Desktop management and security have traditionally existed as two separate disciplines, yet both play central roles in keeping users safe and productive. Management tools ensure proper system configuration, deploy patches against vulnerabilities, and deliver necessary security updates. Security tools provide critical threat detection, incident response, and remediation of system infection.
System Center 2012 Endpoint Protection (formerly known as Forefront Endpoint Protection 2010) aligns these two work streams into a single infrastructure. Built on Microsoft System Center 2012 Configuration Manager, it gives administrators:
- Consolidated tools, processes, and infrastructure to create new efficiencies and lower desktop ownership costs.
- A unified view of configuration and security information that improves protection by making it easier to identify and remediate vulnerabilities.
Lowers ownership costs
With discrete infrastructures for management and security, companies must purchase and maintain separate hardware and software, create and manage two sets of policies, and take two sets of actions when a security incident occurs. Together, System Center 2012 Endpoint Protection and Configuration Manager 2012 deliver significant operational efficiencies not available with traditional management and security silos by offering:
- A single server infrastructure
- A single mechanism for deploying client software and updates
- Central implementation of policy
- A single solution for administrators to be trained on, regardless of their roles
Because System Center 2012 Endpoint Protection is available as part of the Microsoft Core Client Access License (Core CAL), organizations can purchase all the components they need to manage and secure desktops in one SKU, eliminating the need to buy single purpose software.
Most desktop vulnerabilities are a result of poor system configuration, yet security administrators lack ready access to inventory, patch level, and other desktop-specific data. System Center 2012 Endpoint Protection gives organizations industry-leading threatdetection capabilities built on Configuration Manager 2012, the world’s most widely used tool for remediating desktop security vulnerabilities.
The combination of these technologies in a single infrastructure offers a unique consolidated view into the health and protection status of client systems. IT administrators can better identify at-risk machines and take action to patch systems, block outbreaks, and initiate clean-up efforts. These combined technologies also simplify reporting on the complete desktop environment, and include role-based administration to help ensure that only authorized administrators have access to security data and tools.
Last modified: May 11, 2016