{"id":1264,"date":"2015-08-21T09:50:24","date_gmt":"2015-08-21T07:50:24","guid":{"rendered":"http:\/\/lestfrexgn.cluster020.hosting.ovh.net\/?p=1264"},"modified":"2015-08-19T15:56:08","modified_gmt":"2015-08-19T13:56:08","slug":"sccm-2012-supprimer-les-fichiers-dangereux-partie-5","status":"publish","type":"post","link":"https:\/\/les2t.fr\/fr_fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/","title":{"rendered":"SCCM 2012- Supprimer les fichiers dangereux \u2013 Partie 5"},"content":{"rendered":"<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" size-medium wp-image-83 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg\" alt=\"sccm2012\" width=\"300\" height=\"159\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012.jpg 314w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Apr\u00e8s la cr\u00e9ation des \u00e9l\u00e9ments de configuration, d\u2019une Baseline et son d\u00e9ploiement pour d\u00e9couvrir les quatre fichiers qui doivent \u00eatre enlev\u00e9s de tous les PC, nous pouvons maintenant examiner nos r\u00e9sultats de compliance.<br \/>\nPour cela, nous allons utiliser le rapport ConfigMgr 2012 int\u00e9gr\u00e9 : \u00ab <strong>List of assets by compliance state for a configuration baseline<\/strong> \u00bb.<br \/>\nCe rapport va nous permettre de passer rapidement en revue les ordinateurs conformes et ceux qui ne le sont pas.<br \/>\nTout d&rsquo;abord, acc\u00e9der \u00e0 votre site de reporting et allez dans le dossier \u00ab Compliance and Settings Management \u00bb.\u00a0 Ex\u00e9cutez ensuite le rapport intitul\u00e9 \u00ab <strong>List of assets by compliance state for a configuration baseline<\/strong> \u00bb.<\/p>\n<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang22.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" size-medium wp-image-1265 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang22-300x185.jpg\" alt=\"sccm_ficdang22\" width=\"300\" height=\"185\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang22-300x185.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang22.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nRemarquez que dans la capture d&rsquo;\u00e9cran ci-dessus, un seul ordinateur est non conforme.<br \/>\nEnsuite, connecter vous au PC et supprimez le fichier (s).\u00a0 Re-ex\u00e9cutez ensuite le cycle d&rsquo;\u00e9valuation.\u00a0 Quelques minutes plus tard, toute les machines seront conforme \u00e0 travers le rapport.<\/p>\n<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang23.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" size-medium wp-image-1266 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang23-300x189.jpg\" alt=\"sccm_ficdang23\" width=\"300\" height=\"189\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang23-300x189.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2015\/08\/sccm_ficdang23.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Article original : <a href=\"http:\/\/www.enhansoft.com\/blog\/the-four-files-you-need-to-remove-from-configuration-manager-environment-reporting\" target=\"_blank\">ICI<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Apr\u00e8s la cr\u00e9ation des \u00e9l\u00e9ments de configuration, d\u2019une Baseline et son d\u00e9ploiement pour d\u00e9couvrir les quatre fichiers qui doivent \u00eatre enlev\u00e9s de tous les PC, nous pouvons maintenant examiner nos r\u00e9sultats de compliance. Pour cela, nous allons utiliser le rapport ConfigMgr 2012 int\u00e9gr\u00e9 : \u00ab List of assets by compliance state for a configuration baseline [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7],"tags":[14,36,164,172,22],"class_list":["post-1264","post","type-post","status-publish","format-standard","hentry","category-sccm-2012","tag-configmgr-2012","tag-microsoft","tag-sccm-2012","tag-system-center","tag-system-center-configuration-manager"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SCCM 2012- Supprimer les fichiers dangereux \u2013 Partie 5 - Les2T<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/les2t.fr\/fr_fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SCCM 2012- Supprimer les fichiers dangereux \u2013 Partie 5 - Les2T\" \/>\n<meta property=\"og:description\" content=\"Apr\u00e8s la cr\u00e9ation des \u00e9l\u00e9ments de configuration, d\u2019une Baseline et son d\u00e9ploiement pour d\u00e9couvrir les quatre fichiers qui doivent \u00eatre enlev\u00e9s de tous les PC, nous pouvons maintenant examiner nos r\u00e9sultats de compliance. Pour cela, nous allons utiliser le rapport ConfigMgr 2012 int\u00e9gr\u00e9 : \u00ab List of assets by compliance state for a configuration baseline [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/les2t.fr\/fr_fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/\" \/>\n<meta property=\"og:site_name\" content=\"Les2T\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-21T07:50:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg\" \/>\n<meta name=\"author\" content=\"TRARBACH Jean-Yves\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"TRARBACH Jean-Yves\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/\",\"url\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/\",\"name\":\"SCCM 2012- Supprimer les fichiers dangereux \u2013 Partie 5 - Les2T\",\"isPartOf\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg\",\"datePublished\":\"2015-08-21T07:50:24+00:00\",\"author\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\"},\"breadcrumb\":{\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/#primaryimage\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/les2t.fr\/fr_fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SCCM 2012- Supprimer les fichiers dangereux \u2013 Partie 5\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\",\"url\":\"https:\/\/les2t.fr\/fr_fr\/\",\"name\":\"Les2T\",\"description\":\"| BLOG  IT |\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\",\"name\":\"TRARBACH Jean-Yves\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"caption\":\"TRARBACH Jean-Yves\"},\"description\":\"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT\",\"sameAs\":[\"https:\/\/les2t.fr\/jean-yves-trarbach\/\"],\"url\":\"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SCCM 2012- Supprimer les fichiers dangereux \u2013 Partie 5 - Les2T","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/les2t.fr\/fr_fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/","og_locale":"fr_FR","og_type":"article","og_title":"SCCM 2012- Supprimer les fichiers dangereux \u2013 Partie 5 - Les2T","og_description":"Apr\u00e8s la cr\u00e9ation des \u00e9l\u00e9ments de configuration, d\u2019une Baseline et son d\u00e9ploiement pour d\u00e9couvrir les quatre fichiers qui doivent \u00eatre enlev\u00e9s de tous les PC, nous pouvons maintenant examiner nos r\u00e9sultats de compliance. Pour cela, nous allons utiliser le rapport ConfigMgr 2012 int\u00e9gr\u00e9 : \u00ab List of assets by compliance state for a configuration baseline [&hellip;]","og_url":"https:\/\/les2t.fr\/fr_fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/","og_site_name":"Les2T","article_published_time":"2015-08-21T07:50:24+00:00","og_image":[{"url":"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg","type":"","width":"","height":""}],"author":"TRARBACH Jean-Yves","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"TRARBACH Jean-Yves","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/","url":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/","name":"SCCM 2012- Supprimer les fichiers dangereux \u2013 Partie 5 - Les2T","isPartOf":{"@id":"https:\/\/les2t.fr\/fr_fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/#primaryimage"},"image":{"@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/#primaryimage"},"thumbnailUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg","datePublished":"2015-08-21T07:50:24+00:00","author":{"@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e"},"breadcrumb":{"@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/#primaryimage","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2014\/09\/sccm2012-300x159.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/les2t.fr\/sccm-2012-supprimer-les-fichiers-dangereux-partie-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/les2t.fr\/fr_fr\/"},{"@type":"ListItem","position":2,"name":"SCCM 2012- Supprimer les fichiers dangereux \u2013 Partie 5"}]},{"@type":"WebSite","@id":"https:\/\/les2t.fr\/fr_fr\/#website","url":"https:\/\/les2t.fr\/fr_fr\/","name":"Les2T","description":"| BLOG  IT |","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e","name":"TRARBACH Jean-Yves","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","caption":"TRARBACH Jean-Yves"},"description":"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT","sameAs":["https:\/\/les2t.fr\/jean-yves-trarbach\/"],"url":"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/1264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/comments?post=1264"}],"version-history":[{"count":0,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/1264\/revisions"}],"wp:attachment":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/media?parent=1264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/categories?post=1264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/tags?post=1264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}