This article provides instructions for IT teams across the UC San Diego campus on using MECM (Microsoft Endpoint Configuration Manager), formerly SCCM, to deploy Certificates and Network configuration items as part of the campus-wide SecureConnect initiative for managed devices.
For more resources for the Secure Connect NAC, refer to the Support IT's Guide to SecureConnect NAC Enforcement.
MECM is an on-premises-based MDM tool that supports Windows Desktops and Servers. This tool provides advanced features for managing Windows devices through the campus Active Directory and includes options like drive mapping, printer configurations, etc. It also uses PatchMyPC for third party application updates.
Your department and supported users may fall into one of the following categories regarding MECM:
The IT group from each department involved in rolling out SecureConnect will need to provide ITS with their respective Active Directory (AD) groups for both users and computers. Providing these AD groups is necessary for the Secure Connect team to grant machines access to the certificate template and apply GPOs to the appropriate OUs.
If your department has not yet started this process, please contact ITS as soon as possible to ensure a smooth transition to NAC enforcement.
To request to use the ITS-Managed MECM Platform, please submit a ticket via the IT Services & Support Portal.
There is an internal tech wiki for more instruction on how to use MECM. Please contact the MECM team using the IT Services Support Portal link above if you do not have access to this documentation.
Checking for the device certificate:
ITS Service Desk will provide a dedicated phone line and email support for IT personnel seeking assistance with Secure Connect compliance. The internal phone number and email address will be shared using the sysadmin mailing list. You can also contact the ITS Service Desk directly by calling (858) 246-4357, emailing support@ucsd.edu, or submitting a ticket at support.ucsd.edu.