SCCM2012: Full Features/Capabilities

Holla Guys,

I’ve got a mini project going on! I’m compiling a list of features/capabilities in System Center 2012 Products so that at a glance, you will know what each of SC2012 components can or cannot do.

This list is still a Work In Progress(WIP) hence I would appreciate if you guys have any information to update or enhance this list further, it would be much appreciated.

* All in red are SP1 Features

System Center Configurations Manager 2012

User-Centric Management

  • Managing Users rather than Managing Machines\Devices
  • Moving to a State-based design, for applications, deployments, contents on DPs
  • Full application life cycle model: Install, Revision Management, Supersedence, & Uninstall
  • Understands and intelligently target the relationship between user systems
  • Management solution tailored for application

Empower Users (Consumerization of IT)

  • Device Freedom: Extends management to all devices connected to Exchange ActiveSync (Includes Non-Microsoft; IOS, Android & Symbian)
  • Optimized, personalized application experience: Evaluates user identity device type, and network capabilities to deliver great experience regardless of user’s locations
  • Application Self-Service: Offers an easy to use web catalog for highly secure employee self-provisioning.

User-Centric Device Management

Light Management:

  • Windows Phone 7
  • Nokia
  • Apple IOS
  • Google Android

Basic Management for all Exchange ActiveSync Connected Devices:

  • Exchange ActiveSync-Based Policy Delivery
  • Discovery and Inventory
  • Settings Policy
  • Remote Wipe

Full Management:

  • Windows Mobile
  • Windows CE, 5.0, 6.0
  • Windows Mobile 6.0, 6.1 & 6.5
  • Nokia Symbian

Integration of System Center Mobile Device Manager & Configuration Manager features:

  • · Secure over-the-air enrollment
  • · Monitor & Remediate out-of-compliance devices
  • · Deploy & Remove Applications
  • · Inventory
  • · Remote Wipe

Personalized Application Experience

SCCM 2012 examines the following:

  • User Identity
  • Application Dependencies
  • Devices Types
  • Network Bandwidth

It then determines which of the following ways to deliver the application to the users:

  • Full Install (MSI)
    • Local installation using Windows Installer
    • SCCM2012 Distribution PointTechnology delivers packaged software
    • User can require self-service styled from Web-Based Software Catalog
  • App-V
    • Streamed from Distribution Point or delivered as a local package for mobile/offline users
    • Virtual Formats of application can be requested self-service style from web-based Software Catalog
  • Device Formats
    • Windows Mobile CAB
    • Symbian
    • iOS (through Citrix)
    • SCCM 2012 Application Model can determine device category dynamically to provide correct format
  • Alternative Delivery
    • VDI Users
    • Presentation Layer (Locally Launched delivered Software Packages)
    • Remote Desktop (Full remote desktop redirection)

Key Features:

Asset Management

  • Hardware Inventory
    • Collects Full Inventory on first scan & subsequent on Delta Changes
    • Methods of Viewing
      • Create Queries that return devices based on a specific hardware configurations
      • Create query-based collections based on specific hardware configurations
      • Run reports that display specific details about hardware configurations
      • Use Resource Explorer to view detail information
    • o Extending Configuration Manager Hardware Inventory
      • Add or Remove Inventory Classes from SCCM Consoles
      • NOIDMID Files (Asset Number)
      • IDMIF Files (Projectors, Photocopiers, Network Printers)
  • Software Inventory
    • Collects Full Inventory on first scan & subsequent on Delta Changes
    • Methods of Viewing
      • Create Queries that return devices based on a specific hardware configurations
      • Create query-based collections based on specific hardware configurations
      • Run reports that display specific details about hardware configurations
      • Use Resource Explorer to view detail information
  • Asset Intelligence
    • Catalog (Provides over 300,000 software tiles & versions)
    • Asset Intelligence Home Page (Summary Dashboard views of Asset Intelligence Catalog)
    • Asset Intelligence reports
      • Hardware (Present information about USB devices, hardware that must be upgraded, and even computers that are not ready for a specific software upgrade.)
      • License Management (Provide data about licenses in use)
      • Software (Reports can be used to identify adware, spyware, and other malware, and identify software redundancy to help streamline software purchasing and support)
    • Supports 7 mandatory identification tags that are defined in ISO/IEC 19770-2
    • Collects information about Application Virtualization 5 applications & AppV 4 Apps.
  • Software Metering (Collect software usage data)
    • How many copies of a particular software program have been deployed to the computers in your organization. Among those computers, you can determine how many users actually run the program.
    • How many licenses of a particular software program you have to purchase when you renew your license agreement with the software vendor.
    • Whether users are still running a particular software program. If the program is not being used, you might retire the program.
    • Which times of the day a software program is most frequently used.
  • Remote Management
  • Power Management (Monitor & reduce Power Consumption)
  • Remote Control (remotely administer, provide assistance, or view any client computer)
  • Remote control now supports sending the CTRL+ALT+DEL command to computers.
  • You can apply different remote control settings to collections of computers by using client settings.
  • You can lock the keyboard and mouse of the computer that is being administered during a remote control session.
  • Copy and paste functionality between the host computer and the computer
  • If the remote control network connection is disconnected, the desktop of the computer that is being administered will be locked.
  • You can start the remote control viewer from the Windows Start menu.
  • Remote control client settings can automatically configure the Windows Firewall on client computers to allow remote control to operate.
  • Remote control supports connecting to computers with multiple monitors.
  • A high visibility notification bar is visible on client computers to inform the user that a remote control session is active.
  • The account name of the administrative user who starts the remote control session is automatically displayed to users during the remote control session. This display helps users to verify who is connecting to their computer.
  • If Kerberos authentication fails when you make a remote control connection to a computer, you are prompted to confirm that you want to continue before Configuration Manager falls back to using the less secure authentication method of NTLM.
  • Only TCP port 2701 is required for remote control packets
  • Responsiveness for low-bandwidth connections
  • vPro Integration
    • Out of Band Management Task
    • Powering on one or many computers (for example, for maintenance on computers outside business hours).
    • Powering off one or many computers (for example, the operating system stops responding).
    • Restarting a nonfunctioning computer or booting from a locally connected device or known good boot image file.
    • Re-imaging a computer by booting from a boot image file that is located on the network or by using a PXE server.
    • Reconfiguring the BIOS settings on a selected computer (and bypassing the BIOS password if this is supported by the BIOS manufacturer).
    • Booting to a command-based operating system to run commands, repair tools, or diagnostic applications (for example, upgrading the firmware or running a disk repair tool).
    • Configuring scheduled software deployments to wake up computers before the computers are running.


  • Software Update Management
    • Software Updates
    • Auto-Deployment Rules (Auto deploy)
    • State-based Update Groups (Deploy to particular group)
  • Operating System Deployment
    • Operating System Deployment
      • Offline Servicing of Images
      • Boot Media Updates (Auto detect the correct Management Point & OS Images)
      • USMT 4.0 (shadow copy & hardlinking supported with scans to minimize syntax errors)
    • Task Sequence
      • Default Task Sequence Optimized for OS Deployment starting from Windows 7
      • Supports computers that are in UEFI mode
      • Default Task Sequence automatically partitions computer based on whether it was booted in UEFI mode or BIOS mode.
  • Content Management
    • Distribution Points
    • Preferred Distribution Points
    • Bandwidth Throttling & Scheduling
    • PXE & Multicast
  • Content Management
    • Prestaging Content
    • Managing Content
    • Content Monitoring & Validation
  • App-V Integration (Provision Software without installing on local computers)
  • Mobile Device Management
  • Internet Based Client Management
  • SCCM Supported Configurations:
    • Support Windows Server 2012 on Site Systems & Clients
    • Support SQL Server 2012 for Configuration Manager database
    • PowerShell cmdlets are available for Configuration Manager Automation
    • Distribution Points can be deployed in Windows Azure
    • Support for multiple Software Update Points(SUP) & Multiple Management Points
    • Email alert subscriptions are now supported for all features
  • Compliance Management

    • Unified Settings Management across Servers, Desktops & Mobile Devices
    • Reports configuration drift & auto remediate via registry, WMI & scripts
  • Available Compliance Settings:
    • Apply Gold System Template
    • Microsoft Compliance Packs
    • Gramm–Leach–Bliley Act (GBLA)
    • Health Insurance Portability and Accountability Act (HIPAA)
    • Sarbanes–Oxley Act (SOX)
    • European Union Data Protection Directive (EUDPD)
    • Federal Information Security Management Act (FISMA)
  • Monitoring Client Activity, Health & Auto Remediate
    • Server-Side
    • Policy Request
    • Hardware & Software Inventory
    • Heartbeat DDR
    • Status Message
  • Client Side Monitoring/Remediation
    • Dependent Windows Components & Services
    • Configuration Manager Client prerequisites
    • WMI repository & namespace evaluation
    • In-console & web reporting
  • Server Monitoring
    • Alerts – Near Real-Time Awareness for Changes
    • Monitor – Status of your DB replication
  • Windows 8 Supports:
    • Metered Internet Connections
    • Always On Always Connected
      • Detects whether networking is on or off
      • Detects whether devices is on battery power or plugged in
      • Detects the amount of battery power remaining
      • Detects whether devices is in idle mode
      • Detects whether devices is in its Windows Automatic Maintenance Window
    • User Data & Profile Configurations items can be configured for Folder Redirection, Offline Files and Roaming Profiles


    • Role-Based Administration
    • Network Access Protection
    • Endpoint Protection (Manage antimalware policies and Windows Firewall security)
    • Tight Integration with Active Directory

    Beyond Windows

    • Supports AIX, HP-UX & RedHat Enterprise
    • Hardware inventory (for a set of core classes and properties), and viewing inventory with Resource Explorer. This includes listing of installed packages (e.g. RPMs) like Windows Add/Remove Programs list.
    • Ability to create dynamic collections containing Windows, Linux, and/or UNIX computers, based hardware inventory queries
    • Classic software distribution (packages and programs) — can distribute Linux/UNIX applications, software updates, or run arbitrary scripts
  • Supports MAC Computers.
    • MAC OS X Configuration Items enables:
    • Evaluate & Remediate property list (.plist) Settings
    • Can utilize Shell Scripts to evaluate & remediate other MAC settings
  • Supports deployment of applications to MAC OS
  • Reporting

    • Over 300 Out of the Box Drilldown Report
    • Customizable Reports
    • Report based on SQL Reporting Services


    Alright, that’s all for now, hope you guys find it useful! Please do share if I’ve missed any out, if you would like a Microsoft Word copy, please feel free to download it here. 

    Signing Off

    Post a comment or leave a trackback: Trackback URL.


    • Arjun Kanuri  On May 3, 2013 at 9:11 am

      I usually do not create a comment, but after reading through some of the responses on this page SCCM2012: Full
      Features/Capabilities | 1st Aid Kit. I do have a few questions for you if
      it’s okay. Is it only me or does it appear like a few of the remarks appear like they are written by brain dead folks? 😛 And, if you are writing on additional online social sites, I would like to follow you. Could you make a list of every one of all your social sites like your twitter feed, Facebook page or linkedin profile?

    Leave a Reply

    Fill in your details below or click an icon to log in: Logo

    You are commenting using your account. Log Out /  Change )

    Google+ photo

    You are commenting using your Google+ account. Log Out /  Change )

    Twitter picture

    You are commenting using your Twitter account. Log Out /  Change )

    Facebook photo

    You are commenting using your Facebook account. Log Out /  Change )


    Connecting to %s

    %d bloggers like this: