Topic Hub

SCCM / MECM

Microsoft Configuration Manager for OS deployment, software distribution, patch management, and co-management with Intune. Operational guidance for teams running on-premises and hybrid endpoint management — and those planning migration.

Guides, scripts and analysis

Naming reference

SCCM, ConfigMgr, MECM, or Microsoft Intune? The name history explained.

The product has been renamed several times and is still searched under all previous names — they all refer to the same on-premises endpoint management platform:

Until 2011

System Center Configuration Manager (SCCM)

The original name — still the most widely searched term.

2011 – 2019

System Center Configuration Manager (still SCCM)

Product refreshed but name unchanged. Current branch introduced in 2015.

2019 – 2022

Microsoft Endpoint Configuration Manager (MECM)

Rebranded alongside the Microsoft Endpoint Manager umbrella (now discontinued as a brand).

2022 – present

Microsoft Configuration Manager (ConfigMgr)

Current official name. The product itself is unchanged — still the same on-premises tool.

On this site: SCCM/MECM and ConfigMgr are used interchangeably to match how practitioners search. The Intune management layer now sits in the Microsoft Intune admin centre (intune.microsoft.com).

Overview

What ConfigMgr Is Still Used For in Real Enterprise Environments

ConfigMgr is not a legacy product pending retirement. It receives bi-annual current branch releases and is actively developed. For specific workloads — particularly complex OSD, large-scale on-premises software distribution, and server management — it remains the stronger tool.

Complex OS deployment (OSD)

Task sequences in ConfigMgr support multi-phase deployments with driver injection, WIM capture, MDT integration, pre-staging content, and conditional steps based on hardware model or disk configuration. For large fleets with diverse hardware and complex imaging requirements, ConfigMgr OSD is significantly more flexible than Autopilot alone.

Large-scale software distribution

The ConfigMgr content library and distribution point infrastructure supports distributing large application packages (multi-GB installers, SQL, Visual Studio) across thousands of machines with bandwidth throttling, scheduled distribution windows, and BranchCache for branch office scenarios — without each device pulling from the cloud.

WSUS-integrated patch management

ConfigMgr Software Update Point integrates directly with WSUS for per-KB approval, ADR (Automatic Deployment Rules) for monthly Patch Tuesday automation, and phased deployment for update rings. The reporting and maintenance window integration is more granular than Intune update rings for environments with complex patching requirements.

On-premises compliance and reporting

Configuration baseline assessment in ConfigMgr evaluates device compliance against custom rules and reports results to SSRS (SQL Server Reporting Services). For environments where cloud reporting is not permitted or where compliance data must stay on-premises, ConfigMgr provides a full reporting stack without data leaving the datacenter.

Server management

ConfigMgr manages Windows Server endpoints — software distribution, patch management, hardware inventory, and software metering — alongside workstation fleets. Intune does not manage on-premises servers. For environments needing a unified management view across workstations and servers, ConfigMgr remains the only Microsoft-native option.

Co-management and migration staging

Co-management lets ConfigMgr and Intune share management authority simultaneously, with each workload explicitly assigned to one or the other. This makes ConfigMgr the practical bridge for organisations migrating to cloud-only management — you can slide workloads to Intune incrementally without a hard cutover.

Co-management

Co-management with Microsoft Intune

Co-management is the simultaneous management of Windows 10/11 devices by both ConfigMgr and Intune. Each management workload is explicitly assigned to one authority — you decide the pace of migration workload by workload.

What you need before enabling

Prerequisites

ConfigMgr version
Current branch 2103 or later recommended. Co-management was introduced in 1710 but later versions have significantly improved workload control and Intune integration.
Device requirements
Windows 10 1709 or later (Windows 11 supported). Devices must be hybrid Entra joined or Entra joined — purely domain-joined devices cannot use Intune workloads.
Intune licence
Each co-managed device needs an Intune licence assigned. Included in Microsoft 365 Business Premium, E3, E5, and available as a standalone add-on.
Entra Connect
Hybrid Entra join requires Entra Connect (or Cloud Sync) to sync the on-premises computer object to Entra ID. The device then registers a certificate used for Intune MDM enrolment.
CMG (optional)
Cloud Management Gateway allows ConfigMgr to manage internet-based devices — useful for co-managed devices that are not always on the corporate network or VPN.

