-Methods-300x200.jpg 300w, \/wp-content\/uploads\/2015\/07\/Overview-of-Discovery-Methods.jpg 670w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-682\" class=\"wp-caption-text\">Configuration Manager provides five configurable<br \/>methods that you can use to discover network<br \/>resources.<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/AVIQFy20mt0\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\n&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You can manage computer and user resources within a System Center 2012 R2 Configuration Manager environment only when Configuration Manager has discovered these resources and assigned them to a site. In this post\u00a0, you will learn about boundaries and boundary&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4,8,10,17],"tags":[59,66,67,70,118,135,160],"class_list":["post-679","post","type-post","status-publish","format-standard","hentry","category-computers","category-david-papkin","category-microsoft","category-sccm","category-system-center","tag-configuration-manager","tag-david-mark-papkin","tag-david-papkin","tag-davidpapkin","tag-microsoft-system-center","tag-sccm","tag-system-center-2012"],"_links":{"self":[{"href":"https:\/\/davidpapkin.com\/index.php?rest_route=\/wp\/v2\/posts\/679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/davidpapkin.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davidpapkin.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davidpapkin.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/davidpapkin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=679"}],"version-history":[{"count":0,"href":"https:\/\/davidpapkin.com\/index.php?rest_route=\/wp\/v2\/posts\/679\/revisions"}],"wp:attachment":[{"href":"https:\/\/davidpapkin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davidpapkin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davidpapkin.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}