System Center 2012 R2 Lab 2: Infrastructure Monitoring: Hands-On Lab - Step-by-Step Guide
System Center 2012 R2 Lab 2: Infrastructure Monitoring: Hands-On Lab - Step-by-Step Guide
System Center 2012 R2 Lab 2: Infrastructure Monitoring: Hands-On Lab - Step-by-Step Guide
Lab 2: Infrastructure
Monitoring
Version: 1.5.5
Last updated: March 28, 2014
Please share any feedback with the IT Camps Planning Team:
[email protected]
Copyright © 2014 by Microsoft Corporation. All rights reserved.
2 - Infrastructure Monitoring
160 minutes optional (2:40 total)
1. SCOM, SCDPM & SCCM: Infrastructure Monitoring Components (35 mins)
2. SCOM & SCCM: Explore Infrastructure Monitoring (35 mins)
3. SCOM: Create a Dashboard (10 mins)
4. SCDPM: Backup the Infrastructure (20 mins)
5. SCDPM: Recover the Infrastructure (10 mins)
6. SCCM: Secure the Datacenter (50 mins)
2.1 - SCOM, SCDPM & SCCM: Infrastructure Monitoring
Components
1. From SCOM01, open the Operations Manager Console by clicking the icon in the taskbar.
10. This workspace is used to create new monitoring scenarios. Existing management packs can be
added or changed or new management packs can be created for applications that do not have
one.
11. Click Management Pack Templates. Management packs contain settings that enable agents to
monitor a specific service or application in System Center 2012 – Operations Manager. These
settings include discovery information that allows management servers to automatically detect
and begin monitoring objects, a knowledge base that contains error and troubleshooting
information, rules and monitors that generate alerts, and reports. Management packs might also
contain tasks, diagnostics, and recovery tools and guidance to help fix problems.
12. Click Groups. In System Center 2012 – Operations Manager groups can be used to scope views,
reports, overrides, and alert notifications. Groups are created in the Authoring workspace in the
Operations console.
13. Click the Reporting workspace.
14. Operations Manager provides extensive reporting capabilities, including multiple report libraries
that can be selected to customize reports for specific requirements. Reports perform a query
against the data warehouse database and return the results in an easy-to-read format.
15. Click SQL Server 2012 (Monitoring). This view is used to open and schedule reports for various
SQL Server tasks.
16. Click the Administration workspace.
17. The Administration workspace is the primary workspace for administrators. The workspace is
used to configure a management group and its managed objects. There are several different
options available on this workspace.
18. Expand Device Management. Device management is used to perform configuration of specific
management servers, agent-managed computers, agentless-managed computers, UNIX servers,
and Linux servers.
19. Click Agent Managed. Various tasks can be performed on agent-managed computer, these
include repairing or uninstalling an agent on a target computer.
20. Click Agentless Managed. An agentless managed machine is a Microsoft Windows-based system
in which an agent cannot be installed can be managed without an agent. Not all management
packs support agentless management, for example the Active Directory management pack and
the Microsoft Exchange Server 2003 management pack do not support agentless management.
21. Click Management Packs. This is a listing of all the management packs imported into the
management group. Right-clicking an individual management pack in the results gives additional
options such as viewing its properties, deleting the pack, or exporting any customizations to
another management group. Links in the tasks pane are used to create, import, and download
management packs.
22. Click Product Connectors. Product connectors are used to synchronize Operations Manager data
with other management systems such as those that monitor non-Windows computers or create
trouble-tickets. Product connectors can integrate a deployment of Operations Manager into
another management platform or connect other management systems into a full Operations
Manager management solution. Any product connectors that the user integrate with Operations
Manager will be displayed in this section of the Administration workspace.
23. Expand Security and click User Roles. In Operations Manager, operations such as resolving alerts,
running tasks, overriding monitors, viewing alerts, viewing events, and so on have been grouped
into user roles, with each user role representing a particular job function. Role-based security
allows administrators to limit privileges that users have for various aspects of Operations
Manager.
24. Expand System Center Advisor, click Advisor Connection. System Center Advisor is an online
service that analyzes installations of Microsoft SQL Server 2008 (and later versions), and Windows
Server 2008 and 2008 R2, and Lync Server 2010. Advisor collects data from the installations,
analyzes it, and generates Alerts that identify potential issues (such as missing security patches)
or deviations from identified best practices with regard to configuration and usage. Advisor also
provides both current and historical views of the configuration of servers in an environment.
25. Click the My Workspace workspace. This workspace provides an area that can be customized for
specific needs. Users can create folders to organize the workspace, add shortcuts to favorite
views, save useful searches, and create views.
2.1.2 - SCDPM: Introduction to Data Protection Manager
In this exercise the user will learn about the different workspaces and functions of System Center
2012 R2 Data Protection Manager, including Monitoring, Protection, Recovery, Reporting, and
Management.
1. From SCDPM01, open the DPM Administrator Console by clicking the icon in the taskbar.
2. Navigate to the Monitoring workspace.
3. This workspace allows the user to monitor the status of data protection, data recovery, and other
DPM operations. There are two tabs in this workspace, Alerts and Jobs. Click All Alerts.
4. Alerts display errors, warnings, and informational messages. The user can group alerts by
protection group, computer, or severity, and the user can choose to display active alerts
exclusively or to display both active alerts and a history of inactive alerts. The user can also
subscribe to notifications to receive alerts via e-mail.
5. Click All jobs. All jobs displays the status of all the DPM jobs and their associated tasks. The user
can group jobs by protection group, computer, status, or type, and the user can filter jobs by time
period. The user can choose whether to include regularly scheduled synchronization operations in
the list of jobs.
6. Click the Protection workspace then click All Protection Groups.
7. The protection workspace allows the user to create, rename and manage members of protection
groups. As well as manage protection schedules, disk allocations, and other options. The user also
has the ability to run manual synchronization and consistency check jobs, manage recovery points
and review and respond to results of Auto Discovery.
8. Click the Recovery workspace expand Search Recovery Points then click Files and folders.
9. The recovery workspace is used to find and recover data from recovery points. It contains a
browse tab which allows the user to browse for available recovery points for each protected
computer in an environment as well as a search tab which allows for searching of available
recovery points based on data type, location, origin or recovery point date.
10. Click the Reporting workspace.
11. This workspace allows users to generate and view reports on DPM operations. The user can also
schedule automatic report generation and manage reporting services settings.
12. Click the Management workspace then click Agents.
13. Use this workspace to manage protection agents, storage pool disks, and tape libraries. The
Agents tab displays a list of protection agents deployed on computers and enables the user to
install, uninstall, and update the agents and agent licenses. The Disks tab displays a list of disks
included in the storage pool and enables the user to add and remove disks from the pool. The
Libraries tab displays the tape libraries installed on the DPM server and enables the user to
manage the tapes in the library.
1. From SCCM01, open the Configuration Manager Console by clicking the icon in the taskbar.
7. Go to User Collections. Here collections based on users and user groups can be managed. There
are three built-in user collections.
8. Click on Device Collections. This is used to manage collection based on system information. There
are four built-in device collections (and this lab environment has custom device collections).
9. Navigate to User State Migration. State Migration is used to manage the migration of user state
between computers, including defining computer associations.
10. Click on Asset Intelligence. This is used to manage software assets with the Asset Intelligence
feature, including a dashboard of Asset Intelligence statistics and status, inventoried software,
catalog customizations, and hardware requirements.
11. Click on Software Metering which is used to configure rules for monitoring the usage of software.
12. Click on Compliance Settings which is used to manage compliance using the compliance and
settings management feature.
13. Navigate to Endpoint Protection, and expand the node. Endpoint Protection is used to configure
and deploy antimalware and Windows firewall policies to collections of clients.
14. Click on Antimalware Policies. Antimalware policies can be deployed to collections of
Microsoft System Center 2012 Configuration Manager client computers to specify how
Endpoint Protection protects them from malware and other threats. These antimalware policies
include information about the scan schedule, the types of files and folders to scan, and the actions
to take when malware is detected. When you enable Endpoint Protection, a default antimalware
policy is applied to client computers. You can also use additional policy templates that are
supplied or create your own custom antimalware policies to meet the specific needs of your
environment.
15. Click Windows Firewall Policies. Firewall policies for Endpoint Protection in System Center 2012
Configuration Manager let you perform basic Windows Firewall configuration and maintenance
tasks on client computers in your hierarchy. You can use Windows Firewall policies to control
whether Windows Firewall is on or off, to control whether incoming connections are allows to
client computers and to control whether users are notified when Windows Firewall blocks a new
program.
16. Navigate to the Software Library workspace. The Software Library workspace Overview page
appears. Notice that the Software Library Overview page displays options similar to those of the
Assets and Compliance Overview page, including nodes in the navigation page in a "Navigation
Index" section. You will also notice that the Overview page includes a section for Recent Alerts.
These are alerts generated when application or software update deployments are below the
administrator configured threshold for success, as well as when synchronization of the software
update point site system fails.
17. Click on Application Management and expand the node. This area is used to manage software
deployments to users and clients, including applications and packages/programs, approving
application requests from users, managing global conditions, configuring App-V Virtual
Environments and deploying Windows Sideloading Keys for Windows 8 Apps. Also included here
are alerts for deployments that are below the configured threshold for success, as well as alerts
for any deployments that experience a failure rate of a designated percentage.
18. Select Applications to view applications that are available for client deployment to managed
clients.
19. Navigate to Software Updates and expand the node. Software Updates are used to manage
aspects of software update deployment to clients, including update metadata, software update
groups, software update deployment packages, and automatic deployment rules. Also included
here are alerts for deployments that are below the configured threshold for success as well as any
failed synchronization attempts (which you see in this lab environment).
20. Select All Software Updates and browse some updates and review the details pane.
21. Select Operating Systems and expand the node. All aspects of operating system deployment to
systems, including drivers, driver packages, operating system images, operating system installers,
boot images, Hyper-V virtual hard disks (VHDs), and task sequences can be managed here.
22. Select the Drivers node and review the drivers that are available for deployment.
23. Select the Operating System Images node and node the server and client OS that is available for
deployment.
24. Select the Task Sequences node. This shows a collection of tasks used to deploy an operating
system or a virtual hard disks.
25. Navigate to the Monitoring workspace and click on it. The Monitoring workspace Overview page
appears. Notice that the Monitoring Overview page displays options similar to those of the other
workspace's Overview pages, including nodes in the navigation page in a "Navigation Index"
section. You will also notice that the Overview page includes a section for Recent Alerts. An
example of an alert displayed here would be when the database replication between two sites in
a hierarchy has been determined to be down due to link issues (as you may see depending on if
images for both site servers are available and started). Other nodes in the console, including
other workspaces, can also display alerts.
26. Expand the Alerts folder. These alerts (Active Alerts and All Alerts) are used to manage alerts
generated in the environment. By associating them with a Subscription, they can be configured to
automatically email or notify an administrator.
27. Click on Queries. This area is used to manage queries, both built-in and custom.
28. Expand the Reporting folder, and select the Reports node. This is used to display results of built-
in or custom reports (using SQL Server Reporting Services) and configure report subscriptions.
29. Next click on Site Hierarchy. This is used to display a ‘map’ of the site hierarchy, including central
administration site, primary sites, and any secondary sites. This lab environment uses a single
site.
30. Expand the System Status folder. Browse through the options: Site Status, Component Status,
Conflicting Records, and Status Message Queries.
31. Click on Deployments. This is used to monitor all deployments of applications, packages and
programs, software updates, operating system images, and configuration baselines.
32. Click on Client Operations. This area is used to monitor all ‘real-time actions’ initiated from the
Configuration Manager Console to clients (System Center 2012 SP1 and later), such as computer
policy retrievals and Endpoint Protection actions.
33. Expand the Client Status folder. Both Client Activity and Client Check are used to monitor the
health and activity of Configuration Manager clients in the site and hierarchy.
34. Next, click Database Replication. This is used to monitor the status of the replication of
Configuration Manager data between sites using SQL-based database replication.
35. Expand the Distribution Status folder. Click on the node and note that these are used to monitor
content distribution status, distribution point group status, and distribution point health.
36. Click Software Update Point Synchronization Status. This is used to monitor the status of
software update catalog synchronizations.
37. Expand Endpoint Protection Status. These two dashboards provide a quick view into the 'health'
of the site's clients in terms of any malware activities.
38. Click System Center 2012 R2 Endpoint Protection. A dashboard containing the a summary of the
security state of the collection is displayed.
39. Click Malware Detected. Any malware detected by System Center Endpoint Protection will be
displayed here.
40. Navigate to the Administration workspace. The Administration workspace Overview page
appears. Notice that the Administration Overview page displays options similar to those of the
other workspace's Overview pages, including nodes in the navigation page in a "Navigation Index"
section.
41. On the Ribbon, click the drop-down arrow above "All Objects" . A new menu appears displaying
options for the Configuration Manager console. These options include connecting to a different
Configuration Manager site, connect via Windows PowerShell (to get access to the PowerShell
provider to run cmdlets against Configuration Manager), get information about the Configuration
Manager version, access product documentation (which is all web-based), configure integration
with the Customer Experience Improvement Program, and closing the console.
42. Close the drop down menu by clicking away from it.
43. From the navigation pane expand Site Configuration.
44. Click Sites. The sites in the hierarchy from the local site database (the local site and any child
sites) appear in the results pane. Notice that there is only one site displayed for this portion of
the hierarchy, and that is the local site.
45. In the navigation pane, click Servers and Site System Roles. The site systems and installed roles
for the site appear in the results pane. Here the primary site SCCM01.contoso.com is displayed.
46. In the results pane, select \\SCCM01.contoso.com and expand the details pane. This site system
roles installed for the select site are displayed.
47. In the navigation pane, select Client Settings. This displays user and device settings that can be
saved as templates and applied to an individual user or a group.