Per-workload authority assignment

Workload sliding

Compliance policies
Slide to Intune to use Intune compliance baselines and feed device compliance state into Conditional Access. This is usually the first workload to migrate — low risk, high CA value.
Device configuration
Slide to Intune to replace ConfigMgr configuration items and baselines with Intune Settings Catalog profiles. Test on a Pilot Intune collection first.
Windows Update policies
Slide to Intune to use Intune update rings and Windows Autopatch. You cannot have both WSUS (via ConfigMgr SUP) and Intune update rings managing the same device — this is the highest-conflict workload to migrate.
Endpoint Protection
Slide to Intune to manage Defender AV, ASR rules, and firewall via Intune Endpoint security policies. ConfigMgr Endpoint Protection policies are then ignored for workloads in the Intune authority.
Client apps
The most complex workload to migrate. ConfigMgr application deployments stop applying once slid to Intune. Plan app re-packaging as Win32 .intunewin before sliding this workload.

Staged workload migration

Pilot Intune collections

What Pilot Intune does
Each workload can be set to ConfigMgr, Pilot Intune, or Intune. Pilot Intune applies the Intune authority only to devices in a designated ConfigMgr collection — the rest stay on ConfigMgr.
Collection design
Create a co-management pilot collection targeting IT staff machines, then specific business unit machines as confidence builds. Use a direct membership rule initially, not a query-based rule, to control scope precisely.
Validating the slide
After sliding a workload to Pilot Intune, verify the Intune policy applies in the Intune portal (Devices > Configuration) and that the ConfigMgr policy is no longer the effective setting on the device. Use the co-management dashboard in ConfigMgr to track slide status.
Rollback
Sliding a workload back from Intune to ConfigMgr is possible — change the authority in the co-management properties and ConfigMgr policies re-apply on the next client policy cycle (default 60 minutes). Test rollback before committing a broad workload migration.
Dashboard
ConfigMgr Monitoring > Co-management dashboard shows workload distribution, Intune enrolment status, and per-device authority. Use this to track progress across the fleet.

Core operations

Collections, Deployments, and Maintenance Windows

Collections and deployments are the operational core of ConfigMgr. Almost every action — software distribution, patch deployment, configuration baseline evaluation — is targeted at a collection and scheduled within a maintenance window.

Device vs User collections

Device collections target the machine — useful for OS-level deployments, patches, and configuration items that should apply regardless of who is logged on. User collections target the user object in AD — useful for application deployments that should follow the user across devices. Most patch deployments use device collections for predictable scheduling behaviour.

Query-based vs direct membership

Query-based collections use WQL queries against the ConfigMgr database to dynamically include devices matching criteria (OS version, installed software, last logon, hardware attributes). Direct membership adds specific devices explicitly. Hybrid: use a query rule as the base and direct membership for exceptions. Always test queries in the collection simulator before creating a production collection.

Limiting collections

Every collection must be limited by a parent collection. The limiting collection defines the maximum scope — a collection cannot include a device not in its limiting collection. Use "All Systems" as the limiting collection only at the top of the hierarchy. Create intermediate limiting collections per site, per department, or per management group to prevent accidental over-targeting.

Deployment purpose: Required vs Available

Required deployments install automatically at the deadline — the client enforces installation regardless of user activity (within maintenance window rules). Available deployments appear in Software Center for user-initiated install. For patches and security software, use Required. For productivity apps with user adoption considerations, Available is appropriate. Never use Required for software that needs user data migration.

