Book Image

Mastering System Center Configuration Manager

By : Vangel Krstevski
Book Image

Mastering System Center Configuration Manager

By: Vangel Krstevski

Overview of this book

Table of Contents (15 chapters)
Mastering System Center Configuration Manager
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Preventing unauthorized administrative access


In addition to assigning users to appropriate roles, it is important to prevent the unauthorized or inappropriate use of administrative access. What follows is an explanation of how an attacker can gain rights on Configuration Manager:

  • An attacker can alter Configuration Manager security through Active Directory. Configuration Manager roles are assigned to Active Directory users and groups. Anyone who gains the requisite Active Directory privileges can add themselves to a group or can reset the password of a user account to get access to Configuration Manager.

  • An attacker can alter Configuration Manager security by directly modifying a Role Based Administration (RBA) object in the site database.

  • An attacker can steal the credentials or hijack the session of a legitimate administrator.

Protection against these risks requires effective security at the Active Directory and database layers and the maintenance of a strong auditing policy.

The Active Directory...