Which configuration manager features help with security




















IT Security. IT Service Management. Application Management. All Products. View All Network Management Products. Unify log management and infrastructure performance with SolarWinds Log Analyzer. View All Systems Management Products. Easy-to-use system and application change monitoring with Server Configuration Monitor.

View All Database Management Products. Monitor your cloud-native Azure SQL databases with a cloud-native monitoring solution. Web Help Desk Basic On-Premises ticketing software to help manage tickets from request to resolution. AppOptics SaaS-based infrastructure and application performance monitoring, tracing, and custom metrics for hybrid and cloud-custom applications. Loggly Fast and powerful hosted aggregation, analytics and visualization of terabytes of machine data across hybrid applications, cloud applications, and infrastructure.

Papertrail Real-time live tailing, searching, and troubleshooting for cloud applications and environments. Pingdom Real user, and synthetic monitoring of web applications from outside the firewall. Web Performance Monitor Web application performance monitoring from inside the firewall.

View All Application Management Products. Remote Monitoring. Be the first to know when your public or private applications are down, slow, or unresponsive. Renew Maintenance Learn about Auto-Renewal. Access the Success Center Find product guides, documentation, training, onboarding information, and support articles. Technical Support Submit a ticket for technical and product assistance, or get customer service help.

Customer Portal Download the latest product versions and hotfixes. Access the Customer Portal. Orange Matter Get practical advice on managing IT infrastructure from up-and-coming industry voices and well-known tech leaders.

View Orange Matter. LogicalRead Blog Into databases? Find articles, code and a community of database experts. View LogicalRead Blog. View Resources. Contact Sales Online Quote. Features Features. View All Features. Technical Resources. Educational Resources. Connect with Us. Avoid logging on to site system servers with admin accounts unless absolutely necessary.

Consider carefully any external tools that are granted local admin rights on the Site Server. As well as affecting performance, it increases the attack surface on the server. Applications that interface with Configuration Manager should be installed on a separate server wherever possible and only be given absolute necessary permissions on the Site Server. With an increasing amount of malware being propagated through websites, you may want to consider restricting internet access on your Configuration Manager servers in conjunction with restricted admin rights , to prevent installation of unauthorized software directly from the Internet.

How often have you been tempted to quickly download a free tool to troubleshoot an issue on a server? For small organizations you may want to install several IIS-based site roles onto the same server although for redundancy you should always have at least two, even in the smallest environments.

This is essential for managing Internet-based clients, but can also be implemented on intranet-based Site Systems. However, specifically for content distribution on your corporate network, in most scenarios using HTTP on your DP is actually more secure. If the content itself does not contain sensitive information, encryption is not so important. Authentication is more important as it prevents unauthorized access to software on your Distribution Points.

Remember that Configuration Manager will always validate any content that has been downloaded using an SHA hash, so if the content is tampered with in any way, whether at the source, during transit or on the client, it will not be executed and the client is protected. An interactive user session on the server opens up more risk than you need to deal with. Instead, install the Configuration Manager console on administrator and operator workstations.

For more information, see Introduction to power management. Provides tools to remotely administer client computers from the Configuration Manager console. For more information, see Introduction to remote control. This feature provides hundreds of default reports. For more information, see Introduction to reporting. Monitor and collect software usage data from Configuration Manager clients. You can use this data to determine whether software is used after it's installed.

For more information, see Monitor app usage with software metering. For more information about how to plan and install Configuration Manager to support these management capabilities in your environment, see Get ready for Configuration Manager.

Feedback will be sent to Microsoft: By pressing the submit button, your feedback will be used to improve Microsoft products and services. Privacy policy. Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Co-management Co-management is one of the primary ways to attach your existing Configuration Manager deployment to the Microsoft cloud.

Desktop Analytics Desktop Analytics is a cloud-based service that integrates with Configuration Manager. Cloud-attached management Use features like the cloud management gateway and Azure Active Directory to manage internet-based clients.

For more information, see the following articles: Cloud management gateway overview Plan for Azure AD Azure services Real-time management Use CMPivot to immediately query online devices, then filter and group the data for deeper insights. Application management Helps you create, manage, deploy, and monitor applications to a range of different devices that you manage. Software updates Manage, deploy, and monitor software updates in the organization.

Company resource access Lets you give users in your organization access to data and applications from remote locations. Compliance settings Helps you to assess, track, and remediate the configuration compliance of client devices in the organization.

Endpoint Protection Provides security, antimalware, and Windows Firewall management for computers in your organization. Inventory Helps you identify and monitor assets. Hardware inventory Collects detailed information about the hardware of devices in your organization. Software inventory Collects and reports information about the files that are stored on client computers in your organization.

Asset Intelligence Provides tools to collect inventory data and monitor software license usage in your organization.



0コメント

  • 1000 / 1000