48. Select Default Client Settings, then click Properties from the upper ribbon.
49. Browse the different tabs of the Default Settings, then click Cancel.
50. Expand the Security Tab and select Security Roles. Browse the different types of user roles that
can interact with Configuration Manager.
51. In the navigation pane, click Distribution Points. Configuration Manager uses distribution points
to store files that are required for software to run on client computers. These distribution points
function as distribution centers for the content files and let users download and run the software.
Clients must have access to at least one distribution point from which they can download the files.
1. From SCVMM01, open the Virtual Machine Manager Console by clicking the icon in the taskbar.
If a prompt to Connect to Server appears, keep the default options and click Connect.
5. When the Operations Manager Settings appear, under Diagnostics select Refresh.
6. Click OK to close the Operations Manager Settings.
7. From SCOM01, open the Operations Manager Console by clicking the icon in the taskbar
12. From the Monitoring pane, expand Microsoft System Center Virtual Machine Manager, expand
Agents and select Health State. This dashboard shows the state of the various Hyper-V hosts and
other infrastructure servers that VMM manages.
13. From the Monitoring workspace, expand Cloud Health Dashboard and select Cloud Health.
When the dashboard loads, select Contoso-Cloud and view the details. If it does not immediately
appear, click Refresh as it may take some time for the cloud to be automatically detected, and
continue to the next step.
14. From the Monitoring pane, expand Managed Resources. Select Host Cluster Health.
15. When the dashboard loads, select Cluster-Hyper-V and review the details.
16. Select Host Health. Select SCVMM01 and review the details. If no information is visible, refresh
the group. The information may differ from the screenshot below, depending on the state of the
lab.
17. Select Library Server Health and review the details.
18. Select Virtual Machine Manager Server Health and review the details.
19. From the Monitoring Pane, expand Performance. Select Host Performance. Under Legend, click
the column named Counter so it sorts by the counter column alphabetically.
20. In the Counter column, find Disk Read Bytes/Sec and ensure the object column is Logical Disk.
21. Click the check box for any host which displays a value for Disk Read Bytes/Sec . Note the chart
that is created.
22. From the Monitoring Pane, expand Microsoft System Center Virtual Machine Manager Views
and select Diagram View for SCVMM01.
23. When the diagram loads, click on the + by VMM Infrastructure to expand the node.
24. Expand Agent Watchers by clicking the +, note that SCVMM01 is managing these four servers.
Click the - next to Agent Watches to minimize the node.
25. Expand SCVMM01.contoso.com by click the +. The zoom can be adjusted on the toolbar if a view
adjustment is needed.
26. Scroll to the left and expand DC01.contoso.com by clicking the +
27. Expand the node with a GUID as a name by clicking the +, this will open a node with multiple
iSCSITargets which have been made available through that network adapter. Click the - next to
DC01.contoso.com to compress the node.
28. Scroll to the right and click the VirtualManagerDB. This is the virtual machine manager database
that has been previously created.
29. Scroll to the right and click the node titled VMMLibrary. This is the network share.
30. Scroll the far right and click on Windows Server 2012. Note that this is an offline VMware virtual
machine which is stored in the VMM library.
31. From the Monitoring Pane, expand Microsoft Windows Server and select Operating System
Performance. Under Legend, click Rule to sort the column alphabetically.
32. In the Rule column, find the Memory Available Megabytes Windows Server 2012 R2 entries and
check SCVMM01.contoso.com, DC01.contoso.com and SCOM01.contoso.com. Review the data
and then clear the checkboxes.
33. In the Rule column, find the Memory Pages Per Second Windows Server 2012 R2 entries and
check SCVMM01.contoso.com, DC01.contoso.com and SCOM01.contoso.com. Review the data
and then clear the checkboxes.
34. In the Rule column, find the Percent Memory Used entries and check SCVMM01.contoso.com,
DC01.contoso.com and SCOM01.contoso.com. Review the data and then clear the checkboxes.
35. In the Rule column, find the Processor Information % Processor Time Total Windows Server
2012 R2 entries and check SCVMM01.contoso.com, DC01.contoso.com and
SCOM01.contoso.com. Review the data and then clear the checkboxes.
36. In the Monitoring Pane, under Microsoft Windows Server, expand Health Monitoring and select
Disk Health and review the information.
37. In the Monitoring Pane, under Microsoft Windows Server, expand Health Monitoring and select
Network Adapter Health and review the information.
38. In the Monitoring Pane, under Microsoft Windows Server, expand Health Monitoring, expand
Operating System Events and select Services or Drivers Failing to Start and review the
information.
39. In the Monitoring Pane, under Microsoft Windows Server, expand Health Monitoring, expand
Operating System Events and select Unexpected Service Terminations and review the
information.
40. In the Monitoring Pane, expand Operations Manager and review the Active Alerts. Below
Operations Manager, select the Management Group Diagram node. Adjust the zoom so all the
information in the diagram is viewable.
41. Click the Data Access Service node and expand it by clicking +, review the node and then
minimize the Data Access Service node.
42. Expand Databases by clicking the +. Expand Data Warehouse by clicking the + and notice the
operations Data Warehouse manager has a relationship with SC0M01.contoso.com, as indicated
by the blue arrow. Minimize the node by clicking the - next to Data Warehouse.
43. Under Databases, expand Operations Database by clicking the +, and click the + next to All
Management Servers Resource Pool DB Watcher to expand the node.
44. With the All Management Servers Resource Pool DB Watcher node selected, click Health
Explorer from the right pane and review the information about the alerts by looking at the
Knowledge and State Change Event tabs. Close the window and minimize the Database node.
45. Expand Infrastructure Group by clicking the +. These are different roles within the operation
manager infrastructure.
46. On the far right, click on the + to expand the Web User Interfaces and note the different
operation manager web consoles that are also being monitored.
47. In the Monitoring Pane, expand Operations Manager and select Management Group Health and
review this pre-configured dashboard.
48. In the Monitoring Pane, expand Operations Manager and select Management Group Health
Trend and review the alerts that have recently appeared.
43. Feel free to browse some of the other infrastructure monitoring views. This lab includes views
that do not contain any data, as not all infrastructure components are deployed within this lab.
Other infrastructure views include:
a. App Controller
b. Data Warehouse
c. Microsoft Application Virtualization Server 5.0
d. Microsoft Message Queue 6.3
e. Microsoft Network Load Balancing
f. Microsoft Windows Internet Information Services
g. Microsoft Windows Server DHCP
h. Microsoft Windows Server DNS
i. Microsoft Windows Server File & iSCSI Services 2012
j. Microsoft Windows Server File Services
k. Microsoft Windows Server Update Services 2012 R2
l. Microsoft Windows Server Network Monitoring
m. Operations Manager
n. Service Manager
o. Service Provider Foundation
p. Synesthetic Transactions
q. System Center 2012 Configuration Manager
r. System Center 2012 R2 Data Protection Manager
s. System Center Orchestrator
t. UNIX/Linux Computers
u. Windows Azure Pack Monitoring
v. WS-Management and SMASH Monitoring
1. From SCOM01, open the Operations Manager Console by clicking the icon in the taskbar.
2. Navigate to the Monitoring workspace.
3. Browse to Veeam for VMware | _All Active Alerts.
6. In the Results pane, scroll down and expand Production Datacenter by clicking the “+” icon.
14. Review the results pane to see properties of the different VMs.
15. Click VMs by Guest OS.
17. Right-click in the chart area and click Select Time Range.
18. Ensure that the range is set to the last 1 Hours and click OK.
19. In the Legend, add and remove counters to view performance data.
2.2.3 - SCCM: Manage Reports
In this exercise Configuration Manager reports will be reviewed using the web-based Report
Manager. Reports can be scheduled, emailed or viewed on-demand through the website.
Viewing these reports is not required for any other exercises, so feel free to skip ones that are
not interesting.
1. From SCCM01, open the Configuration Manager Console by clicking the icon in the taskbar.
2. Navigate to the Monitoring workspace.
3. Expand Reporting and select Reports. This shows all the available reports from the Configuration
Manager Console.
4. Launch Internet Explorer and navigate to http://SCCM01/Reports. This is the Reports homepage.
5. Click the folder titled ConfigMgr_HQ1.
6. On the right hand side select the button called Details View. This organizes the display in a list
order. Feel free to adjust any future pages to this view.
7. Double-click on ConfigMgr_HQ1.
8. Open Asset Intelligence and click Hardware 01A - Summary of computers in a specific collection.
9. At the top of the page next to Collection click the drop down menu and select Contoso
Datacenter. Click View Report. This report includes basic inventory information for all of the
servers in the collection.
10. Return to ConfigMgr_HQ1 and click Compliance and Settings Management. Review the list of
reports that are available.
11. Return to ConfigMgr_HQ1 and click Device Management. Review the list of reports that are
available.
12. Return to ConfigMgr_HQ1 and click Hardware - Disk then run Count physical disk configurations.
This report shows the different sizes and quantities of disks throughout the organization.
13. Select the link for 102398 (1GB with a count of 15). This page displays all of the computers with a
disk of 1GB.
14. Return to Hardware - Disk and click Disk Information for a specific computer - Logical disks.
15. After Computer Name enter: DC01 then in the upper right corner click View Report. This will
show information about the different disks on this particular server.
