Security Best Practices and Privacy Information for Configuration Manager
Updated: May 14, 2015
Applies To: System Center 2012 Configuration Manager, System Center 2012 Configuration Manager SP1, System Center 2012 Configuration Manager SP2, System Center 2012 R2 Configuration Manager, System Center 2012 R2 Configuration Manager SP1
Use the topics in this section for security best practices and privacy information for System Center 2012 Configuration Manager.
In This Section
Security and Privacy for Site Administration in Configuration Manager
Security and Privacy for Migration to System Center 2012 Configuration Manager
Security and Privacy for Content Management in Configuration Manager
Security and Privacy for Application Management in Configuration Manager
Security and Privacy for Software Updates in Configuration Manager
Security and Privacy for Deploying Operating Systems in Configuration Manager
Security and Privacy for Collections in Configuration Manager
Security and Privacy for Hardware Inventory in Configuration Manager
Security and Privacy for Software Inventory in Configuration Manager
Security and Privacy for Asset Intelligence in Configuration Manager
Security and Privacy for Power Management in Configuration Manager
Security and Privacy for Remote Control in Configuration Manager
Security and Privacy for Software Metering in Configuration Manager
Security and Privacy for Out of Band Management in Configuration Manager
Security and Privacy for Compliance Settings in Configuration Manager
Security and Privacy for Remote Connection Profiles in Configuration Manager
Security and Privacy for Certificate Profiles in Configuration Manager
Security and Privacy for VPN Profiles in Configuration Manager
Security and Privacy for Wi-Fi Profiles in Configuration Manager
Security and Privacy for Email Profiles in Configuration Manager
Security and Privacy for Endpoint Protection in Configuration Manager