Book Image

Mastering System Center Configuration Manager

By : Vangel Krstevski
Book Image

Mastering System Center Configuration Manager

By: Vangel Krstevski

Overview of this book

Table of Contents (15 chapters)
Mastering System Center Configuration Manager
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Securing the Configuration Manager infrastructure


Effective management and monitoring can greatly improve the security of your Configuration Manager environment. A potential compromise of the management application is a threat that you cannot allow and ignore. Their target includes every type of business, and their objective is to steal valuable intellectual property and business secrets for military and economic advantage. These attackers often attempt to compromise Domain Controllers. As companies increase their attention toward securing Domain Controllers, management systems become the next point of attack.

The critical infrastructure components that could be the subject of attacks include Configuration Manager site systems, accounts used by Configuration Manager, intersite and intrasite communication, Windows Intune, and other infrastructure services that Configuration Manager relies on. Before securing these components, spend some time in designing and planning the Configuration Manager...