Best Practices
The following are best practices from this chapter:
• Create and run reports from the Central Administration Site to ensure data from the entire infrastructure can be seen. Site-specific reports can be created by filtering out data that isn’t needed.
• Avoid using IDMIF or NOIDMIF files to extend the hardware inventory. These files reside on the client computer and can dynamically modify the Configuration Manager database with custom data during the hardware inventory cycle. If this type of collection is necessary, ensure the risks are fully understood and the appropriate security has been implemented.
• Similar queries are grouped together to improve performance. This is important to avoid searching the entire system multiple ...
Get Microsoft® System Center 2012 Unleashed now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.