Whitepaper

NightWatchman Considerations for your ConfigMgr Migration

NightWatchman (NWM) can be used with Microsoft System Center Configuration Manager (SCCM, or ConfigMgr) in various ways. When you upgrade ConfigMgr in place, NWM should continue working as previously. However, if you upgrade ConfigMgr by building a new parallel infrastructure, there can be some details that should be considered in order to ensure NightWatchman operational continuity.

This document outlines those considerations and best practices that should help to address any challenges that could result from your migration. It does not address upgrade-in-place scenarios or new NightWatchman installations.

For those scenarios please see the documentation at http://help.1E.com. This document also doesn’t address complex changes you might introduce at the same time as the migration, such as starting to require high availability. For such complex scenarios, contact 1E Support or Professional Services.

Read More

Share this post

Share this post on your favorite social media platform.

Find this resource useful?

If so please click here

Related Content

Product Sheet

ServiceNow ITSM

81% of IT incidents reoccur across multiple devices within 1 month. 1E’s ServiceNow ITSM lets you supercharge your ServiceNow environment and prevent reoccurring incidents before user productivity is impacted.

Product Sheet

Enterprise Software Asset Management

38% of software spend is wasted on unused or rarely used software. 1E’s Enterprise Software Asset Management lets you manage entitlement for SaaS, Desktop and Server software metrics, and get real-time visibility from all devices.

About 1E

Cyber security is critical. One breach could destroy your organization’s reputation and cost millions of dollars. We take that threat seriously. 1E gives you unprecedented control and visibility over your entire IT estate, delivered at speed and at scale. 1 in 4 of the Top 100 companies by market capital are active 1E customers: we’re working towards a world of proactive cyber security, a world where CIOs and CISOs work together to ensure that no threat can bring down their systems.