Best Practices for Configuration Manager
What all links/ documents are available that summarize the best practices for Configuration Manager?
Applications and Packages
Software Updates
Operating System Deployment
Hardware/Software Inventory
Hi,
I think this may help you
system center 2012 configuration manager best practices
SCCM 2012 task-sequence best practices
SCCM 2012 best practices for deploying application
Configuration Manager 2012 Implementation and Administration
Regards, Ibrahim Hamdy
Similar Messages
-
Best practice for audit management
Hi,
Is there any best practice for audit management in SAP ?Hi,
You can check these links and white papers which explains the business scenarios and best practices
http://www50.sap.com/businessmaps/9AD1FC0540D0479CA76C4CA1EE9AF668.htm
http://www.sap.com/solutions/business-suite/erp/brochures/index.epx - "Audit management with SAP software".
Regards,
Keerthi -
Best Practices for Content Management
Hi All,
Could anybody suggest me what are the best practices for Content Management.
Regards,
TomHi Rajan,
Even I want the same. I shall be very thankfull to you if you can send me also.
My mail ID is [email protected]
Best Regards,
Chamkaur
Message was edited by:
Chamkaur Brar -
JSF - Best Practice For Using Managed Bean
I want to discuss what is the best practice for managed bean usage, especially using session scope or request scope to build database driven pages
---- Session Bean ----
- In the book Core Java Server Faces, the author mentioned that most of the cases session bean should be used, unless the processing is passed on to other handler. Since JSF can store the state on client side, i think storing everything in session is not a big memory concern. (can some expert confirm this is true?) Session objects are easy to manage and states can be shared across the pages. It can make programming easy.
In the case of a page binded to a resultset, the bean usually helds a java.util.List object for the result, which is intialized in the constructor by query the database first. However, this approach has a problem: when user navigates to other page and comes back, the data is not refreshed. You can of course solve the problem by issuing query everytime in your getXXX method. But you need to be very careful that you don't bind this XXX property too many times. In the case of querying in getXXX, setXXX is also tricky as you don't have a member to set. You usually don't want to persist the resultset changes in the setXXX as the changes may not be final, in stead, you want to handle in the actionlistener (like a save(actionevent)).
I would glad to see your thought on this.
--- Request Bean ---
request bean is initialized everytime a reuqest is made. It sometimes drove me nuts because JSF seems not to be every consistent in updating model values. Suppose you have a page showing parent-children a list of records from database, and you also allow user to change directly on the children. if I hbind the parent to a bean called #{Parent} and you bind the children to ADF table (value="#{Parent.children}" var="rowValue". If I set Parent as a request scope, the setChildren method is never called when I submit the form. Not sure if this is just for ADF or it is JSF problem. But if you change the bean to session scope, everything works fine.
I believe JSF doesn't update the bindings for all component attributes. It only update the input component value binding. Some one please verify this is true.
In many cases, i found request bean is very hard to work with if there are lots of updates. (I have lots of trouble with update the binding value for rendered attributes).
However, request bean is working fine for read only pages and simple binded forms. It definitely frees up memory quicker than session bean.
----- any comments or opinions are welcome!!! ------I think it should be either Option 2 or Option 3.
Option 2 would be necessary if the bean data depends on some request parameters.
(Example: Getting customer bean for a particular customer id)
Otherwise Option 3 seems the reasonable approach.
But, I am also pondering on this issue. The above are just my initial thoughts. -
Best practice for configuring virtual drive on UCS
Hi,
I have two C210 M2 Server with LSI 6G MegaRAID 9261-8i Card with 10 hard drives of each 135GB. When I tried the automatic selection for the RAID configuration, the system has created one virtual drive with RAID 6. My concern is what the best practice to configure virtual drive? Is it RAID 1 and RAID5 or all in one drive with RAID6? Any help will be appreciated.
Thanks.Since you are planning to have UC apps on the server, Voice applications have specified their recommendations here.
http://docwiki.cisco.com/wiki/Tested_Reference_Configurations_%28TRC%29
I believe your C210 server specs could be matching TRC #1, where you need to have
RAID 1 - First two HDDs for VMware
RAID 5 - Remaining 8 HDDs as datastore for virtual machines ( CUCM and CUC )
HTH
Padma -
SAP HCM Implementation: Best Practice for configuring
Hi,
This is my first independent project of HCM implementation. I have just started the system configuration. Done with setting up the PA, PSA, EG and ESG. Assigned to CC. At this stage, I have a very basic question which is, what is the best practice for the next steps of configuration. What do I go to next, step up the OM in the SAP EasyAccess Menu? How should I go from here?
Would really appreciate some explanatory assistance.
Thanks in advance.
Papri
Edited by: papri_rc on Jul 8, 2011 6:40 AMIts all depends on business requirement
at starting as i advised you review your BBP , make sure you configure everything
for your reference iam giving the following data for OM and PA config..
as part of OM
1. depict client org structure using simple maintenance , with this you can create large structures in less time(while doing org structure be careful and refer BBP)
2. maintain integration switches
3. maintain plan version
4. maintain number ranges
Configuration for PA
HR Enterprise /PersonnelStructure
u2022 Personnel Areas
u2022 Personnel Sub Areas
u2022 Employee Group
u2022 Employee Sub Group
u2022 Assignment of Personnel Area to Company Code
u2022 Assignment of Employee Sub Group to Employee Group
Basic Settings
1. Maintain Number Range Intervals for Personnel Numbers
2. Determine defaults for number ranges
Personal Data
1. Create Forms of Address
2. Create Marital Status
Family
1. Defined Possible Family Members
Addresses
1. Create Address Type
Communication
1. Create Communication Types
Contractual and Corporate Agreements
1. Define Contract Types
2. Determine periods of notice
Employee Qualifications
1. Create education establishment types
2. Define Education Training
3. Create educational Certificates
4. Create branches of study
5. Determine permissible certificates for education type
Infotype Menus
1. User Group Dependency on Menus and Info groups
2. Infotype Menu
3. Determine choice of Infotype menus
4. Infotype Menus
Actions
1. User Group Dependency on Menus and Infogroups
2. Info Group
3. Personnel Action Types
4. Create reasons for personnel actions
5. Change Action Menu
*Developments(ABAPconsultant will do) *Field Enhancements (any field enhancements in infotypes)
Customer Infotypes -Develop any customer infotypes if required for the business from 9000 series
Edited by: Piscian . on Jul 8, 2011 9:08 AM -
Any best practice for Key Management with Oracle Obfuscation?
Hi,
I was wondering if anyone is aware if there are any best practices regarding key management when using Oracle's DBMS_OBFUSCATION_TOOLKIT? I'm particularly interested in how we can protect the encryption/decryption key that we would use.
Thanks,
JimOracle offers this document, which includes a strategy for what you're after:
http://download-west.oracle.com/docs/cd/B13789_01/network.101/b10773/apdvncrp.htm#1006234
-Chuck -
What are the best practices for Database management and performance tuning?
Hello,
I want to ensure that I am using the best practices for managing and maintaining our Database.
Is there any documentation out there that outlines how to maintain and ensure top performance out of our database?
Thank you!
John SeftonI appreciate the responses, however this is not the information I am looking for.
I am specificaly looking for best practices invloving the managment and performance tuning.
Example: are their tools that I can install that will monitor the size and response time of the database and alert me if there is degradation in performance?
Are there specific periodic activities I should be doing to garuntee that my database will continue to function that way it is supposed to?
Or is this a fire and forget solution that does not need this attention? -
What is best practice for remotely managing bank of switches over POTS
I need to be able to have a back door into several catalyst switches and ASA.
What is the best practice for accessing them remotely. ?Just place a modem into any console port. Ideally you use a terminal server, but is not always really needed.
-
Best Practice for certificate management for security
We have been working on moving toward future implementation of document encryption and electronic signatures using Adobe Acrobat 9 Standard. I have read 21 CFR 11, and accompanying guidances. Are there any best practice recommendations for how to meet these standards using this technology?
There are some requirements that I am unsure of how to best implement.
How should we document that we have verified the identity of the individual?
How should we periodically force revision of passwords, or document that this is done since no one knows each other’s passwords?
How should we manage certifications so that we can show we deactivate obsolete ones?
How do we monitor to detect attempts at unauthorized access/use of electronic signatures?
If our organization wants to become our own certification authority, what documentation do we need or process should we use to validate our certificates?Hi Shadya10,
Those are some pretty big questions! I'm not saying that your company can't become a CA because obviously there are companies that have, but this is almost something that happens at the state level if your not already intimate with PKI. Just from the tenor of your questions I'd suggest you contract with a reputable, existing CA to provide your PKI infrastructure. I could explain key management and how revocation checking works, but really if you're asking in an Adobe forum this is way more than you want to be dealing with.
If you're really interested you need to start with reading RFC 5280.
Steve -
Best practice for window management
Hi all,
I'm pretty new at flex and I have to develop an application.
I don't know yet what the best practices are to have a consistent layout and code
- The program must have different views (scheduling, settings, adminwindow, ....)
What is the best way to switch between these views? Should I use a tabbar or a buttonbar?
- What should a view be made off? Should I use different states, or should I switch between windows, or use something else?
That's it for now, thanks all.
Greets me
btw, I try to use spark as much as possible..Hi,
You can check these links and white papers which explains the business scenarios and best practices
http://www50.sap.com/businessmaps/9AD1FC0540D0479CA76C4CA1EE9AF668.htm
http://www.sap.com/solutions/business-suite/erp/brochures/index.epx - "Audit management with SAP software".
Regards,
Keerthi -
Best practices for configure Rogue Detector AP and trunk port?
I'm using a 2504 controller. I dont have WCS.
My questions are about the best way to configure a Rogue Detector AP.
In my lab environment I setup the WLC with 2 APs. One AP was in local mode, and I put the other in Rogue Detector mode.
The Rogue Detector AP was connected to a trunk port on my switch. But the AP needed to get its IP address from the DHCP server running on the WLC. So I set the native vlan of the trunk port to be the vlan on which the WLC management interface resides. If the trunk port was not configured with a native vlan, the AP couldn't get an address through DHCP, nor could the AP communicate with the WLC. This makes sense because untagged traffic on the trunk port will be delivered to the native vlan. So I take it that the AP doesn't know how to tag frames.
Everything looked like it was working ok.
So I connected an autonomous AP (to be used as the rogue), and associated a wireless client to it. Sure enough it showed up on the WLC as a rogue AP, but it didn't say that it was connected on the wire. From the rogue client I was able to successfully ping the management interface of the WLC.
But the WLC never actually reported the rogue AP as being connected to the wired network.
So my questions are:
1. What is the correct configuration for the trunk port? Should it not be configured with a native vlan? If not, then I'm assuming the rogue detector AP will have to have a static IP address defined, and it would have to be told which vlan it's supposed to use to communicate with the WLC.
2. Assuming there is a rogue client associated with the rogue AP, how long should it reasonably take before it is determined that the rogue AP is connected to the wired network? I know this depends on if the rogue client is actually generating traffic, but in my lab environment I had the rogue client pinging the management interface of the WLC and still wasn't being picked up as an on-the-wire rogue.
Thanks for any input!!#what's the autonomous AP's(as Rogue AP) Wired and Wireless MAC address?
it has to be +1 or -1 difference. If Wired MAC is x.x.x.x.x.05 and the wireless mac should be x.x.x.x.x.04 or 06. It is not going to detect if the difference is more than + 1 or - 1.
#Does the switch sees the Rogue AP's wired MAC on its MAC table.
Rogue Detector listens to ARPs to get all the Wired MAC info and forwards to WLC, It compares with Wireless MAC, if there is a +1 or -1 difference then it will be flagged as Rogue on wire. And the client that connected to it is also marked as found on wire.
Regards to Trunking, Only Native vlan matters per trunk link, just configure the right vlan as native and we're done.
It is not mandatory to keep the Rogue detector on Management vlan of wlc. It can also be on L3 vlan also as long as it can join the WLC to forward the learnt wired MACs.
So if we don't have +1, -1 difference on Rogues then you've to use RLDP which will work with your existing setup to find Rogue on wire. there's a performance hit when we use this feature on local mode APs.
Note: For AP join - AP can't understand Trunk, meaning if AP connected to Trunk it'll only talk to its native vlan irrespective of AP mode, however rogue detector listens to the Trunk port to learn MACs via ARPs from different VLANs and forwards to WLC using native vlan. -
GRC best practice for solution manager
Hi
We wanted to know if there is a content of GRC road map and processes for the solution manager project management solution? we can't find the source from which we can download it strait to the solution manager same as downloading the roadmap and processes of best practices in modules like CO, FI etc.
Does anyone know from where to download the solman GRC best practice?
Best Regards,
ShiraHi Shira,
what is only currently available for the GRC topic is an implementation roadmap for grc. You can find that on service marketplace under http://service.sap.com/asap
Best regards,
Frank -
Best Practice for configuring ZS3 storage
Hi Team
Can someone help me with the best way to configure data profile for a ZS3-2 storage which is mainly going to be used for oracle database and EBU application.
If we are planning to install ldoms os on storage lun then what data profile should be the best one.
Regards
ABWithout knowing more I would do the following, being very conservative;
Create too pools, with pool0 on controller0 and pool1 on controller1. This is to take advantage of both controllers DRAM, for better performance. Regardless of RAIDZ or RAID 1+0, I would do this.
I am assuming both trays are the same HHDs ( 900G?)
Make the first pool RAID 1+0, with 2 write SSDs and one READ SSD. I would use this pool for redo logs, and database files. Mounting via OISP or dNFS.
Make the second pool RAIDZ, with 2 write SSDs and one READ SSD, I would place my RMAN mount here, and any binary mounts and archive logs. Maybe DB files, if using partitioning. HCC is a great technology to use if you application will benefit from it.
Now for the relaity check!
9 times out of 10 method...
Realistic... just use RAIDZ on both pools. In reality RAID 1+0 generates more IOPS in the array and leads to more DB I/O wait time! It's true!
If you are headed to ECO I'll sit down and explain. short version, RAIDZ does less writes, which means better database performance.
Erik -
Best Practices for configuring ICMP from the outside
Question,
Are there any best practices or best recommendations on how ICMP should be configured from the outside? I have been cleaning up the rules on our ASA as a lot were simply ported over years ago when we retired our PIX. I noticed that there is a rule to allow ICMP any any and began to wonder how this works when the rules above are specific IP addresses and specific ports. This in thurn started me looking to see if there was any documentation or anything to help me determine a best practice. Anyone know of anything?
As a second part how does this flow on a firewall if all the addresses are natted? It the ICMP traffic simply passed through the NAT and the destiantion simply responds?
BrentHere you go, bro!
http://checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practices%20for%20Firewall%20Deployment%201.asp#_Toc218778855
access-list inside permit icmp any any echo
access-list inside permit icmp any any echo-reply
access-list inside permit icmp any any unreachable
access-list inside permit icmp any any time-exceeded
access-list inside permit icmp any any packets-too-big
access-list inside permit udp any any eq 33434 33464
access-list deny icmp any any log
P/S: if you think this comment is useful, please do rate them nicely :-)
Maybe you are looking for
-
DBM 8/ Purchase order creation
Dear All, Can anyone help me how can i activate a model in DBM 8.? below is the error that appears while trying to create PO using QORD action Thanks in advance, Samar El-Maadawy
-
First steps problems - instalation goes all wrong
Hi, I just bought a adobe creative and, when I tried to install it, it came with error code 205 (I google it, and the adobe forum said it was a corrupt file problem). i tried again in another brownser, but now, it wont recognize my accout. The way it
-
Do I have to buy the OS X Mountain Lion in order to update my software, or i can update my software without having to but that app in the app store in my mac? Since the directions says: 1)Click on "About this mac" 2)Click on Software Updates 3)Down
-
i have to change the language in solaris x86 platform. what is the command to change.i have installed the solaris as hindi language. thanks in advance
-
Partial delivery at header level
Hello, In customer-material info record, you normally put in max partial del for a material..can we set any where for a material group? Also, is there any way we can set partial delivery for order or header level instead of item level? thanks, Srini