Product Reviews

Roll 'Em Out

Microsoft’s BackOffice solution to software deployment, Systems Management Server (SMS) 2.0, includes a great deal of functionality beyond simply installing applications, so we can’t ignore it. SMS 2.0 is the only product reviewed that performs hardware and software inventory—a feature that many administrators don’t realize they need until they actually use it. Inventory and licensing information is stored in a Microsoft SQL Server database. This is both an advantage and a disadvantage; while SQL Server makes the information easily accessible, it’s costly and not all organizations have a database administrator on staff.

SMS also includes a powerful version of Network Monitor that can record packets as they cross your network. If you understand how to use a protocol analyzer, this “sniffer” is an incredibly valuable tool for troubleshooting network applications. Network Monitor is included with NT 4.0 and Windows 2000, but that version has functionality removed to stop users from watching each other’s traffic.

One of the most challenging aspects of managing thousands of computers on a network is physically moving from system to system. SMS includes a remote control utility that allows a systems administrator to control the graphical user interface of Windows-based clients. This makes it simple to change settings on systems in remote offices, interactively troubleshoot problems with users over the phone, or manage servers that are isolated in a data center.

However, for all of its functionality, SMS doesn’t completely replace Ghost nor Express. You’ll still need one of these tools if you wish to automate the installation of a disk image. Ghost is an excellent compliment to SMS 2.0, because very little functionality is duplicated between the two application suites.

About the Author

Tony Northrup, MCSE, Compaq ASE, lives in the Boston area and is currently a systems architect at Genuity. He’s the author of Introducing Windows 2000 Server (Microsoft Press) and NT Network Plumbing (IDG Books), and co-author of Networking Essentials Unleashed (SAMS Publishing).

Featured

  • RAMBleed Side-Channel Attack Method Disclosed by Researchers

    Academic researchers this week published information about another side-channel attack method, called "RAMBleed," that can expose information from memory chips, including encryption key information.

  • Penguin

    Windows 10 Preview Build 18917 Shows Off New Linux Integration

    Microsoft's latest Windows 10 "fast-ring" preview release is showcasing a coming Delivery Optimization enhancement, along with the ability to try the newly emerged Windows Subsystem for Linux version 2.

  • Customizing Microsoft Office 365

    While the overall look and feel of Office 365 is pretty standard across organizations, there are several ways to personalize it and make it fit better with your company's specific needs.

  • Microsoft 365 Business Tenants Getting Conditional Access and Trouble-Ticket Features

    Microsoft added its conditional access security service to Microsoft 365 Business subscriptions, according to a Wednesday announcement, and it also added new trouble-ticket features for Microsoft 365 administrators.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.