16. Return to ConfigMgr_HQ1, click Hardware - General and then select Computer information for a
specific computer.
17. After Computer Name enter SCOM01 then click View Report. Review the information about this
particular server.
18. Return to ConfigMgr_HQ1 and click Network then select IP - Computers in a specific subnet.
19. Click the drop down next to IP Subnet and select 10.0.0.0 then click View Report. This report
shows the list of all the different network adapters within this particular subnet.
20. Return to ConfigMgr_HQ1 and click Operating System. Select Services - Computers running a
specific service.
21. Click the drop down next to NT Service Name and select Microsoft iSCSI Initiator Service then
click View Report. This displays all the computers running the iSCSI Initiator Service which allows
them to connect to remote iSCSI storage.
22. Return to the Operating System page and select Windows Server computers.
23. Click the drop down next to Collection and select Contoso Datacenter then click View Report.
This displays all the information about the Windows Server computers within this organizational
unit.
24. Return to ConfigMgr_HQ1 and click Software Distribution - Application Monitoring then select
All application deployments (advanced).
25. Return to ConfigMgr_HQ1 and click Software Distribution - Content then select All content.
Review the content which is available for distribution by Configuration Manager.
26. Return to ConfigMgr_HQ1 and click Software Updates - A Compliance then select Compliance 2 -
Specific software update.
27. For Collection click the drop down and select: HQ10000C - Contoso Datacenter, then click View
Report. This displays a list of software updates which have been deployed in the data center.
Note the column for % Compliant which shows how many of the servers meet the criteria for
compliance.
28. Return to ConfigMgr_HQ1 and click User - Device Affinity then select User device affinity
associations per collection.
29. For Collection Type select User for Collection select All users and users groups then click View
Report. This shows which devices have met the criteria for User Device Affinity.
30. From the upper left corner for Collection Type click Device. Under collection select Contoso
Datacenter. Click View Report. This shows who has accessed each of the different servers in the
data center.
31. Close Internet Explorer.
1. From SCOM01, open the Operations Manager Console by clicking the icon in the taskbar.
3. Right-click on the top Monitoring node then select New | Dashboard View.
4. In the right-hand list of templates select Grid Layout and then click Next.
5. On the General Properties page in the Name filed, enter the text My Dashboard View and click
Next.
6. On the Specify the layout of the dashboard page, In the combo box at the top of the layout page
select 3 cells from the dropdown list.
7. In the layout template display select the first option (top left) which has two small panels above a
wider panel. With that template selected, click Next.
8. Click Create to register and load the new dashboard template.
9. When complete, click Close to close the wizard.
1. From SCOM01, open the Operations Manager Console by clicking the icon in the taskbar.
3. Expand Monitoring and click My Dashboard View then click the Click to add widget… link in the
center of the upper left panel, which opens the New Dashboard and Widget Wizard.
4. In the right hand panel of the wizard, select the State Widget and then click the Next button.
5. In the Name text box enter the text SQL Server State and click the Next button.
6. In the Specify the Scope page, click the blue plus (+) Add button above the list box.
7. In the Add Groups or Objects window, type SQL in the Enter text to filter the list of groups
textbox.
8. Select SQL Computers, and click the Add button to copy that group to the Selected Items.
9. Click OK.
10. After returning to the New Dashboard and Widget Wizard, select Next.
11. On the Specify the Criteria page, click Next.
12. On the Specify Display Preferences page, under the Columns to display heading check the Icon
and Maintenance Mode checkboxes.
17. Using the Operations Manager Console click the Click to add widget… link in the center of the
upper right panel, which opens the New Dashboard and Widget Wizard.
18. In the right hand panel of the wizard, select the Alert Widget and then click the Next button.
19. In the Name text box enter the text All Alerts.
28. On the Specify the scope and Counters page, click the ellipsis (...) button.
29. In the Select a group or object page, type SQL in the text box.
30. Select SQL Computers and click OK.
31. On the Specify Scope and Counters page, click the Add button.
32. In the Object dropdown, click SQLSERVER:General Statistics.
33. In the Available Items pane select UserConnections (All) and Logins/sec (All) and click Add.
34. Click OK.
35. Click Next.
36. On the Time Range page, change the value to 72 Hours and click Next.
37. On the Specify the Chart Preferences page, click Performance Counter and click Next.
38. Click Create.
39. When it completes, click Close.
40. In the Monitoring tree, right-click My Dashboard View and click Add to My Workspace. If an
error message appears, close the Operations Manager Console, then open it again and repeat
this step.
2. After the dashboard loads, select Manage | Add Roles and Features.
16. On the Select protection group type screen, select Servers and click Next.
17. Expand Cluster-HyperV (Cluster), then expand SCVMM VM01 Resources, and Hyper-V. This may
take a minute. The virtual machine VM01 should be placed on Cluster-HyperV.
18. Expand SCOM01, then expand HyperV. This may take a minute.
19. Select the checkboxes for Host Component and Offline\VM01. This will backup both the newly
created VM and the host configuration. Click Next.
20. On the Select Data Protection Method page, in the Protection group name field, enter Hyper-V
Protection Group, then click Next.
21. On the Specify Short-Term Goals screen, keep the default settings and click Next.
22. On the Review Disk Allocation screen, keep the default settings and click Next.
23. On the Choose Replica Creation Method screen, keep the default settings and click Next.
24. On the Consistency check options screen, deselect the checkbox for Run a consistency check if a
replica becomes inconsistent, and click Next.
1. From SCDPM01, open the DPM Administrator Console by clicking the icon in the taskbar.
14. On the Select Short-Term Goals screen, review the settings then click Next.
15. If an Optimize Performance window appears, close the Optimize Performance window by
selecting Cancel. Click Next.
16. On the Review disk allocation, deselect Automatically grow the volumes, then click Next. The
disk size information may be different from the screenshot below.
17. On the Choose Replica Creation Method screen, ensure that Automatically over the network
and Now is selected, then click Next.
18. Click Next on the Choose consistency check options screen.
19. Click Create Group and wait until the tasks complete.
20. Click Close to close the wizard. This process will take several minutes to complete. Move on to
the next exercise while this completes.
1. From SCDPM01, open the DPM Administrator Console by clicking the icon in the taskbar.
3. From the left navigation pane, expand Recoverable Data | Contoso.com | SCOM01 | All
Protected HyperV Data | Host Component.
6. In the Recovery Wizard, on the Review Recovery Selection screen, click Next.
7. On the Select Recovery Type screen, select Recover to original instance, then click Next.
8. The Specify Recovery Options screen, under Network bandwidth usage throttling, click Modify.
9. On the Throttle screen, select the checkbox for Enable network bandwidth usage throttling,
then click OK.
10. On the Recovery Wizard screen, click Next.
11. On the Summary screen, click Recover.
12. Wait a few minutes until the progress bar completes, then on the Recovery Status tab, ensure
that the status shows as Successful.
Exercise 3.4.2 - SCDPM: Backup System Center Infrastructure should be completed in order to
successful recover the System Center information.
3. Under Protection Group: System Center Protection Group verify that the status displays OK. If
the status indicates that the replica is still being created, wait until it finishes.
4. Select to the Recovery workspace.
5. From the left navigation pane, expand Recoverable Data | Contoso.com | SCOM01 | All
Protected SQL Instances | SCOM01 | ReportServerTempDB.
6. In the lower-center pane, select the ReportServerTempDB item.
8. In the Recovery Wizard page, confirm the settings and click Next.
9. On the Select Recovery Type screen, select Recover to original instance of SQL Server (Overwrite
database), then click Next.
10. On the Specify Database State screen, select Leave database operational, then click Next.
11. On the Specify Recovery Options screen, leave the default options, then click Next.
12. On the Summary screen, click Recover.
13. Wait a few minutes until the progress bar completes, then on the Recovery Status tab, ensure
that the status shows as Successful.
14. Click Close to complete the Wizard.
15. Select to the Recovery workspace.
16. Navigate to Recoverable Data | contoso.com | SCOM01 | All Protected SQL Instances | SCOM01
| ReportServerTempDB.
17. In the details pane, under Recoverable Item select ReportServerTempDB.
19. In the Recovery Wizard, on the Review Recovery Selection screen, click Next.
20. On the Select Recovery Type screen, select Recover to original instance of SQL Server (Overwrite
database), then click Next.
21. On the Specify Database State screen, select Leave database operational, then click Next.
22. On the Specify Recovery Options screen, leave the default options, then click Next.
23. On the Summary screen, click Recover.
24. Wait a few minutes until the progress bar completes, then on the Recovery Status tab, ensure
that the status shows as Successful.
25. Select to the Recovery workspace.
26. From the left navigation pane, expand Recoverable Data | Contoso.com | SCVMM01 | All
Protected Shares | MSSCVMMLibrary.
29. In the Recovery Wizard on the Review Recovery Selection screen, ensure that VHDs is selected,
then click Next.
30. On the Select Recovery Type screen, select Recover to original location, then click Next.
31. On the Specify Recovery Options screen, under Existing version recovery behavior, change the
selection to Skip, then click Next.
32. On the Summary screen, click Recover.
33. Wait a few minutes until the progress bar completes, then on the Recovery Status tab, ensure
that the status shows as Successful.
1. From SCCM01, open the Configuration Manager Console by clicking the icon in the taskbar.
5. When the results appear, select all of the updates except the update for SQL Server 2000. There
will be 7 updates in this group.
6. Right-click the selected updates and select Create Software Update Group.
7. In the Create Software Update Group dialog box, enter SQL Server 2012 Updates in the Name
field and click Create. This will organize the selected updates as a logical group. This will take a
minute to complete.
10. From the upper ribbon, click Show Members. This view will now show all of the SQL Server 2012
updates.
11. Sort the updates by title by clicking on the title column.
12. Select the first update, Microsoft SQL Server 2012 Service Pack 1 (KB2674319) and note the
details in the preview. If the preview pane is not visible, click the arrow in the lower right corner
to display the details.
13. Select the last update, Update Rollup for SQL Server 2012 Service Pack 1 (KB2793634) and note
that the servers are not compliant, as the update is required on 6 servers.
14. From the navigation pane, right-click SQL Server 2012 Updates and select Deploy. This will open
the Deploy Software Updates Wizard.
1. From SCCM01, open the Configuration Manager Console by clicking the icon in the taskbar.
2. Navigate to the Assets and Compliance workspace.
5. On the General page, enter System Center SQL Configuration in the Name field.
6. Under Assigned categories to improve searching and filtering, click Categories. Select IT
Infrastructure and Server. Click OK.
7. After returning to the General page, click Next.
8. On the Supported Platforms page, unselect everything by unchecking the Select all box. Select
Windows 2008, Windows Server 2012 and Windows Server 2012 R2.
9. Click Next.
10. On the Settings page, click New. In the Name field, enter SQL Server Version Minimum. Under
Description, enter Requires version 11.0 or later.
11. Under Hive Name, select Browse. On the Browse Registry window, expand
HKEY_LOCAL_MACHINE | Software | Microsoft | MSSQLSERVER | MSSQLSERVER and select
Current Version. Note the Registry Value shows the current version of 11 or better.
22. From the upper ribbon, select Create | Create Configuration Baseline.
23. In the Name field, enter System Center SQL Baseline. Under Configuration data, click Add.
Select Configuration Items from the dropdown.
25. Select System Center SQL Configuration, then click Add. Click OK.
26. On the Create Configuration Baseline page, click Add and click Software Updates.
27. Under Look for, enter SQL and click Find Now.
28. Select all of the updates, except for the first one (Update for SQL Server 2000) and then click OK.
29. Select Categories. On the Manage Administrative Categories page, select IT Infrastructure and
Server and click OK.
30. After returning to the Create Configuration Baseline page, click OK.
31. After returning to the Assets and Compliance workspace, in the Search bar enter SQL then click
Search.
32. Select the newly created baseline, System Center SQL Baseline. Right-click it and select Show
Members. This will create a new node under Configuration Baselines.
33. Right-click the System Center SQL Baseline node in the navigation pane and click Deploy.
34. On the Deploy Configuration Baselines page, Select Remediate noncompliant rules when
supported, Generate an alert, and Generate System Center Operations Manager Alert.
35. After Collection, click Browse.
36. Select the dropdown and change it to Device Collections. Select Contoso Datacenter.
37. Click OK to return to the Deploy Configuration Baselines page.
41. Select the Profile Settings tab, then for the Full name and port of the Remote Desktop Gateway
Server field enter ContosoRD.contoso.com:8080.
42. Click OK.
43. From the Remote Connections Profile view, click Contoso Remote Connections and from the
upper ribbon, click Deploy.
44. Under Collection, click Browse and select All Systems. Click OK.
45. Select the checkbox for Remediate noncompliant rules when supported.
46. Click OK to deploy the profile.
47. Select the Monitoring workspace and select Deployments.
48. Select System Center SQL Baseline and Contoso Remote Connections and from the upper ribbon,
select Run Summarization.
49. Click OK on the prompt. This will take several minutes to complete, so move on to the next
exercise.
2.6.4 - SCCM: Deploy Endpoint Protection Client
In this exercise the Endpoint Protection Client will be imported into Configuration Manager,
then deployed to different servers in the datacenter.
1. From SCCM01, open the Configuration Manager Console by clicking the icon in the taskbar.
61. Navigate to the Monitoring workspace, select Deployments and select System Center Endpoint
Protection.
62. Expand the view in the Information pane by clicking the dropdown arrow on the right.
63. In the Navigation pane expand Endpoint Protection Status and select System Center 2012 R2
Endpoint Protection. Review the information on this page. The Configuration Manager agent
includes the Endpoint Protection agent and is already installed on many of the computers in this
lab environment which is why they may be reporting some information.
1. From SCCM01, open the Configuration Manager Console by clicking the icon in the taskbar.
2. Navigate to the Assets and Compliance workspace.