With anything that could have as much impact on a client machine as anti-virus policy can, it's important to have some degree of change control. Whatever workflow or procedures your organization uses for changing control should be applied to the modification and deployment of SCEP policies. This recipe will focus on showing you how to verify that change control procedures are being utilized with the management of SCEP policies.
After completing this recipe, you will know how to check who created a policy, who the last person to modify the policy was, and where the policy has been deployed. Not to mention, verifying who has rights to modify and deploy the policy.
To complete this recipe, you will need to be using an account that has at least the SCEP administrator role granted to it.