Desired Configuration Management in SCCM 2007

Desired Configuration Management (DCM) in System Center Configuration Manager (SCCM) 2007 gives you the capability to determine whether your managed systems are compliant or not with configuration settings that are important to your organization.  Examples of configuration settings are whether a group of systems have the correct version of an application installed, whether an application on a group of systems is configured according to your defined settings, and whether specific systems are compliant with software updates or your specified security settings.

You tell SCCM what you want to check on client systems to be evaluated for compliance by creating configuration items.  A configuration item is a unit of configuration to be assessed for compliance.  A configuration item can contain one or more elements together with the criteria for their evaluation, such as the value of a registry parameter, the existence of a file, or the value of a setting in WMI.  For example, the following configuration item contains two settings.

Configuration items are then added to configuration baselines.  A configuration baseline is what you assign to a collection for evaluation.  One of the configuration settings of a baseline is to choose configuration items to be added to it, as illustrated below.

The systems in the targeted collection evaluate the settings in the configuration items of the baseline and report compliance to SCCM.  SCCM has many built-in DCM reports that you can use to find the compliance status of your systems.

Creating a configuration item may be a time consuming task, depending on the complexity of it.  This process is called authoring configuration data.  Configuration data is a DCM Digest XML file or a Service Modeling Language file.  However, SCCM provides a user-friendly interface for you to create the configuration items and baselines.  If your organization is not able to allocate resources to develop configuration items, you might be able to find configuration packs with configuration baselines and configuration items that meet your business needs.  Some configuration packs are free from Microsoft, and others you can purchase from vendors.  You can browse available configuration packs from the link below.

Configuration Packs at the Microsoft System Center Marketplace

The main function of DCM in SCCM 2007 is to report compliance on settings that are important to you.  However, it is possible to remediate non-compliant systems by developing scripts that you would run on non-compliant systems using SCCM software distribution.  In SCCM 2012, Microsoft automates the remediation of some types of configuration settings.

Share:

Facebook
Twitter
LinkedIn

Contact Us

On Key

More Posts

Mastering Azure AD Connect - A Comprehensive Guide by WME
Active Directory

Mastering Azure AD Connect – A Comprehensive Guide

Modern businesses are fast moving toward cloud-based infrastructure. In fact, cloud-based business is not just a trend anymore but a strategic necessity. Microsoft’s Azure Active Directory (Azure AD) has become a frontrunner in this domain. It

Read More »
Security Best Practices in SharePoint
Office 365

Security Best Practices in SharePoint

Microsoft SharePoint is an online collaboration platform that integrates with Microsoft Office. You can use it to store, organize, share, and access information online. SharePoint enables collaboration and content management and ultimately allows your teams to

Read More »
The Ultimate Guide to Microsoft Intune - Article by WME
Active Directory

The Ultimate Guide to Microsoft Intune

The corporate world is evolving fast. And with that, mobile devices are spreading everywhere. As we venture into the year 2024, they have already claimed a substantial 55% share of the total corporate device ecosystem. You

Read More »
Protecting Microsoft 365 from on-Premises Attacks
Cloud Security

How to Protect Microsoft 365 from On-Premises Attacks?

Microsoft 365 is diverse enough to enrich the capabilities of many types of private businesses. It complements users, applications, networks, devices, and whatnot. However, Microsoft 365 cybersecurity is often compromised and there are countless ways that

Read More »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.