Maintenance windows

Maintenance windows define when ConfigMgr is permitted to make changes to a device — install software, apply patches, or reboot. Without a maintenance window, deployments can run at any time. Configure non-overlapping windows for servers (weekend nights), shift workers (daytime), and office desktops (business hours + weekend). Software updates and all deployments have separate maintenance window overrides.

Phased deployments

ConfigMgr phased deployments automate multi-collection rollouts — starting with a pilot collection and automatically advancing to the production collection when the pilot success criteria are met (e.g., 95% deployment success rate with zero failure threshold). Use for major application updates and feature update deployments to reduce manual monitoring.

OS deployment

Task Sequences and OS Deployment

ConfigMgr task sequences are the most flexible OS deployment mechanism in the Microsoft stack. A task sequence is a series of ordered steps — partitioning, WIM application, driver injection, software installation, configuration, and domain join — that run in the Windows PE or full OS context.

Boot image and WinPE

Task sequences boot devices into Windows PE via PXE (via Distribution Point with PXE role) or bootable media. The boot image contains ConfigMgr client components, network drivers, and storage drivers needed to reach the distribution point. Customise boot images via the Windows ADK — add drivers for network adapters on new hardware before the boot image can reach SCCM content.

Driver management

ConfigMgr driver management imports driver packages into the driver catalogue, matched to hardware models via the Auto Apply Drivers step or explicit Apply Driver Package steps. The best practice for large fleets is model-based driver packages — one package per hardware model family — applied via a task sequence condition checking %Model% or Win32_ComputerSystem.Model.

MDT integration (Zero Touch Installation)

Microsoft Deployment Toolkit integration with ConfigMgr (ConfigMgr + MDT) adds the Use Toolkit Package and Gather steps, enabling MDT rules, the CustomSettings.ini variable engine, and offline domain join. MDT integration is the standard approach for environments that need complex conditional logic beyond what native task sequence conditions support.

In-place upgrade task sequences

The Upgrade Operating System step runs Windows Setup in an upgrade scenario, preserving user data, installed apps, and settings. In-place upgrade task sequences are lower-risk than wipe-and-reload OSD for feature update migrations (Windows 10 to Windows 11). Add pre-check steps to fail the task sequence early if the device does not meet hardware requirements.

Content pre-staging and BranchCache

For branch offices without a local distribution point, pre-stage content to a local server or enable BranchCache to allow devices to pull content from each other after the first download. Without pre-staging, large task sequences pull from a remote DP over WAN — causing slow deployments and potential deployment failures during the WIM apply phase.

Task sequence variables and conditions

Built-in variables (_SMSTSMachineName, OSDComputerName, SMSTSUserStatePath) and custom variables set via Set Task Sequence Variable steps control flow. Condition checks on steps (WMI query, file existence, task sequence variable match) allow hardware-specific or environment-specific branching without maintaining separate task sequences per scenario.

Patch management

Software Update Management and WSUS Integration

ConfigMgr software updates are built on WSUS — ConfigMgr provides the collection targeting, maintenance window enforcement, phased rollout, and reporting layer on top of the WSUS approval and distribution infrastructure.

Software Update Point (SUP) role

The SUP role installs and manages WSUS on the site server. It synchronises update metadata from Microsoft Update on a configurable schedule and downloads updates to the content library. WSUS still manages the approval database — ConfigMgr controls which updates are deployed to which collections, using WSUS approvals as the delivery mechanism.

Automatic Deployment Rules (ADRs)

ADRs automate monthly Patch Tuesday deployments. Configure an ADR to run on the second Tuesday of each month, filter by classification (Security Updates, Critical Updates), and deploy to a pilot collection with a 7-day deadline. A second ADR phase targets the broad production collection two weeks later. ADRs create deployment packages and software update groups automatically.

Software update groups

A software update group is a container of specific KBs targeted for deployment. ADRs add updates to a group automatically. Manual update groups are used for out-of-band patches (zero-day fixes between Patch Tuesdays). A single update group can be deployed to multiple collections with different maintenance windows and deadline offsets.

Deployment rings via collections

Create separate device collections for each ring (Pilot, IT, Early Adopter, Production). Deploy the same software update group to each collection with staggered deadlines — Pilot: 0 days, IT: 7 days, Early Adopter: 14 days, Production: 21 days. ConfigMgr compliance reports show deployment progress per collection, per update.

WSUS cleanup and maintenance

WSUS databases grow significantly without regular maintenance. Declined and superseded updates accumulate in the WSUS catalogue. Run the built-in WSUS Cleanup Wizard monthly, or use the WSUS maintenance tasks in ConfigMgr site maintenance. A WSUS database over 10GB often causes synchronisation timeouts — run the WSUS database maintenance script against the SUSDB to re-index and defragment.

Conflict with Intune update rings on co-managed devices

If Windows Update policies workload remains with ConfigMgr, Intune update ring policies are ignored on co-managed devices. If it is slid to Intune, ConfigMgr SUP policies are ignored. Running both simultaneously causes unpredictable behaviour — devices may defer updates based on ConfigMgr policy then receive them from the Windows Update cloud service via Intune, bypassing the ConfigMgr ring structure.

Client health

Client Health and Troubleshooting

ConfigMgr client problems fall into three categories: the client is not installed, the client is installed but not communicating with the management point, or the client is communicating but specific features (software updates, inventory) are not functioning. Each category has a different diagnostic path.

CCMSetup and client installation logs

CCMSetup.log (on the device, at C:\Windows\ccmsetup\Logs\) records the installation process. ccmsetup.exe failures are usually network (DP unreachable), prerequisite (missing .NET or VC++ runtime), or permissions issues. On the site server, client.msi.log records MSI installation detail. Use the Client Push Installation status in the console to identify devices where push installation failed and why.

Key client log files

C:\Windows\CCM\Logs\ contains all operational client logs. The most useful: LocationServices.log (DP and MP discovery), CcmMessaging.log (communication with MP), PolicyAgent.log (policy download and application), UpdatesDeployment.log (software update installation), AppDiscovery.log (application detection), and ExecMgr.log (program execution). CMTrace.exe (bundled with ConfigMgr) is the recommended viewer.

Client health check triggers

The ConfigMgr Client Health evaluation (CCMEval) runs daily and checks: WMI repository integrity, SMS Agent Host service state, Configuration Manager bits, client version currency, and hardware inventory cycle recency. If CCMEval detects a problem it attempts auto-remediation. Results appear in the Client Health dashboard under Monitoring > Client Health.

WMI repository corruption

A corrupt WMI repository is one of the most common causes of ConfigMgr client failure — inventory stops reporting, policies do not apply, and CCMEval flags the device. Repair with winmgmt /salvagerepository followed by a client reinstallation if salvage does not resolve. CCMEval auto-remediation handles this in most cases without manual intervention.

Management Point communication

If a client cannot reach the management point, it cannot download policies, report inventory, or receive deployments. Test MP reachability from the client with: Test-NetConnection -ComputerName <MP FQDN> -Port 80 (or 443 for HTTPS). Check LocationServices.log for MP detection failures. Common causes: DNS resolution failure, firewall blocking port 80/443, or the client boundary not being assigned to a boundary group containing the MP.

CMTrace vs OneTrace

CMTrace.exe is the classic ConfigMgr log viewer bundled since SCCM 2012. OneTrace is the successor, integrated into Support Center (installed via the ConfigMgr toolkit). OneTrace supports multiple log tabs, advanced filtering, and merged log views — useful when correlating events across UpdatesDeployment.log, WUAHandler.log, and RebootCoordinator.log simultaneously.

Visibility

CMPivot, Inventory, and Reporting

ConfigMgr's reporting stack — hardware inventory, software inventory, SSRS reports, and CMPivot — provides a level of fleet visibility that Intune's reporting does not yet match for on-premises environments. CMPivot in particular delivers real-time query capability that is unique in the on-premises toolchain.

CMPivot — real-time device queries

CMPivot runs WMI, registry, file system, and event log queries against live devices in real time — without waiting for hardware inventory cycles. Run a CMPivot query against a collection to get immediate results from all online devices: OS.Caption, InstalledSoftware where Name contains "VPN", File("C:\sensitive.txt").Exists, or EventLog("System") where EventID == 7036. Results appear within seconds for online devices.

Hardware inventory

Hardware inventory collects WMI class data from every client on a configurable cycle (default: 7 days). The collected data populates the ConfigMgr database and is queryable via collections, reports, and CMPivot. Extend hardware inventory to collect custom WMI classes or registry values not in the default set — useful for software licence audit, BIOS version reporting, or TPM state verification.

Software inventory and metering

Software inventory scans installed files for product metadata. Software metering tracks execution frequency and last-used date for configured executables — useful for identifying unused licences. Both are separate from hardware inventory and have independent cycles and enable/disable settings. Software metering data is held for a configurable retention period in the SSRS database.

SQL Server Reporting Services (SSRS)

ConfigMgr ships with hundreds of built-in SSRS reports covering hardware, software, deployment status, client health, update compliance, and asset intelligence. Reports run against the ConfigMgr database and are accessible via the reporting services point URL. Custom reports use SQL queries against the CM_* database views — the view schema is documented and queryable directly for custom dashboard development.

Asset Intelligence

Asset Intelligence catalogues installed software, hardware, and licence data against the Microsoft Asset Intelligence online catalogue. It identifies software titles, normalises names across hardware inventory, and produces licence reconciliation reports. Useful for software asset management and identifying unlicensed or unexpected software at scale across the fleet.

Tenant attach and cloud-connected CMPivot

Tenant attach (a co-management feature enabled separately from workload sliding) uploads ConfigMgr device inventory to Intune. This lets you run CMPivot queries from the Microsoft Intune admin centre against on-premises ConfigMgr-managed devices — without the devices being MDM-enrolled. Useful for security teams who primarily work in the cloud portals.

Migration

Migration Paths from ConfigMgr to Intune

Migration from ConfigMgr to Intune is not a single event — it is a workload-by-workload progression. These are the most common migration patterns and their practical trade-offs.

Co-management first — slide workloads gradually

Enable co-management on existing ConfigMgr-managed hybrid-joined devices, then slide workloads to Intune one at a time — Compliance policies first, then Device configuration, then Windows Updates, then Endpoint Protection, and finally Client apps. This is the lowest-risk path because ConfigMgr remains the fallback authority until you are confident in the Intune configuration. The migration takes 12–24 months for most enterprises.

New device Autopilot — Intune-only for all new builds

Stop imaging new devices via ConfigMgr task sequence. Register new hardware in Autopilot, provision them as Entra-joined Intune-only devices, and leave the existing fleet on ConfigMgr co-management. Natural device refresh over 3–5 years progressively shifts the fleet to Intune. This is the most realistic path for large organisations that cannot afford a big-bang migration.

App re-packaging for Win32 Intune delivery

ConfigMgr applications must be re-packaged as .intunewin files using the Win32 Content Prep Tool before they can be deployed via Intune. Detection rules replace ConfigMgr detection methods. This is the highest-effort part of migration — plan 2–4 hours per application for packaging, detection rule authoring, and testing. Prioritise by deployment frequency: the 20 most-deployed apps cover 80% of your fleet.

Keeping ConfigMgr for servers and OSD

Intune does not manage on-premises Windows Server. Organisations that complete workstation migration to Intune often retain ConfigMgr specifically for server patch management, software deployment to servers, and complex OSD scenarios. A reduced ConfigMgr footprint — fewer distribution points, no full site redundancy — remains appropriate and is a supported long-term configuration.

