We performed a comparison between Change Tracker Gen7 R2 and Microsoft Configuration Manager based on real PeerSpot user reviews.
Find out what your peers are saying about Darktrace, Vectra AI, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS)."Whitelisting services are the most valuable feature of Change Tracker Gen7 R2."
"I have contacted the support once and the experience was good, I was satisfied."
"The most valuable feature of Microsoft Endpoint Configuration Manager is it's incredibly simple to configure and execute changes in bulk, allowing for seamless deployment. With this solution, you can easily track the status of all modifications and send them with ease, making it a comprehensive and efficient solution for any necessary adjustments."
"One of the standout features of SCCM is its application management capabilities. It allows us to create packages efficiently and deploy them to specific groups within our network. This streamlined process has significantly improved our software distribution workflows."
"Technical support was helpful and responsive."
"It gives us the ability to set up schedules, according to what our security requirements are, to automate the patching of our servers and desktops."
"The most valuable feature of Microsoft Endpoint Configuration Manager is the software deployment. Additionally, Microsoft integrates most of the other solutions well with one another."
"There is a faster time to rollout. If we get a new PC, it can be ready for productivity right away."
"Provides great insight into the functionalities of the data scope."
"I like its ease of use. It does what you need it to do, and it's a one-stop-shop for the company and for all your deployments. If you incorporate Intune into it, you can have both. You can bring your own devices and corporate devices, and everything runs out of SCCM and Intune."
"The solution could improve by being more secure and have better integration."
"The solution could include more integrations."
"The assets have reached their end-of-life, and patching them is a complex and laborious task. It would be highly advantageous if there were an integrated solution that provided distinct options for each end-of-life asset, streamlining the process and facilitating comprehension."
"Some of the capabilities aren't fully developed yet. It's an ongoing work in progress. I think they are making some steps in the right direction as far as managing workstations centrally, like Intune."
"The solution should be more compatible with different versions of Linux."
"It would be nice to have everything in one place. Now they have Intune for the desktops and SCCM to handle their servers."
"I would like to see some improvements in WSUS and control of other, non-Microsoft, product updates."
"Not everything is readily available, and there are a lot of commands that are only executable via PowerShell."
"The solution could improve the functionality for automating, license management. Additionally, more and better-looking reports are needed."
"Microsoft should extend support for additional platforms."
More Microsoft Configuration Manager Pricing and Cost Advice →
Change Tracker Gen7 R2 is ranked 21st in Intrusion Detection and Prevention Software (IDPS) with 2 reviews while Microsoft Configuration Manager is ranked 2nd in Server Monitoring with 78 reviews. Change Tracker Gen7 R2 is rated 9.0, while Microsoft Configuration Manager is rated 8.2. The top reviewer of Change Tracker Gen7 R2 writes "A stable solution that can be used for secure configuration management and file integrity monitoring". On the other hand, the top reviewer of Microsoft Configuration Manager writes "Seamless system updates, useful integration, and reliable". Change Tracker Gen7 R2 is most compared with Fortra's Tripwire Enterprise, whereas Microsoft Configuration Manager is most compared with Red Hat Ansible Automation Platform, ManageEngine Endpoint Central, Microsoft Intune, BigFix and Tanium.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.