Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 20. Security and Delegation in C... > Securing Configuration Manager Opera...

Securing Configuration Manager Operations

You should take security considerations into account as you design those processes and procedures you use to carry out day-to-day operations in your ConfigMgr environment. The next sections present some of the security issues involved in administering your hierarchy and security sensitive operations such as software distribution, DCM, and the use of remote tools.

Best Practices for Configuration Manager Administration

Only those users responsible for server administration should be able to log on locally to the site server or other site systems. Other users requiring access to the ConfigMgr console should install and run the console on secure administrative workstations or terminal servers dedicated to IT systems administration. Chapter 10, “The Configuration Manager Console,” describes how to deploy the console to remote systems, including security requirements for remote administration.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint