Tải bản đầy đủ (.pdf) (255 trang)

Wrox professional MOM 2005 SMS 2003 and WSUS may 2006 ISBN 0764589636

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (9.97 MB, 255 trang )

Next Page
Professional MOM 2005, SMS 2003, and Microsoft Update
byRandy Hollowayet al.
Wrox Press 2006 (432 pages)
ISBN:0764589636
Providing a single source for IT adm inistrators to understand how system s and operations m anagem ent technologies can be used in their
environm ents, this com parative tool helps readers understand which tool is right for which job.

Table of Contents
Professional MOM 2005, SMS 2003, and Microsoft Update
Introduction
C hapter 1 - The Basics of Operations Management
C hapter 2 - MOM, SMS, and WSUS—How They Fit Together
C hapter 3 - Installing Microsoft Operations Manager 2005
C hapter 4 - Installation of SMS
C hapter 5 - Installing and C onfiguring Microsoft Update and Windows Server Update Services
C hapter 6 - MOM C onfiguration and Administration
C hapter 7 - MOM and SMS Agents
C hapter 8 - Management Packs and C omponents
C hapter 9 - Management Pack Drilldown for Windows Server
C hapter 10 - More on Management Packs
C hapter 11 - Third-Party Management Packs and Product C onnectors
C hapter 12 - Using SMS and MOM to Manage Security and Patching
C hapter 13 - Monitoring
C hapter 14 - Securing Your MOM, SMS, WSUS, and WU Installation
C hapter 15 - Reporting
C hapter 16 - System C enter and the Dynamic Systems Initiative
Appendix A - MOM Management Packs and Utilities
Index
Next Page



Next Page
Back Cover
Professional MOM 2005, SMS 2003 and Microsoft Update provides a single source for IT administrators to understand how these systems and operations
management technologies can be used in their environments. It also serves as a comparative tool that helps readers understand which tool is right for which
job.
It is designed and written for anyone who is involved with implementing, supporting, or managing a set of tools for systems and operations management,
including IT operators, IT administrators, IT infrastructure managers and system architects. The readers that have some background in systems and
operations management will probably get the most of this book, however no specific level of skill or knowledge is assumed. The writing is aimed at readers
who have a basic understanding of IT infrastructure on the Windows platform and have familiarity with Windows XP (and earlier) client deployments and
Windows Server technologies.
Some of the topics covered include:
basics of operations management
how the MOM 2005, SMS 2003 and other update technologies fit together
installing and deploying MOM
installing and deploying SMS
installing and deploying MU and WSUS
configuring and administering the MOM environment with MOM and alert tuning
MOM and SMS agents
Deploying and using MOM management packs
Third party management packs
Security and patching with MOM and SMS
Monitoring and security MOM and SMS deployments
MOM and SMS reporting
Microsoft System C enter Solutions
Next Page


Next Page


Professional MOM 2005, SMS 2003, and Microsoft Update
Randy Holloway
Telmo Sampaio
Marcus Oh
Russ Kaufmann
Derek Comingore
Wiley Publishing, Inc.
Professional MOM 2005, SMS 2003, and WSUS

Published by
Wiley Publishing, Inc.

10475 Crosspoint Boulevard
Indianapolis, IN 46256

© 2006 Wiley Publishing, Inc.
Indianapolis, Indiana
Published simultaneously in Canada
ISBN 13: 978-0-7645-8963-8
ISBN-10:
0-7645-8963-6
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
1B/QS/QV/QW/IN
Library of Congress Cataloging-in-Publication Data
Professional MOM 2005, SMS 2003, and WSUS /Randy Holloway … [et al.].
p. cm.
ISBN-13: 978-0-7645-8963-8 (paper/website)
ISBN-10: 0-7645-8963-6 (paper/website)
1. Microsoft Windows (Computer file) 2. Operating systems (Computers) 3. Computer systems—Management. I. Holloway, Randy, 1974–

QA76.76.O63.P6135 2006
005.4 46—dc22
2006011600
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or
otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through
payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for
permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at
/>LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR
COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A
PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY
NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR
OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER
THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HERE-FROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK
AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE
ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK
MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.
For general information on our other products and services please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 5723993 or fax (317) 572-4002.
Trademarks: Wiley, the Wiley logo, Wrox, the Wrox logo, Programmer to Programmer, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its

affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is
not associated with any product or vendor mentioned in this book.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
About the Authors
Randy Holloway

Randy Holloway works for Microsoft Corporation as a technology specialist in the US Central Region. Prior to joining Microsoft, Randy worked in various software development and technology
architecture roles; he has written a number of articles on software and systems development on the Microsoft platform. His blog is located at .
Note Special thanks to my wife, Donna, for supporting me, and to Emily and Gavin for letting me work all of those weekends and evenings. I also thank Jim Minatel and the team at

Wrox for believing in this project.

Telmo Sampaio

Telmo Sampaio is an IT consultant and trainer with 14 years of experience dealing with Microsoft, IBM, and Symantec technologies. He has worked for companies such as Microsoft and IBM.
Telmo has been involved in medium to large network infrastructure projects, security audits, database implementations, and application development. Telmo works as a Senior Technical
Training Consultant for Signal Learning in Indiana. In his spare time, he plays Xbox and reads with his kids.
Note This book is dedicated to both my mothers, Yvette and Graça; my father, Gaspar; my brothers, Daniel and Digo; my wife, Carla, who was very understanding when I had to spend

hours in front of the computer working late nights; and my children, Marco, Rafael, and Natalia.
Marcus Oh

Marcus Oh, a senior administrator and architect, has been leading initiatives in systems management technologies for a private telecommunications company since 1999. He is a columnist
for and has had articles published in TechTarget newsletters as well as the book Windows Server Hacks. Marcus has been recognized by Microsoft with the Most
Valuable Professional award in Windows Server Management since 2004. To get a glimpse of Marcus's latest reflections, visit his blog at .
Note I thank all of my family and friends for their support while I wrote my part of this book. Further, I thank all of the intelligent and respected minds I've met along the way that have

helped contribute in some form or another to the completion of this book, various projects, and my sanity.
Russ Kaufmann

Russ Kaufmann, MCSE+I, MCT, and MVP, is a consultant, speaker, trainer, technical editor, and author. He has been working in IT for more than 15 years and has worked with both small
clients and large clients spanning multiple countries. He specializes in Microsoft server products with special emphasis placed on Exchange, IIS, SharePoint Portal Server, and, of course,
MOM. He currently works for Infocrossing, an infrastructure outsourcing company, in their Broomfield, Colorado, office.
Note This book was a unique project that taught me a great deal about life and prioritization.

I originally saw this project and rejected it. It was too open ended and it just didn't "ring" for me. Later, this project came around again, and this time I said I would do it. My thanks
go to Jim Minatel for keeping me in the loop and giving me another chance to jump on board with this project.
I talked to Randy Holloway, who originally came up with the concept, and I bought into his idea. In case you, the reader, haven't figured it out, the idea was to put together a book
covering systems management. The plan was to cover the basics of the products normally used in systems management, how they worked together, and how each covered different


covering systems management. The plan was to cover the basics of the products normally used in systems management, how they worked together, and how each covered different

organizational needs. Thanks to Randy for getting the idea and making sure I understood it as I built the outline.
As we started working on the project and the timeline, it became clear that we needed additional people. My thanks go to Telmo Sampaio. Telmo stepped up and agreed to take
on some work and add his expertise. Without him, this project would have died.
The next challenges came up with some major health problems on my part and Randy's making the correct decision to place his family first. He had an addition to the family right
as we were getting started, and his responsibilities really ate up his time. So, the next step was to add another person to help out. My thanks go to Marcus Oh for jumping into the
middle of this and using his sheer force of will to keep things moving forward. At that time, I really couldn't provide any help or answer his questions, but he figured things out and
kept on going.
The final challenge was one that I have seen in all projects: the dreaded deadline and exhaustion. This kind of project requires huge amounts of work, and it got to everyone. My
thanks go to Derek Comingore for taking on a good bit of the load. Derek did a great job as the tech editor for many chapters and the author of others.
The usual thanks go to the editors and StudioB's Laura Lewin for taking care of the business of it all and for having the patience in trying times to make this project happen.
This project was completed by the sheer will of those involved. I still am amazed that it is done.
Derek Comingore

Derek Comingore is the software development manager for . He holds the MCAD/MCDBA Microsoft certifications, the Carnegie Mellon Personal Software Process
(PSP) credential, and an AAS/BS in Computer Information Systems. In addition to his role for , Derek enjoys writing articles for 's newsletter and
has written his first article for MSDN (soon to be published) on leveraging SQL Server 2005 Service Broker to obtain real-time ETL. He is also starting up a new SQL Server community,
, which promises to deliver a rich and rewarding experience for the SQL Server professional.
Note First and foremost I wish to thank my fiancée, Misty Neely, for her everlasting patience with me as I sat in front of the computer until 3 a.m. on several occasions. I love you very

much. My son, Derek Steven Comingore—there is no better feeling in the world than when you come tackle Daddy when he gets home from work; you are the best gift God could
ever have given me. My family also deserves much praise as they gave me a good home to grow up in with strong morals and love; their guidance continues to help me achieve
higher levels of success in my life.
Jim Minatel, thank you, not only for this opportunity but also for mentoring me in the technical writing field. Jim slowly exposed me to the technical writing industry by asking me to
be a technical editor for several other Wrox titles, and now a contributing author on this book. Ed Connor deserves thanks as he was under a lot of pressure when things got tight, but
he "quarterbacked" the project quite well. , my employer, has been supportive of my technical writing, and I appreciate it. Finally, I thank Darren King,
CEO, who continues to challenge and mentor me.
Credits
Senior Acquisitions Editor

Jim Minatel

Development Editor

Ed Connor
Technical Editors

Derek Comingore
Brian Rodgers
Todd Meister
Copy Editor

Nancy Rapoport
Editorial Manager

Mary Beth Wakefield
Production Manager

Tim Tate
Vice President and Executive Group Publisher

Richard Swadley
Vice President and Executive Publisher

Joseph B. Wikert
Project Coordinator

Michael Kruzil
Graphics and Production Specialists

Carrie A. Foster
Mary J. Gillot

Joyce Haughey
Stephanie D. Jumper
Alicia B. South
Quality Control Technicians

John Greenough Charles Spencer
Proofreading and Indexing

Techbooks
Next Page


Next Page

Introduction
Systems and operations management can be complex and expensive. A comprehensive approach to this problem requires the use of operations management tools, software deployment
tools, configuration management, and other release management tools and techniques. The knowledge of the organization is critical in helping to make sure that everything works well. In
addition, doing the job right involves custom rules or scripts and reports to help ensure that everything is running as expected. For many IT professionals, this kind of operations management
is a mix of a number of different tools along with custom scripting and manual effort to monitor logs and other reports. While this approach will get the job done, it can often be more
expensive and time consuming for administrators. In addition, the use of too many special-purpose monitoring and management tools in the environment, along with custom scripts and
reports, introduces more opportunities for mistakes and can lead to unsatisfied users or customers.
Microsoft is taking a comprehensive approach to systems and operations management and is building tools targeted at the small business all the way up to the largest enterprises. While there
is more work to do in improving these products, Microsoft's focus to build a well-integrated set of monitoring and systems management solutions is significant and should be a point of
consideration for any IT administrator who is evaluating or implementing these tools in their environment. This book was written to show how the current Microsoft tools for systems and
operations management can work together to provide a comprehensive approach to automating IT operations. In addition, this book takes a look at where these tools are going and what IT
administrators can expect from Microsoft in the future to help make operations and systems management tasks easier. It is important for IT administrators to consider not only the present
operational and systems management requirements but their future needs as well when evaluating and implementing the technologies, and this book attempts to address both of these areas.

Whom This Book Is For
When the idea for Professional MOM 2005, SMS 2003, and WSUS was first discussed, the goal was to provide a single source for IT administrators to understand how these systems and

operations management technology can be used in their environments. Since that time, the book has also evolved into a comparative tool that can help a reader to understand which tool is
right for which job. The audience for this book includes anyone who is involved with implementing, supporting, or managing a set of tools for systems and operations management, including
IT operators, IT administrators, IT infrastructure managers, and system architects.
Readers with some background in systems and operations management will probably get the most out of this book; however, no specific level of skill or knowledge is assumed. The writing is
aimed at readers who have a basic understanding of IT infrastructure on the Windows platform and have familiarity with Windows XP (and earlier) client deployments and Windows Server
technologies.
For readers who understand the principles behind systems and operations management and who are interested in the installation procedures and configuration for MOM 2005, SMS 2003, or
the Microsoft Update (MU) and Windows Server Update Services tools (WSUS), you may want to jump right into Chapters 3, 4, and 5. For those that are interested in evaluating these tools
and using this book as an aid, start with Chapter 2, which covers the basics of how these products work and how they can be used together. Chapter 16 looks beyond the core products that
we've discussed throughout the book and incorporates other systems management products from Microsoft. This is a good chapter for those interested in the product roadmap beyond MOM
2005 and SMS 2003.
Next Page


Next Page

What This Book Covers
This book covers the current shipping systems and operations management products from Microsoft. As of this writing, these products include MOM 2005, SMS 2003, MU, and WSUS. While
there are older versions of MOM and SMS, we have not covered those technologies in this book in any detail. In addition, this book does not offer any detailed comparison of the current
versions of these products to the previous versions. New features in the current products are not explicitly noted.
Next Page


Next Page

How This Book Is Structured
One of the challenges in writing a book that covers a broad range of products and tools is structure. To best address this issue, the book is organized to cover the material in logical sections.
This book covers the basics of systems management and the products, followed by installation and configuration procedures. In later chapters, topics covered include patching, monitoring,
tuning, and reporting of the management tools. Finally, the book describes the roadmap for future management products from Microsoft.
More specifically, Chapters 1 and 2 cover the basics of operations management and how the MOM 2005, SMS 2003, and other update technologies fit together. These chapters should set

the stage for the material to be discussed and provide some insight on what these products can do for IT. Chapters 3 through 5 are focused on the installation and deployment of MOM, SMS,
MU, and WSUS. These chapters include a review of installation procedures and considerations, along with some discussion of configuration. Chapter 6 is a deeper dive into the configuration
and administration of the MOM environment with MOM and alert tuning, and should help the reader to understand how to get the most out of the operations monitoring tools. Chapter 7 goes
into the agent technologies that make MOM and SMS work in your environment.
In Chapters 8 through 11, the book moves into a deeper discussion of MOM management packs, including the deployment of management packs and the use of third-party management
packs and product connectors. Appendix A also provides more detail on the management packs available from Microsoft and other vendors. Chapter 12 covers the security and patching
features that can be supported by MOM and SMS. Chapters 13 and 14 cover monitoring and the security aspects of deploying MOM, SMS, and the update technologies, helping to ensure
that IT administrators lock down these powerful tools. Chapter 15 covers the reporting capabilities of MOM and SMS detail with information on how administrators and operators can retrieve
critical information from these tools. Chapter 16 covers the Microsoft System Center solutions and considers the future of Microsoft's management tools.
Next Page


Next Page

What You Need to Use This Book
The readers of this book will benefit from having access to a Windows Server domain and software including MOM 2005 and SMS 2003. Some of this software is available to be downloaded
for evaluation purposes. For those without access to a lab or test network environment, products such as Virtual Server or Virtual PC can help to build an environment for testing. For IT
professionals that don't have access to these tools, the Virtual Labs available at Microsoft's Tech Net site ( can be used to
review much of the functionality described in this book.
Next Page


Next Page

Errata
We make every effort to ensure that there are no errors in the text or in the code. However, no one is perfect, and mistakes do occur. If you find an error in one of our books, like a spelling
mistake or faulty piece of code, we would be very grateful for your feedback. By sending in errata you may save another reader hours of frustration and at the same time you will be helping us
provide even higher quality information.
To find the errata page for this book, go to and locate the title using the Search box or one of the title lists. Then, on the book details page, click the Book Errata link. On
this page you can view all errata that has been submitted for this book and posted by Wrox editors. A complete book list including links to each book's errata is also available at

/>If you don't spot "your" error on the Book Errata page, go to and complete the form there to send us the error you have found. We'll check the
information and, if appropriate, post a message to the book's errata page and fix the problem in subsequent editions of the book.
Next Page


Next Page


For author and peer discussion, join the P2P forums at . The forums are a Web-based system for you to post messages relating to Wrox books and related
technologies and interact with other readers and technology users. The forums offer a subscription feature to e-mail you topics of interest of your choosing when new posts are made to the
forums. Wrox authors, editors, other industry experts, and your fellow readers are present on these forums.
At you will find a number of different forums that will help you not only as you read this book, but also as you develop your own applications. To join the forums, just
follow these steps:
1. Go to and click the Register link.
2. Read the terms of use and click Agree.
3. Complete the required information to join as well as any optional information you wish to provide and click Submit.
4. You will receive an e-mail with information describing how to verify your account and complete the joining process.
Note You can read messages in the forums without joining P2P but in order to post your own messages, you must join.

Once you join, you can post new messages and respond to messages other users post. You can read messages at any time on the Web. If you would like to have new messages from a
particular forum e-mailed to you, click the Subscribe to this Forum icon by the forum name in the forum listing.
For more information about how to use the Wrox P2P, be sure to read the P2P FAQs for answers to questions about how the forum software works as well as many common questions specific
to P2P and Wrox books. To read the FAQs, click the FAQ link on any P2P page.
Next Page


Next Page

Chapter 1: The Basics of Operations Management
Overview

One of the key criteria for selecting and deploying enterprise systems is the ability to effectively manage their operations. By ensuring that critical business systems are healthy, responsive,
and running as expected, information technology managers and executives are able to lower the total cost of ownership for their systems and place more emphasis on the development and
deployment of new capabilities. In most organizations, this is the major focal point to help drive efficiency. In this chapter, we cover the following topics:
Systems management on the Microsoft platform
Model-based operations management
Dynamic Systems Initiative
With the emphasis on Microsoft's management technologies over the past few years, new releases of SMS and MOM, and the evolution of the Microsoft Update platform, there is a greater
need for IT to understand how these products can work together to provide a comprehensive systems management solution that enables software deployment, systems monitoring for alerts
and exceptions, and access to the data that can help IT to prevent problems in the future. Those who use the systems management tools from Microsoft benefit from having Microsoft's
knowledge of its own tools baked into the products, which makes it easier to manage their Windows desktop and server environments and provides the capability to work in a heterogeneous
setting.
The goal for this chapter is to provide a basic overview of operations management and describe the problem domain and then focus on the components of the Microsoft platform now and in
the future that will enable system administrators and IT to effectively manage their technology operations. By examining the current management tools and understanding Microsoft's
Dynamic Systems Initiative, you can better formulate your strategies for deploying management solutions on the Microsoft platform.
Next Page


Next Page

Systems Management on the Microsoft Platform
IT organizations deploy systems management and monitoring technologies in an effort to reduce costs associated with the complexity and effort of deploying and managing large numbers of
workstations, servers, and server-based applications in their enterprise environment. Achieving this goal depends on the technology being used to provide scalability to accommodate large
environments and to provide an efficient architecture. However, when comparing monitoring and management technologies, the most critical factor to consider is the availability of the
operational assistance they offer to the operators and administrators that rely upon these tools. These administrators want to ensure that their systems are highly available and functional for
their customers.
Monitoring technologies are only as valuable as the quality of the best-practices they provide. Traditionally monitoring, management, and deployment technologies have been toolsets that
depend on customization by IT or consultants to determine appropriate components that should be deployed and how to best configure them to monitor the availability and performance of
the customer's specific application or service. Because of this, few organizations have realized the potential value of these technologies. In addition, monitoring tools that are not granular
enough in detail can fall short in helping administrators to solve problems once they are identified.
The core management solutions on the Microsoft platform include products such as Systems Management Server (SMS), Microsoft Operations Manager (MOM), and the Microsoft Update

solution. Through the use of SMS for software deployment, MOM for management alerts and notifications, and Microsoft Update to provide easy access to updated patches for products such
as Microsoft Windows, Microsoft Office, and many others, an enterprise systems administrator has a baseline to enable secure and well-managed systems. MOM provides the foundation for
operations management while SMS enables more sophisticated configuration and release management scenarios. Together, these tools can effectively support the full lifecycle for systems
management.
For many years, IT administrators have been successfully using Microsoft SMS to manage Windows-based desktops and servers within their organizations. As the number of Windows PCs
deployed within these organizations has grown dramatically, SMS has helped IT administrators contain the cost of managing such heavily distributed systems, keeping the overall cost of
ownership low while allowing the number of deployed PCs and applications to grow.
However, the environment in which Windows-based PCs are deployed is constantly changing as new technologies are adopted and as PCs are used in increasingly complex configurations.
The most recent release of SMS, Systems Management Server 2003, is designed to track and support these changing trends in PC usage and provide support for emerging usage scenarios
and technologies. SMS 2003 provides solutions for a number of key issues faced by IT administrators managing Windows-based PC environments today. SMS 2003 addresses the following
key problem areas:
Managing computers and users that roam around the network, often connecting over poor bandwidth links or from different geographic locations on a regular basis
Tracking the deployment and usage of software assets in the organization, and using this to plan licensing and software acquisition across the company
Monitoring the patch state of all deployed Windows PCs and applications in the enterprise, and removing vulnerabilities proactively in a closed loop process with real-time
patch deployment status
Offering managers and users access to the management data aggregated by SMS, including live configuration and operations reports
Managing Windows PCs securely, but with a minimum of administrative overhead, while fending off the ever-increasing number of external security threats
The core features of SMS, including software deployment, inventory tracking, and remote troubleshooting are supported in SMS 2003. The SMS administration console is shown in Figure 11.

Figure 1-1

In addition, support has been added for the increasing number of mobile users in organizations today. This support simplifies management of Windows-based PCs and users who commonly
roam to different physical locations, reducing the IT cost of managing such users and machines and providing seamless one-to-many solutions for desktop, laptop, and server users. Because
of increased need to maintain the security of all deployed software in an enterprise, SMS 2003 also adds support for Security Patch Management of deployed Windows systems. This allows
administrators to easily monitor the patch state of all systems within their enterprise through a set of powerful web reports. These reports are used to identify any vulnerability in the network, at
which point the system can then be used to download and deploy the latest patches from Microsoft's web site to those machines that require them. Additional scenarios and enhancements
will be supported in SP2 of SMS, which is scheduled for release in 2006.
Because many organizations are deploying Windows Server 2003 Active Directory service within their networks, SMS 2003 is able to take advantage of this technology, further simplifying the
process of managing clients and users. Many Active Directory features map directly to SMS targeting concepts, allowing IT administrators to target software and inventory tasks using Active
Directory constructs and containers. In summary, SMS provides a strong set of features to enable software deployment and the management of clients and users.

When it comes to systems monitoring and alerting functions, the core component of that solution is Microsoft Operations Manager. MOM 2005 differs from traditional monitoring technology
and assists customers in reducing the cost of management through the use of management packs. These management packs for an application combine the insight of the application
developers, a knowledge base for organizational learning and common knowledge surrounding the product along with best practices for operations.
The difference between MOM management packs and similar management technology lies both in the identities of the management pack developers and the methodology used for their
development. First, MOM 2005 management packs provide built-in, product-specific operational intelligence, encapsulating knowledge from the individual Microsoft product teams
developing the applications, Microsoft Consulting Services, and Microsoft's product support organizations. All of this knowledge is made available out of the box for consumption by the
product users. Second, the Design for Operations methodology is used to first analyze and then design the management of Windows applications and services.
The Design for Operations methodology of managing applications is a sharp contrast to the typical way application management has been developed in the past. As opposed to a subject
matter expert driving the approach to managing a system, Design for Operations requires developers of Microsoft applications and third-party applications or services to adopt an inside-out
approach based on their personal knowledge of the application or services. Instead of simply monitoring processes or services to see if they're running and then generating an alert to a
console, Design for Operations requires that an application or service be analyzed and broken down into a framework that will describe the application from a management perspective. This
methodology uses three models as the basis for implementing management for a service or application: the Health Model, the Task Model, and the State Model. The models are meant to
provide a prescriptive mechanism for ensuring that management is built for every service and application and that the management is aligned with the needs of the administrator who will be
running the service. This design point is a requirement of the Windows Server Systems Core Engineering Criteria, which are used to determine whether a Microsoft product can be shipped
under the banner of Windows Server System.
The Health Model defines what it means for a system to be healthy or unhealthy, and the model defines how a system transitions in and out of those states. Information on a system's health is
necessary for the maintenance and diagnosis of the system. The contents of the Health Model become the basis for system events and instrumentation on which monitoring and automated
recovery is built. All too often, system information is supplied in a developer-centric way that does not give the administrator operational visibility of the applications. The Health Model seeks
to guide both what kinds of information should be provided and how the system or the administrator should respond to the information. If a management technology is monitoring an
application or service without a deep understanding of Health Modeling, IT operators will be required to invest time and resources analyzing the relevance of an alert to the operations of
their organization.
The Task Model is used by developers to enumerate the activities that are performed in managing the system. These may be maintenance tasks performed on a routine basis, such as system
backup; for event-driven tasks, such as adding a user; or for diagnostic tasks performed to correct system failures. Defining these tasks guides the development of administration tools and
interfaces, and it becomes the basis for automation. Used in conjunction with the Health Model, the Task Model can drive self-correcting systems with the appropriate instrumentation. Task
Models are utilized by management pack developers in the creation of product or service-specific management Rules and Administrator Tasks. Management packs also leverage the Task
Model to understand which error situations can be corrected on the managed system by using self-correcting rules and which will require human intervention. Likewise, Task Models are


leveraged to provide IT administrators with preconfigured, remotely launched tasks from a MOM Operator Console that will assist in either error diagnosis or correction. Without the concept of
a Task Model, most monitoring applications rely on the IT organization or consultants to write complex scripts and rules to determine how to resolve error situations locally or determine the

correct diagnostic procedures or tools needed to remedy a problem remotely.
State Modeling will be increasingly leveraged by future Windows platforms and applications to provide administrators with a comprehensive means of managing both the availability and
configuration of systems and applications. State Modeling catalogs the state and settings associated with an application and define the scope and type for each. State may be associated
with the computer or the user, it may be temporary or permanent, and it might be user data or operational parameters. Having a strict association of every state entity with a scope and
category allows the administrator flexibility in deployment and provides a powerful tool for control. It means an administrator can separately store user data, migrate a user easily from one
computer to another, and replicate computer configuration across a data center.
In an early adoption of State Modeling, MOM 2005 management packs provide administrators Health and State information from new views within the MOM Operator Console. In addition to
alert views found in other management applications, the State Monitoring view provides MOM operators with a quick overview of server health. Each computer shown in the state monitoring
view receives a rating in critical categories. The rated categories include memory and operating system as well as specific application categories, such as Active Directory, SQL Server, and
Exchange Server. The operator can expand a particular category to view server status displayed in subcategories, as shown in Figure 1-2.

Figure 1-2

MOM 2005 provides users with a variety of topological views that show the automatic discovery of nodes and relationships. With topological views, IT administrators can view node status,
navigate to other views, and launch context-sensitive actions. This can reduce resolution time for complex problems from hours to minutes, significantly reducing cost and improving service
levels. For example, when something happens to an application such as Active Directory, it turns red on the diagram. By double-clicking on the red application, a more detailed diagram
opens showing one or more trouble spots in red. The operator can continue drilling down in detail until he or she uncovers the cause. The MOM console tasks and prescriptive guidance are
then available to help resolve the issue. Diagram views are shown in Figure 1-3.

Figure 1-3

Next Page


Next Page

Moving Toward the Future: Dynamic Systems Initiative
Knowledge is a key component for systems management. This includes knowledge of the deployed systems, knowledge of the environment in which they operate, knowledge of a designer's
intent for those systems, and knowledge of IT policies. Specifically, knowledge may include the following:
Developer constraints on settings of a component, including constraints on related systems that the component is hosted on or communicates with

IT policy that further constrains settings or deployments
Installation directives that describe how a system is to be installed
Health models that describe system states and the events or behavioral symptoms that indicate state transitions
Monitoring rules, ranging from polling frequency to event filtering and forwarding to diagnostic or corrective action in response to problems
Schemas for instrumentation, settings, events, and actions
Service-level agreements that define performance and availability
Transaction flows and costs of processing steps for performance analysis
Reports
As IT organizations have become more geographically dispersed and individual roles more specialized, IT professionals tend to operate in silos focused on their area of specialization. This
makes it increasingly difficult to communicate relevant system knowledge across the IT lifecycle. As a result, organizations find it very difficult to collaborate across roles, promote continuous
improvement of a system's design and operation, and conduct typical management tasks such as deployment, updating, and patching.
The silos that form across IT organizations interact with an application or system at some point during its lifecycle. However, each silo possesses its own pocket of system-relevant knowledge
that does not get communicated effectively to the rest of the organization.
Software models can be used to capture system-relevant knowledge and facilitate the communication and collaboration around this knowledge that is required to improve the efficiency of
the entire IT development, deployment, and support lifecycle. A software model provides a level of abstraction for administrators similar to what a blueprint provides to an architect or a
prototype provides to a product designer. But for a dynamic and distributed software environment, a static model or blueprint is insufficient. The model must be a living organism and should
evolve throughout the life of a system. Having the right tools for systems management can help to keep these models current and enable users to have dynamic views of the system model
based on an underlying operational system.
When a system is developed, basic rules and configurations are defined. As the system is deployed, the details of its configuration, environmental constraints, and requirements are added. As
operational best practices are developed or enhanced, they can be incorporated into the model as well, providing a feedback loop between the operations staff and the model. In the end,
the model becomes a live, dynamic blueprint that captures knowledge about a complete distributed system in terms of its structure, behavior, and characteristics. The following benefits can
be gained as a result of these models:
The system model captures the entire system's composition in terms of all interrelated software and hardware components.
The system model captures knowledge as prescriptive configurations and best practices, allowing the effects of changes to the system to be tested before the changes are
implemented.
Tools that take advantage of the system model can capture and track the configuration state so that administrators do not need to maintain it in their heads. The software
maintains the desired state so that humans do not need to.
Administrators do not need to operate directly on real-world systems but rather can model changes before committing to them. In this way, "what if" scenarios can be tried
without impact to a business.
The system model becomes the point of coordination and consistency across administrators who have separate but interdependent responsibilities.

The modeling system becomes the integrated platform for design and development tools that enable the authoring of system models. It also becomes the platform for operational
management and policy-driven tools used for capacity planning, deployment, configuration update, inventory control, and so on.
In Microsoft's initial implementation of the Dynamic Systems Initiative, the System Definition Model (SDM) is a foundational component of dynamic systems. SDM is a model that is used to
create definitions of distributed systems. In this context, a distributed system is a set of related software and hardware resources working together to accomplish a common function. Multi-tier
applications, Web Services, Internet web sites supporting e-commerce, and enterprise data centers are examples of systems. Using SDM, businesses can create a live blueprint of their
systems. This blueprint can be created and manipulated with various software tools and is used to define system elements and capture data pertinent to development, deployment, and
operations so that the data becomes relevant across the entire IT lifecycle.
Today, an SDM can be defined using tools available with Visual Studio 2005. Going forward, SDM will be the basis for design of system models, used to deploy systems based on the model
defined and will be kept up-to-date by an SDM service that dynamically modifies the SDM to reflect the current state of operations. While the SDM will be incorporated into the Microsoft
management solutions, third parties will also be able to develop solutions based on the SDM to extend the capabilities of these models and the tools that consume or produce them.
Several key capabilities of IT organizations and IT systems become possible when software models are used to capture all relevant system knowledge. Through the DSI efforts and SDM,
Microsoft aims to enable innovation in its products and from its partners in four areas: Design for Operations, System-Level Management, Policy-Driven Operations, and Hardware Abstraction.

Design for Operations
When creating mission-critical software, software architects often find themselves communicating with their counterparts who specify data center and infrastructure architecture. In the process
of delivering a solution, an application's logical design is often found to be at odds with the actual capabilities of the deployment environment. Typically, this communication breakdown
results in lost productivity as developers and operations managers reconcile an application's capabilities with a data center's realities.
With new model-based development tools, such as Visual Studio Team System, these differences are mitigated by offering a logical infrastructure designer that will enable operations
managers to specify their deployment environment and architects to verify that their application will work within the specified deployment constraints. These tools use software models to
capture the knowledge of a designer's intent, knowledge of an operational environment, and knowledge of IT governing policies to ensure IT systems are designed with operations and
manageability in mind from the start. The models described can be built using Visual Studio 2005 and then consumed by Microsoft management tools and any other third-party tools that are
built to consume the models, which are based on an open specification.

System-Level Management
Models can capture the entire structure of an application, including all the underlying and interrelated software and hardware resources. Management tools, such as future versions of MOM,
will use those models to provide a system-level view of the health and performance of that application, enabling administrators to understand the impact of changes or errors in the system
and to manage the application more effectively.
This system-wide view will enable future versions of management tools, such as MOM, to perform robust health monitoring and problem solving, as well as end-to-end performance and
service-level management.


Policy-Driven Operations
Models can also capture policies tied to IT and corporate governance, such as Sarbanes-Oxley compliance or basic security standards and operating system versioning. Management tools,
such as future versions of Microsoft SMS, will use these models for desired-state management.
By comparing the model of the real-world state with the model of the compliance definition, management tools can make systems compliant before allowing them access to corporate
resources.

Hardware Abstraction
Software models can capture an entire system's composition in terms of all interrelated software and hardware components. As a result, a system will contain a specific description of the
hardware requirements of the environment into which it will be deployed.
This knowledge will enable new resource management technologies, such as Microsoft Virtual Server, to interpret these hardware requirements and to be used by management tools to ease
the initial provisioning, ongoing change, or removal of hardware from an application based on changing business needs.
Next Page


Next Page

Management Strategies
Microsoft's strategy for delivering the Dynamic Systems Initiative is to leverage and extend existing management solutions to take advantage of the model-based approach to systems
management. Visual Studio 2005 Team System and MOM 2005 with management packs are great examples of products that deliver on the DSI vision today. With these investments and
those planned for the future in products such as SMS and other System Center products, the Dynamic Systems Initiative clearly signals Microsoft's long-term commitment to reducing
complexity across the IT lifecycle and making it possible for IT professionals to deliver greater value to their businesses.
Looking toward the future, Microsoft is working to develop products and enable solutions that will unleash the potential of SDM to simplify and automate information technology. Microsoft
will both deliver and enable a new breed of application development tools that make it easier for companies to leverage the Design for Operations methodology. Windows and supporting
applications and services will evolve to manage distributed resources across a data center, provide users with dynamic system-level views of their environments, and offer new core services
targeted at simplifying the deployment and operations of distributed systems. Windows Server System applications, including SQL Server, Exchange Server, and BizTalk Server, will support
SDM to deliver a greater set of management capabilities for IT professionals and their customers. Coupled with Microsoft's commitment to management packs shipping with new software
releases, IT administrators will be able to deploy new solutions and have confidence in their ability to be supported in demanding environments much more quickly than before.
Next Page



Next Page

Summary
In this chapter, we covered the following:
Systems management on the Microsoft platform
Operations, configuration, and release management
Dynamic Systems Initiative
By combining health and state with alert information, IT operators no longer have to perform research to understand the organizational impact of alerts. By maintaining awareness of system
and service availability, IT staff is better able to identify, address, and resolve IT reliability and performance issues before they become serious problems and negatively affect business
applications. Through the use of State Modeling and directly monitoring the event, health, and performance information of Windows Server System, MOM 2005 highlights relevant and
important information that can be captured, evaluated, and presented to operators, helping prevent issues from going unseen. Tools such as SMS and Microsoft Update expand the solutions
through configuration management capabilities that help administrators to deploy solutions and drive toward desired configuration through automated reporting, software deployment
features, and other management capabilities.
Going forward, Microsoft plans to deliver and enable a new category of closed-loop, system-level management solutions that provide new levels of automation in the data center and tie
business policies directly to IT systems. By adopting solutions from Microsoft and its partners today, IT professionals can realize reduced costs and gain more time to proactively focus on what
is most important to support their organizations. For information technology organizations that are looking to get started with systems management or to become more mature in the approach
to managing their systems, products such as MOM 2005, SMS 2003, and Microsoft Update are key components of a well-managed technology environment. In Chapter 2, we take an in-depth
look at the features of these products and learn more about how they work together to support systems management.
Next Page


Next Page

Chapter 2: MOM, SMS, and WSUS—How They Fit Together
Overview
A major challenge for IT administrators faced with managing their technology infrastructure is figuring out which tool is best for which job. With MOM, SMS, and WSUS and Microsoft Update,
it is important for the administrator to understand the features of each tool and to understand how the tools work together. In addition, where there is some overlap in functionality between
the tools the administrator needs to understand the benefits of using one tool over another. In this chapter, we cover the following:
MOM: A solution for operations management
SMS: A software deployment and management solution

WSUS: Update services for decentralized environments
MOM, SMS, and WSUS
You get a functional overview of MOM, SMS, and WSUS and the Microsoft Update components. You compare the products, understand how they fit together, and review criteria to help you
decide when to use which of the products.
To get started, let's describe what each product is designed to do. MOM 2005 is a solution to enable operations management that provides event and performance management, proactive
monitoring and alerting, reporting and trend analysis, and system-specific knowledge and tasks to improve the manageability of your servers and applications. While MOM 2005 is primarily
focused on managing Windows-based servers, there are third-party solutions that enable you to manage server applications and services running on other platforms as well. SMS 2003
enables you to manage client computers and servers within your organization, including tasks such as troubleshooting, software asset management, software distribution, software updates,
reporting, and many others. WSUS enables IT administrators to deploy the latest product updates to Windows Server 2000, Windows Server 2003, and Windows XP operating systems. By
using WSUS, administrators can fully manage the distribution of updates that are released through Microsoft Update to computers in their network. When you look at the descriptions for each
product, there is some overlap conceptually. As we drill into the details, the distinction will be much more clear. We'll start with MOM 2005 and how it supports operations management
functions.
Next Page


Next Page

MOM: A Solution for Operations Management
MOM 2005 includes a variety of features designed to make it easier for administrators to deploy and use the management tools, improved support for management packs and reporting, and
features to ensure that the management infrastructure is secure and reliable. We break down the features based on how they're used to support operations management and point out
different features including administration, operations, and reporting that are essential to the overall management solution.
The deployment of MOM starts out with the administration and configuration of the management environment. A number of important features enable the administrator to more effectively
configure the operations management tools to simplify the operations and monitoring processes. One such feature is Computer Groups. MOM enables you to create groupings for computers
by common elements, including geographical location, function of the servers, or other application dependencies. Groups of computers are shown in the view of the MOM Administrator
Console in Figure 2-1. From this view you can see all of the settings available to the administrator and gain a quick view of the computers available to manage.

Figure 2-1

The actual mechanics of the operations management process in MOM are driven by setting up tasks in the operations management console. A task is an action that is executed on the
Operator Console against an alert, event, or computer. This type of task is useful to automate user activities that would otherwise be performed by a user. The action that is executed as part of

the task is specified in terms of a command line for execution. When a task gets launched, the properties are passed to the command line to ensure the proper execution.
Several tasks can be configured in MOM. For instance, a user might want to use the terminal server client to connect to the computer that raised an alert; the user can create a console task
that runs against an alert item. For example, the user could set up a monitor for a given directory to ensure that log files are being updated as expected. As you would expect, the events in
those logs that are relevant can be captured in other ways, but a task to ensure that logs are being updated can ensure that issues that may arise in a system will be appropriately logged for
diagnostics and root cause analysis.
A number of setup and configuration tasks are supported in the MOM administration console. After your initial installation of MOM, a detail pane in the administration console displays
several startup tasks that can be performed rapidly. The first option, Install/Uninstall Agents Wizard, enables you to specify computers or use discovery parameters to add computers to your
Management Group.
The Install/Uninstall Agents Wizard can also be launched from several other places in the MOM Administrator Console, including the root Microsoft Operations Manager node in the
Navigation pane, the Administration node, and the Computers subnode and all of its children. Through the use of these agents, much of the MOM monitoring activities can be performed.
While agents are core to the architecture of MOM and enabling management, agentless monitoring is also supported. Agentless monitoring is the ability to monitor remote resources in a
manner that is similar to how local resources are monitored through providers and responses. If providers that support remote access to resources are used and the responses can execute its
logic remotely, then those sets of rules work the same way on both agentless and agent-managed computers. Once identified, MOM starts monitoring the agentless computer as though there
were an agent installed on the computer. To enable this kind of access, the MOM account used for this action must have administrative rights on the computers being managed without
agents. The console view for adding agentless managed computers is shown in Figure 2-2.

Figure 2-2

A significant number of functions can be performed through agentless monitoring. Some of the important functions include the following:
State monitoring.
Heartbeat: A MOM Management Server pings the agentless computer at intervals specified by the user to ensure that it is available.
Service discovery and status.
Performance counters.
Internal service monitoring events.
Event collection: These include timed, Event Log, WMI, internally generated, and script-generated.
There are some limitations to agentless monitoring. This type of monitoring does not support application log providers, and descriptions of event log entries on the agentless machine are not
displayed on the MOM Management Server unless it has the same EventLogmessages.dll file as the agentless computer. A workaround is to install the software for which you'd like to
receive event log entries on the MOM Server. Here are some considerations for agentless monitoring:
Agentless monitoring does not work through a firewall in typical configurations because agentless network traffic contains remote procedure call (RPC) and Distributed
Component Object Model (DCOM) calls.

Not all management packs work in agentless mode. Therefore, it might not make operational sense for your management pack to work without an agent if the bulk of the
monitoring scenarios leverage providers that are not supported without an agent. This is especially important when considering third-party management packs.
Another important administration feature in MOM is the use of console scopes. You can use console scopes to define the set of computer groups that appear in the MOM Operator Console for
individual MOM 2005 users. The Console Scopes view in the MOM Administrator Console is shown in Figure 2-3. A console scope consists of a set of computer groups and a list of MOM 2005
users that can access those computer groups. Because users can be associated with only one console scope at a time, they can be granted access to only one set of computer groups in the
Operator Console. This is not a security feature, but rather a filtering tool to enable users to focus on a specific set of servers while using MOM Operator Console tools. The console scope


Operator Console. This is not a security feature, but rather a filtering tool to enable users to focus on a specific set of servers while using MOM Operator Console tools. The console scope
settings also apply to other SDK-based tools associated with the same account.

Figure 2-3

The Administrator Console features described previously are important, but most of the action with MOM occurs in the operations console. This is where the day to day monitoring and uses of
MOM tools will likely occur. MOM 2005 provides a set of view types for the operations console that are backward compatible to MOM 2000 but provide better usability for MOM users,
including administrators and operators. All the views can be authored, imported, and exported. The console makes it simple to switch between views, drill down to details, and launch contextsensitive tasks. The views included are Alters, State, Events, Performance, Computers, and Diagrams. Let's look at each one of these views and how they support the operations management
process.
The Alerts view enables the user to view alerts globally, based on filters or by system component where the alert originated. As you can see in Figure 2-4, the alerts can be sorted by a variety
of criteria. There are tabs related to the alert and the user can drill down for detailed information. The State view in the Operator Console enables the user to view the state of a particular
computer and view areas of problem by installed components. The Event view is similar to the Alerts view, incorporating items from the event log and enabling you to view the alerts
associated with particular system events. The Performance view enables you to view the performance counters associated with a particular computer, and then to select the items you wish to
see, as shown in Figure 2-5. The results can then be graphed for further analysis. The Computer and Groups view enables you to view alerts by machine and monitored components. The
Diagram view provides a view of the servers in your environment and the ability to customize those views based on different criteria.

Figure 2-4

Figure 2-5

In addition to the administration and operations tools, MOM provides a data analysis and reporting solution. MOM's data and reporting tools contain some of the following features:
Web-based reporting

Dynamic reports with drill down, charting, and sorting
Long-term offline storage and data analysis capabilities
Customization of reports through Visual Studio
Support for exporting data to other formats including Excel, PDF, CSV, and others
Folder-and report-based security
Support for interactive and published reports
Scheduled publishing and delivery based on report type or content changes
Several predefined reports are provided with the MOM 2005 management pack. These reports are organized by three categories, including Microsoft Operations Manager reports,
Operational Data Reporting, and Operational Health Analysis. A view of the MOM reporting tool deployed through SQL Server Reporting Services is shown in Figure 2-6. These reports
enable operators to view a wide range of data, from details about the configuration of agents and the performance of the MOM servers all the way to metrics on specific alerts and detail data
on the occurrences of specific alerts.


Figure 2-6

Through the support for the configuration of tasks and rules for alerts in the operations management environment combined with an operations console and extensive reporting capabilities,
the MOM environment provides a fully featured solution for managing computers and applications in an IT environment. While these capabilities are important, they need to be coupled with
a strategy for desktop computer management, software deployment, and other capabilities such as configuration and release management that help IT administrators to deal with the issues
in their environment on a reactive and proactive basis. The solution for these issues requires support for automated software deployment and systems management to enable remediation of
issues on a per-computer basis or across a broad set of computers defined by different groupings.
Next Page


Next Page

SMS: A Software Deployment and Management Solution
Systems administrators have relied on tools to enable automated software distribution and deployment and to perform other management functions since the early days of network
computing. As PCs have proliferated, the problem of managing individual computers has become more important to the health of the overall technology infrastructure. SMS is designed to
help IT administrators contain the cost of managing distributed systems by allowing the number of deployed computers and installed applications to increase without requiring substantial
investment in additional manpower for technical support. Managing client computers within an IT organization includes tasks such as troubleshooting computers, managing software assets,

and analyzing network problems. These tasks can be complex and time consuming, preventing IT staff from focusing on new deployments and upgrades to existing systems. SMS helps to
solve this challenge in IT.
SMS 2003 addresses the following key issues that IT administrators face in managing distributed computing environments:
Managing computers that roam among locations and connect to the network from different geographical locations
Tracking deployment and use of software assets, and using this information to plan software procurement and licensing
Providing IT administrators and management access to data accumulated by SMS
Managing security on computers running Windows operating systems in a scalable manner
To help solve these issues, SMS 2003 provides a number of key features. These include support for collections and queries, hardware and software inventory, software distribution, software
update management, software metering, reporting, product compliance, security, and many others.
SMS manages resources such as client computers and software. Logical groups of SMS resources having common attributes are called collections. Collections are defined by queries that are
refreshed at intervals specified by an administrator. A resource that no longer meets the collection criteria is removed from the collection and a resource that meets the collection criteria is
added to the collection. SMS features can operate on clients only if they are members of a collection. By default, all SMS clients are members of the All Systems collection (shown in Figure
2-7). These collections form the basis for how SMS manages systems in your environment.

Figure 2-7

Another major feature is that hardware and software inventories on client computers can be performed by SMS. You can run a wide variety of reports against the resulting data, which can
help you plan upgrades, track hardware and software assets, or compare the report output to software licensing data. Before you deploy a new software package, you can build a report that
shows how many destination computers have the required memory and disk space to support the software package that is planned for distribution. This allows you to upgrade non-compliant
systems before the deployment begins, ensuring a higher overall project success rate. You can customize the hundreds of types of data that can be recorded when you gather information
during hardware and software inventory collection. This helps you to attain the appropriate balance between performance and inventory depth for your organization. SMS 2003 provides
control over which software files should be scanned. Software inventory can scan specific directories and drives, using environment variables to optimize the data-gathering process. SMS has
been designed to use Windows Management Instrumentation (WMI). SMS has access to data from many sources, including the Win32 API and Simple Network Management Protocol
(SNMP), which provides administrators with a broad base of inventory and configuration data.
In addition to the useful hardware inventory features, there is extensive support for software inventory as well. A granular file inventory search is available in SMS 2003 and can be configured
to retrieve only the necessary assets during discovery. This is done with wildcards, environment variables, and file properties to control software inventory searches more effectively. Other
options allow for compressed and encrypted files to be skipped. In addition, the Add/Remove Programs list and other software installed by Windows Installer technology can be queried to
validate against file inventory data in the case of corrupt or incomplete installations. This provides a check against pure file-based inventory data.
SMS also significantly reduces the time and complexity of maintaining and upgrading software for organizations with distributed networks. You can upgrade and configure each computer
from a central location or from multiple locations. You can schedule individual software files or software programs for distribution to specific computers. You can also initiate unattended

software installations to selected computers. Software installation packages can come ready for installation from Windows Installer using *.msi files or can be created with the SMS Installer.
Software distribution can be directed to computers based on collected information, including network and hardware configuration, group membership, and software installation status. If an
SMS client computer is added to a group, software is automatically sent to the client according to predefined administrative settings for that group. Likewise, new computers matching a
predefined destination, such as by IP subnet or installed peripheral, automatically receive specified packages or driver updates. Also there is a Courier Sender feature that allows software to
be sent between SMS sites by CD or other media, rather than across the network. This is particularly useful in situations where the available network bandwidth is low or too expensive to use
for the delivery of large update packages.
SMS can also be used to remove deployed software and applications from particular computers or groups. Software distribution uses Background Intelligent Transfer Service (BITS)
technology, which can transfer files from distribution points that are BITS-enabled. And if a file download is interrupted in progress, a checkpoint is set. You can resume the file download and
then proceed from the checkpoint rather than restarting the download from the beginning. On reconnection, any partial downloads to clients continue where they left off. There is no need to
restart transmissions because of a disconnected session.
One of the more important features of SMS that drives many administrators to use it is the support for software updates. Software update management in SMS is the process of keeping
computers and servers that are running Windows operating systems updated with security updates or patches, and includes the following functions:
Performing an inventory of the installed and applicable updates on managed computers
Evaluating and testing available updates
Authorizing and distributing the updates
Tracking software update compliance
You can use these tools to take advantage of the critical software updates that Microsoft provides for Windows operating systems, Microsoft Office, SQL Server, Exchange, and other system
software. Several software update management tools are installed by default on the SMS site server. These include the Distribute Software Updates Wizard and the Software Updates
Installation Agent, along with a collection of predefined reports for software updates. Let's take a look at those tools in greater depth to understand their function.
The Distribute Software Updates Wizard performs the following tasks:
Uses inventory information to analyze the applicable software update status for client computers
Provides a method of reviewing and authorizing suggested software updates
Downloads authorized software updates and installation information
Builds packages and advertisements tailored to specifications for each software update or set of updates
Distributes software update advertisements to client computers by using SMS software distribution
The Software Updates Installation Agent performs a number of functions as well. This tool evaluates advertised software updates against missing or previously installed updates on an SMS
client computer and installs the applicable updates. The Software Update Reports Predefined reports help you to view information that is gathered by the update inventory tools. With these
reports and with custom reports that can be designed through SQL Server, you can build entire dashboards that provide a picture of compliance and performance against service levels. Tools



available for download include the Security Update Inventory tool, which scans a client computer for installed software updates to Windows operating systems, Internet Explorer, SQL Server,
and other software.
In addition to software update management tools that are described in the previous section, SMS 2003 includes some other enhancements over the previous versions of SMS. One example
is the persistent notification for software updates. This is an icon that appears in the system tray whenever a user is logged on and there are pending, but uninstalled, software updates. When
the computer is in compliance, the notification area icon does not appear. The notification area icon can be used to support user needs as well. For instance, the program associated with the
icon can schedule installations and reboots to occur at convenient times of the day or facilitate the install of software updates immediately. The Unattended software update installation
provides a method to deploy mandatory updates to client computers silently. No notification icon appears in the notification area, and users with insufficient rights cannot terminate the
process in Task Manager.
Efficiently managing the software products, services, and applications deployed to an organization is important to IT. SMS 2003 does this with its software inventory and software metering
features. The focus of software metering in SMS 2003 is collecting and reporting software program usage data. You can use SMS 2003 software metering data to identify which applications
are being used and which users are running them along with the number of concurrent application usages, software license requirements, redundant software installations, and unused
software applications that can be reallocated.
Software metering is fully integrated with all other SMS components and is accessed through the SMS Administrator Console. In addition, SMS 2003 software metering data is now stored in
the SMS site database with other SMS data. SMS 2003 software metering includes software usage history, and enables trend analysis and audit reporting. You can use this information to
track software license usage and produce license compliance reports. An SMS site administrator can configure this process to suit your needs. They can also configure SMS 2003 to track
software usage on managed SMS client computers on and off the network. SMS clients record software usage even when they are disconnected from the network by uploading usage reports
either on a schedule or the next time a connection is available to the SMS site.
Summary and detail reports can be generated describing which applications were used by which users, for how long, and on which computers. Usage can be tracked by user or computer and
the reports can be created comparing concurrent usage data to current license ownership, helping organizations to ensure compliance and track usage for budgeting and planning purposes
as well.
Beyond the software update and metering features, there are some useful performance monitoring features in SMS 2003. The system provides a wide range of performance monitor counters
that are accessed using the Windows System Monitor. These counters are helpful for maintaining SMS, identifying problem areas, tuning SMS systems, and troubleshooting. System Monitor
gathers information about growth patterns that you can use to plan for future hardware growth. SMS 2003 also provides a comprehensive set of predefined, secure reports with information
about the client computers across the SMS hierarchy and the current state of managed systems across an organization. You can provide management and other SMS users with reports that
can be viewed using Internet Explorer. Reports include hardware and software inventory data, computer configuration details, and software deployment, deployment errors, and usage status.
SMS reports are extensible, enabling you to generate custom views and reports. You can use the SMS Administrator Console to create and manage reports. All reports are based on SQL, and
administrators and other users who do not have access to the SMS Administrator Console can run reports by using the Report Viewer in Internet Explorer. You can export and import reports by
using the Export Object Wizard and Import Object Wizard in the SMS Administrator Console, as shown in Figure 2-8. Use exported report files to share reports with other SMS administrators or
to import reports obtained from another SMS administrator. Using Report Viewer, you can also create dashboards, which are sets of reports displayed in a grid, in a single window to monitor
information about a variety of SMS objects or systems. All of these capabilities enable you to provide the right data to the right people, regardless of their status within SMS or knowledge of

the system.

Figure 2-8

This extensive set of features in SMS enables a full software deployment and lifecycle management solution that IT can rely on for critical systems management functions. However, some of
the features in SMS may not fit as well in certain IT environments or may require some complementary solutions. One of those solutions is Windows Server Update Services (WSUS). Let's take
a look at how WSUS can help to manage decentralized IT environments when SMS isn't the right fit.
Next Page


Next Page

WSUS: Update Services for Decentralized Environments
WSUS provides the features that administrators need to manage and distribute updates through a Web-based tool, which can be accessed from Internet Explorer on any Windows computer on
a corporate network. While similar to SMS, WSUS has fewer features and doesn't support updates for all Windows applications. WSUS is a tool that can be used to manage certain types of
updates or segments of computers where a simpler solution can work. This might include managing a sandbox network that for security reasons isn't connected to your main SMS instance and
doesn't require the level of management that SMS provides. It could also include the management of a smaller remote site that isn't covered under your organization's SMS licensing. While
WSUS doesn't support the software and hardware inventory features and is a much simpler tool, it can be a useful tool in your environment if deployed correctly.
When it comes to SMS and WSUS, some organizations may be able to choose between one or the other. While WSUS mirrors many of the capabilities in SMS, it is generally less functional
and flexible in comparison. See the following table for a comparison of features and capabilities.
Capability

Windows Server
Update Services

SMS 2003

Supported software for Content

Win2K, WS2003, WinXP Pro,

Office 2003, Office XP,
Exchange 2000, SQLServer
2000, MSDE

Same as WSUS and Win98
and can update any other
Windows-based software

Supported content types for
supported software

All software updates, critical
driver updates, Service Packs,
and Feature Packs

All updates, Service Packs,
and Feature Packs, and
supports update and app
installs for any Windows-based
software

Targeting content to systems

Simple

Advanced

Network bandwidth optimization

Yes


Yes

Patch distribution control

Simple

Advanced

Patch installation and scheduling
flexibility

Simple

Advanced

Patch installation status reporting

Simple

Advanced

Deployment planning

Simple

Advanced

Inventory management


No

Yes

Compliance checking

Simple

Advanced

Supported Software and Content

Update Management Capabilities

WSUS provides a central point of update for servers, clients, or other WSUS servers in your environment. The WSUS server that acts as an update source is called an upstream server. In a
WSUS implementation, at least one WSUS server in the network must connect to Microsoft Update to get available update information. The administrator can determine, based on network
security and configuration, how many other servers connect directly to Microsoft Update.
A client computer component for Automatic Updates is built into Windows 2000 with SP3, Windows XP, and Windows Server 2003 operating systems. Automatic Updates enables both server
and client computers to receive updates from Microsoft Update or from a server running WSUS. WSUS is the successor to Software Update Services (SUS). It builds on the features that SUS
provided and extends it by providing the following features:
More extensive updates for Microsoft products
The ability to automatically download updates from Microsoft Update by product and type
Ability to target updates to specific computers and computer groups
Ability to verify that updates are suitable for each computer before installation
Reporting capabilities
Data migration and import/export capabilities
Extensibility through an API
Additional language support for international customers
Better bandwidth utilization through BITS
WSUS is flexible enough to meet the update management needs of a wide range of organizations. Whether you're a small IT shop that relies on dial-up connectivity or a large business with

thousands of users distributed across multiple sites, the solution can function in your environment. Depending on the size of the organization, its location, and its connectivity infrastructure,
administrators can determine the most efficient way to scale out their WSUS servers to provide system update services. Let's look at some of the common scenarios for deploying WSUS
components in small, medium, and more restricted networks.
In a single WSUS server scenario, administrators can set up a server running WSUS inside their corporate firewall, which synchronizes content directly with Microsoft Update, and distributes
updates to client computers. In this case, a single WSUS server supporting many clients provides the interface to updates via Microsoft Update.
A number of configurations are possible for WSUS that incorporate many servers to help scale the solution in larger organizations or those with more sophisticated network environments.
WSUS servers can be partitioned logically to support different groups of client computers and servers. In this case, the individual WSUS server communications to Microsoft Update are in
support of a group of clients. Each WSUS server operates independently and is aware of only its own clients. An example of this configuration is shown in Figure 2-9.


Figure 2-9

Administrators can deploy multiple servers running WSUS that synchronize all content within their organization's intranet. In this scenario, only one WSUS server is exposed to the Internet.
This is the only server that downloads updates from Microsoft Update. This server is set up as the upstream server, and serves as the source to which the downstream server synchronizes. When
applicable, servers can be located throughout a geographically dispersed network to provide the best connectivity to all client computers. Communications across the network are limited to
the main upstream server and its downstream WSUS servers. If corporate policy or other conditions limit computer access to the Internet, administrators can set up an internal server running
WSUS. In this case, a server is created that is connected to the Internet but is isolated from the main corporate network. After downloading, testing, and approving the updates on this server,
the WSUS administrator can then export the update metadata and content to a CD, and then import the update metadata and content to servers running WSUS within the intranet via that
same CD.
As you can tell, WSUS provides an important set of features to enable you to update the software on your clients and servers in your IT environment. But more important than managing
software updates and system patching is having a complete story for management, monitoring, and remediation of issues whether they exist on your clients or servers. That is where MOM,
SMS, and WSUS working together deliver value to the IT administrator.
Next Page


Next Page

MOM, SMS, and WSUS: Better Together
MOM 2005, SMS 2003, and WSUS provide a comprehensive set of server monitoring, software deployment and management, and system update solutions that help IT administrators
manage the availability, performance, and security of Windows-based networks and applications. MOM provides central monitoring and automatic problem resolution for computer networks

whose volume scales-up to thousands of computers on the network. MOM can also continuously monitor user actions, application software, servers, and desktop computers running Windows
2000 Server or later.
Together with SMS, these tools can monitor, manage, and secure a wide range of resources, including computers, applications, and server farms. MOM provides proactive real-time system
monitoring for Windows-based servers and computers throughout the extended enterprise, and SMS can deliver the software update and systems inventory capabilities to provide a full set of
knowledge about the status of your information systems. The solution also delivers comprehensive event monitoring, alert management, reporting, and trend analysis for system incidents and
software usage patterns. While MOM can consolidate events and automatically determine which events are of critical importance to an administrator, SMS can help to determine what clients
have software installed on them, which are active, and what the usage patterns are.
Next Page


×