Glossary for Microsoft System Center 2012 Configuration Manager
Updated: May 14, 2015
Applies To: System Center 2012 Configuration Manager, System Center 2012 Configuration Manager SP1, System Center 2012 Configuration Manager SP2, System Center 2012 R2 Configuration Manager, System Center 2012 R2 Configuration Manager SP1
Term |
Definition |
---|---|
Active Directory Delta Discovery |
A discovery option that allows Configuration Manager to discover only new or changed resources in Active Directory independently of a full discovery cycle. |
Active Directory Forest Discovery method |
A Configuration Manager discovery method that searches for Active Directory sites and subnets in Active Directory forests. |
Active Directory Group Discovery method |
A Configuration Manager discovery method that searches for the group memberships of computers and users by polling Active Directory Domain Services. |
Active Directory System Discovery method |
A Configuration Manager discovery method that searches for system resources by polling Active Directory Domain Services. |
Active Directory User Discovery method |
A Configuration Manager discovery method that searches for computer user resources by polling Active Directory Domain Services. |
Active Management Technology (AMT) |
See other term: Intel Active Management Technology |
active software update point |
For Configuration Manager with no service pack: The software update point for a site that interacts with Windows Server Update Services (WSUS) to configure software updates settings and manage software updates synchronization. The active software update point can accept connections from the intranet and the Internet. |
Application Administrator |
A security role that grants permissions to administrative users so that they can perform both the Application Deployment Manager role and the Application Author role. |
Application Author |
A security role that grants permissions to administrative users so that they can create, modify, and retire applications. |
Application Catalog web service point |
A site system role that provides software information to the Application Catalog website from the Software Library. |
Application Catalog website point |
A site system role that provides users with a list of available software from the Application Catalog. |
Application Deployment Manager |
A security role that grants permissions to administrative users so that they can deploy and monitor applications. |
Asset Intelligence |
A Configuration Manager feature that allows administrators to inventory and manage software license usage throughout their enterprise. |
Asset Intelligence catalog |
A Configuration Manager catalog that contains the categorization and identification information for software titles and versions and is used to classify inventoried software. |
Asset Intelligence synchronization point |
A site system role that connects to Microsoft to download Asset Intelligence catalog information and upload uncategorized titles so that they can be considered for future inclusion in the catalog. |
Asset Manager |
A security role that grants permissions to administrative users so that they can manage the Asset Intelligence synchronization point, Asset Intelligence reporting classes, software inventory, hardware inventory, and metering rules. |
assigned management point |
A management point that is assigned to the Configuration Manager client. |
assigned site |
A site to which a Configuration Manager client is currently assigned. |
binary delta replication |
A Configuration Manager process that copies only the changed portions of a package or content file rather than the entire file when an update has been made. |
boundary |
An IP subnet, IP address range, IPv6 prefix, or Active Directory site that identifies the network location of clients in the Configuration Manager hierarchy. |
central administration site |
The Configuration Manager site that coordinates intersite data replication across the hierarchy by using Configuration Manager database replication. This site also enables the administration of hierarchy-wide configurations for client agents, discovery, and other operations. |
certificate registration point |
A site system role that communicates with a server that runs the Network Device Enrollment Service to manage device certificate requests that use the Simple Certificate Enrollment Protocol (SCEP). |
client notification |
A Configuration Manager capability that is used to notify clients to download configuration changes as soon as possible. |
cloud-based distribution point |
A distribution point installed as a cloud service. |
collection |
A set of resources in the Configuration Manager hierarchy. |
company portal |
A self-service portal that lets users download apps to mobile devices that are enrolled by using the Microsoft Intune connector. |
Compliance Settings Manager |
A security role that grants permissions to administrative users so that they can define and monitor compliance settings. |
component server |
A server that runs Configuration Manager services. When you install all the site system roles except for the distribution point role, Configuration Manager automatically installs the component server. |
Configuration Manager Application Catalog |
The web-based view of the applications that is available for a user to search, browse, request, and install Windows-based applications. |
Configuration Manager Software Center |
The end-user program on Windows-based computers that lets the user set preferences for how their software is installed. End users can also use the Configuration Manager Software Center to request, install, remove, and monitor the software that is deployed by using Configuration Manager. |
Configuration Manager software inventory |
A Configuration Manager feature that automatically gathers information about software on client computers. |
Configuration Manager software metering |
The Configuration Manager feature that monitors software usage on client computers. |
database replication |
A type of data replication in Configuration Manager that directly transfers data between databases of two sites in a hierarchy. |
delta inventory file |
A file generated after Configuration Manager performs a complete inventory that contains only hardware or software properties that were added, removed, or changed since the previous inventory cycle. |
delta replication |
The copying of only the changed files in a Configuration Manager package when an update has been made to the package. |
deployment purpose |
An application state that is associated with the deployment of software, such as Available or Required. |
deployment type |
A technology that is used to deploy an application to devices. A deployment type is contained in an application; for example, Windows Installer could be a deployment type for the “Visio 2007” application. |
discovery data |
A set of properties collected by a discovery method that reflects the attributes of a Configuration Manager resource. |
discovery data record (DDR) |
The file format (.ddr) and the actual file that is used by Configuration Manager to report discovery data to a Configuration Manager site database. |
distribution point |
A site system role that contains source files for clients to download, such as application content, software packages, software updates, operating system images, and boot images. |
distribution point group |
A set of distribution points that you can manage as a single entity. |
Endpoint Protection Manager |
A security role that grants permissions to administrative users so that they can define and monitor security policies. |
Endpoint Protection point |
A site system role that Configuration Manager uses to accept the Endpoint Protection license terms and to configure the default membership for Microsoft Active Protection Service. |
enrollment point |
A site system role that uses PKI certificates for Configuration Manager to enroll mobile devices and Mac computers, and to provision Intel AMT-based computers. |
enrollment proxy point |
A site system role that manages Configuration Manager enrollment requests from mobile devices and Mac computers. |
Exchange Server connector |
A Configuration Manager technology that connects to Exchange Server to discover and manage mobile devices. |
fallback site |
The site in the hierarchy that clients are assigned to when they are installed by using automatic site assignment and they are not in a boundary group that has an assigned site. |
fallback status point |
A site system role that helps you monitor client installations to identify the clients that are unmanaged because they cannot communicate with their management point. |
Full Administrator |
A security role that grants all permissions in Configuration Manager to an administrative user. |
global conditions |
A setting or an expression that is used to define rules that specify how an application is deployed on client devices. See also: requirement rules |
global data |
A set of administrator-created objects that are replicated to all sites throughout the hierarchy. Secondary sites receive a subset of this data. See also: local data |
guardian computer |
A computer that runs a wake-up proxy service that can wake up other computers. |
Heartbeat Discovery method |
A Configuration Manager discovery method that is used to update discovery data records (DDRs) for each Configuration Manager client on a set schedule to ensure that they remain current in the site database. |
IDMIF file |
A type of Management Information Format (MIF) file that can be used to add new architectures or updates to existing architectures in the Configuration Manager site database to accommodate custom hardware inventory properties. |
incremental collection member evaluation |
A process that periodically scans for new or changed resources from the previous collection evaluation and then updates the collection membership with only these resources. |
Infrastructure Administrator |
A security role that grants permissions to administrative users so that they can perform migration tasks and create, delete, and modify the Configuration Manager server infrastructure. |
Intel Active Management Technology (AMT) |
An Intel networking management technology that is supported by Configuration Manager out of band management, which enables a Configuration Manager administrator to manage desktop computers independently from the Configuration Manager client or the computer operating system. |
Internet-based client management |
A Configuration Manager feature that lets you manage computers that have the Configuration Manager client agent but do not connect into the network by means of a VPN or dial-up connection. |
Internet-based site system |
A site system role that allows connections from clients when they are managed over the Internet. |
Internet-based software update point |
For Configuration Manager with no service pack: The software update point for a site that accepts communication from only client computers on the Internet. There can be only one active Internet-based software update point. |
local data |
A set of objects that are automatically created by Configuration Manager. This data is not replicated to other sites. See also: global data |
maintenance window |
A period of time, defined by administrators, when changes can be made on the computers that are members of a Configuration Manager collection. |
Managed Object Format (MOF) |
The file type (.mof), based on the Interface Definition Language (IDL), that describes management information. The MOF syntax is a way to describe object definitions in textual form. |
management controller |
The hardware and firmware component on computer motherboards that supports out of band management. |
Management Information Format (MIF) file |
The file type (.mif) that can be used to modify the Configuration Manager database by creating architectures, object classes, and attributes. |
management point |
A site system role that provides policy and service location information to clients and receives configuration data from clients. |
manager computer |
A computer that runs a wake-up proxy service to check whether other computers are awake. |
membership rule |
The criteria by which Configuration Manager evaluates whether a resource belongs to a particular collection. |
Network Discovery method |
The discovery method that lets the Configuration Manager administrator discover IP-addressable network resources. |
NOIDMIF file |
A custom Management Information Format (MIF) file that Configuration Manager administrators can use to modify or append object classes and properties to existing client inventory data. |
nonpeak power plan |
A Configuration Manager power plan that you can configure with power settings that are applied outside peak hours or business hours. |
operating system deployment |
A Configuration Manager feature that allows you to create operating system images and deploy those images to computers. |
Operating System Deployment Manager |
A security role that grants permissions to administrative users so that they can create, deploy, and manage operating system images. |
Operations Administrator |
A security role that grants permissions to administrative users so that they can perform all actions in Configuration Manager except for those that are required to manage security. |
out of band management |
A feature in Configuration Manager that allows computers to be managed outside standard management channels by connecting to a supported management controller. This management channel is independent from the Configuration Manager client and the operating system. |
out of band service point |
A site system role that provisions and configures Intel AMT-based computers for out of band management. |
package |
A Configuration Manager object that contains the content files and instructions for distributing programs, software updates, boot images, operating system images, and drivers to Configuration Manager clients. |
package definition file |
An ASCII text file that contains predefined software distribution objects, such as programs and packages that are used for software deployment. |
package share |
A network share that includes the software installation files for a package. |
package source directory |
A directory that contains Configuration Manager package source files that are used for package distribution. |
package update |
A Configuration Manager operation that increments the package version and updates all distribution points with only the files that have changed in the package. |
peak power plan |
A Configuration Manager power plan that you can configure with power settings that are applied during the peak hours or business hours that you specify. |
power plan |
A group of Windows-based power settings that you can apply to computers by using Configuration Manager power management. |
preferred distribution point |
A distribution point with an associated boundary group that includes the client’s current location on the network. |
prestart command |
A script or an executable file that supports operating system deployment and that can interact with the user in Windows PE before a task sequence runs. |
primary device |
A software deployment condition that defines one or more devices that a specific user uses. A primary device is typically determined either by frequency of use or by business requirements. |
primary site |
A Configuration Manager site that has clients assigned to it and that processes client-generated data. |
primary user |
The main user of a device. A device can have more than one primary user. |
Read-only Analyst |
A security role that grants permissions to administrative users so that they can view all objects in Configuration Manager. |
reinstate |
To bring an application out of retirement and back into service. |
remediation server |
A server that is used to update the computer state by providing software updates, new antivirus signatures, additional intrusion detection signatures, and so on. |
Remote Tools Operator |
A security role that grants permissions to administrative users so that they can run and audit remote administration tools. |
Replication Link Analyzer |
A Configuration Manager tool that detects, analyzes, and remediates database replication issues in a hierarchy. |
reporting services point |
A site system role that integrates with SQL Server Reporting Services to create and manage reports for Configuration Manager. |
Resource Explorer |
A Configuration Manager console feature that displays the hardware and software inventory that has been collected from clients. |
retire |
To remove deployed applications from service. Also, to remove from service mobile devices that are enrolled by Microsoft Intune. |
role-based administration |
The method in which Configuration Manager secures objects. |
secondary site |
A child of a primary Configuration Manager site. |
Security Administrator |
A security role that grants permissions to administrative users so that they can add, remove, and modify administrative users and their administrative assignments. |
security role |
A set of permissions that defines what an administrative user can do and see in the Configuration Manager console. |
security scope |
A method that, when used in conjunction with security roles, limits which objects an administrative user can use and see. |
sender |
A Configuration Manager communication mechanism that lets you create and send package information to another Configuration Manager site by using standard network channels. |
shared distribution point |
A distribution point in a Configuration Manager source hierarchy that clients can use to download the content and packages that have been migrated. |
site assignment |
The process of associating a resource to a Configuration Manager site. |
site code |
A three-character code that Configuration Manager uses to uniquely identify a Configuration Manager site. |
site control file |
An ASCII text file that contains the settings of a Configuration Manager site. |
site data |
The operational information that is created by a Configuration Manager site and that is replicated to the central administration site. Site data includes hardware inventory data, status messages, alerts, and the results of query-based collection rules. |
site database server |
A server that hosts the SQL Server database, which stores information about Configuration Manager assets and site data. |
site server |
A computer on which you run the Configuration Manager setup program and which provides the core functionality for the site. |
site system |
A computer that provides Configuration Manager functionality to a Configuration Manager site. |
site system cloud service |
A site system role that is installed to a cloud service. |
SMS Executive |
The primary Configuration Manager service that accesses and updates the database and manages many different process threads. |
SMS Provider |
A WMI provider that allows read and write access to the Configuration Manager site database. |
software update point |
A site system role that integrates with Windows Server Update Services (WSUS) to provide software updates to Configuration Manager clients. |
stand-alone site |
A Configuration Manager primary site with no parent sites and no child sites. |
state message |
A message type that is used to identify at what stage a Configuration Manager process has succeeded, failed, or stopped. |
state migration point |
A site system role that stores user state data when a computer is migrated to a new operating system. |
status filter rule |
A filtering rule that controls how status messages are reported and viewed. |
status message |
A message generated by Configuration Manager and viewed in the Status Message Viewer and in reports. |
status message threshold |
The limit that defines when the summary status should indicate OK, Warning, or Critical status. |
Status Message Viewer |
A tool in the Configuration Manager console that is used to browse the status messages in the Configuration Manager site database. |
status summarizer |
A component that consolidates the data generated by Configuration Manager status messages into a succinct view of the status of a component, a server, a package, or a deployment. |
supersedence |
A deployment behavior that specifies how new software replaces existing software. |
System Health Validator point |
A site system role that validates Configuration Manager Network Access Protection (NAP) policies. It must be installed on a NAP health policy server. |
task sequence |
The mechanism in Configuration Manager that is used to perform multiple steps or tasks on a client computer at the command-line level without requiring user intervention. |
tiered secondary |
In Configuration Manager, a secondary site that receives deployment content from another secondary site. |
trusted root key |
An encryption key used in Configuration Manager to help clients identify valid management points. |
uninterpreted configuration item |
An imported configuration item that cannot be interpreted by the Configuration Manager console and whose properties cannot be viewed or edited in the console. |
unmanaged client |
A client that is not communicating with its assigned site in the Configuration Manager hierarchy and therefore cannot receive policy or upload inventory data. |
user data and profiles configuration item |
A Configuration Manager capability that lets you deploy configuration items that manage user data, roaming profiles, and offline files on client computers. |
user device affinity |
The mapping of a user to a device, which enables deployment conditions and simplifies the complexity of the deployment. |
virtual environment |
A Configuration Manager capability that allows you to deploy and manage applications that run in the same virtual space on client computers and can interact with one another. |
wake-up packet |
A packet that is sent by a Configuration Manager primary site server to bring computers out of a sleep state so that they can perform a management function, such as installing a required software update. |
wake-up proxy |
A wake-up solution that extends Wake On LAN by using a Configuration Manager client to wake up other computers in the subnet. |
Microsoft Intune connector |
A site system role that uses Microsoft Intune to manage mobile devices in the Configuration Manager console. |
wipe |
To remove all data from a mobile device that has been lost, stolen, or compromised. |
Other Resources for this Product
TechNet Library main page for System Center 2012 Configuration Manager
Documentation Library for System Center 2012 Configuration Manager