Consumerisation is a growing challenge for IT organizations. The boundaries between work and life have blurred, and people expect consistent access to corporate services from wherever they are, on any device they’re using—desktops, laptops, smartphones, and tablets. How do you manage this influx of devices while still maintaining the compliance and data protection needs of the enterprise?
Microsoft System Center 2012 Configuration Manager helps you to empower people to use the devices and applications they need to be productive, while maintaining corporate compliance and control. It accomplishes this with a unified infrastructure that gives a single pane of glass to manage physical, virtual, and mobile clients. It also provides tools and improvements that make it easier for IT administrators to do their jobs.
In previous volumes of this series we got our AD and SCCM servers ready, and then we installed System Center 2012 Configuration Manager as a standalone Primary site, we configured the SCCM server further by adding some Windows Server roles necessary for the following Configuration Manager 2012 functionality, Software Update Point (SUP) and Operating System Deployment, we configured the server further by Enabling some Discovery methods and creating Boundary's and Boundary Groups, we configured Client Settings, Added roles and Distributed the Configmgr Client to our Computers within the LAB and now we will enable the Endpoint Protection Role and configure Endpoint Protection settings and we will target All Windows 7 Computers with these settings and policies.