Comparison

Intune vs SCCM / MECM — The Full Analysis

Co-management has blurred the lines, but the strategic direction is clear. Read the full breakdown to understand where ConfigMgr still earns its place and where Intune is the right call.

Microsoft Intune vs. SCCM/MECM in 2025: Which Should You Use?

For new cloud-managed endpoints, Intune is usually the right starting point. SCCM still has a role in complex OSD, large software distribution, detailed on-prem reporting, and restricted networks. Many estates need staged co-management rather than a rushed replacement.

Common problems

Where ConfigMgr Deployments Go Wrong

Most ConfigMgr failures are either infrastructure problems (WSUS, DP, MP, SQL) or targeting problems (collection scope, maintenance window, deployment purpose). These are the patterns that appear most often in production environments.

Software update deployment failing fleet-wide — WSUS sync broken

Updates are not reaching devices because WSUS synchronisation has failed or the Software Update Point role is unhealthy. Check wsyncmgr.log on the site server for sync errors. Common causes: WSUS certificate expiry, proxy configuration change, Windows Update endpoint blocked by firewall, or the WSUS application pool recycled under load. Run a manual sync from the ConfigMgr console: Software Library > Software Updates > Synchronise Software Updates.

Client not receiving policy — boundary group misconfiguration

Devices are enrolled in ConfigMgr but not receiving software deployments. The device's IP subnet or AD site is not assigned to a boundary group, or the boundary group does not have a distribution point or management point assigned. Check LocationServices.log on the client for "No MP found" or "No DP found" messages. Verify the device's IP appears in a boundary and that boundary is in a group with an assigned DP.

Deployment stuck at 0% — content not distributed to DP

The deployment exists and the device is in the target collection, but nothing downloads. The deployment package content has not been distributed to the distribution point serving the device's boundary group. Check the deployment's Content Status in the console — if the DP shows "In Progress" or "Failed," the content has not transferred. Trigger a content redistribution or check distmgr.log on the site server.

Co-management workload conflict — device getting policy from both authorities

A device on the Windows Update Policies workload receives both a ConfigMgr SUP-controlled update schedule and an Intune update ring policy. The resulting behaviour is unpredictable — devices may install updates outside the intended ring window or bypass ConfigMgr-controlled maintenance windows. Verify the workload assignment in co-management properties and confirm only one authority is active on the device via PolicyAgent.log.

WSUS database bloat causing timeout errors

WSUS synchronisation starts failing with timeout errors as the SUSDB grows beyond 10–15GB. Declined and superseded updates are never purged without explicit maintenance. Run the WSUS Database Maintenance SQL script (available from Microsoft) against SUSDB to re-index and purge orphaned data, then run the WSUS Cleanup Wizard from the ConfigMgr console. Schedule this as a recurring maintenance task.

Task sequence failing at Apply Driver Package — no matching driver

OSD task sequence fails during driver injection because the driver package does not contain a driver matching the hardware in the target device (new model, new NIC or storage controller). Check smsts.log in X:\Windows\Temp\SMSTSLog\ during the failure — it will show the device model and the driver query that returned no results. Add the missing driver to the driver catalogue and re-import to the affected driver package.

Client health shows healthy but updates not installing

CCMEval reports the client as healthy and the software update group shows as deployed, but updates are not applying. Check UpdatesDeployment.log on the device for the update evaluation cycle result and WUAHandler.log for the Windows Update Agent response. Common cause: the maintenance window is too short for the number of updates required, causing deployments to be skipped until the next window. Increase the maintenance window or reduce the update group size.

Hybrid Entra join failing — devices not appearing in Entra ID

Co-management requires hybrid Entra joined devices. If the Automatic-Device-Join scheduled task is failing, the device will not get an Entra device object and cannot enrol in Intune. Run dsregcmd /status on the device and check the "Join Info" section. Common causes: SCP not configured in AD, Entra Connect sync not running for the computer object, or network access to device registration endpoints blocked by proxy or firewall.