Security Best Practices for Configuration Manager
The following sections contain information about the best practices recommended by Microsoft for running Microsoft System Center Configuration Manager 2007 in the most secure configuration possible.
In This Section
- Best Practices for Security Fundamentals
Describes basic security practices such as least permission and how they apply to Configuration Manager 2007.
- Best Practices for Hierarchy Security
Describes best practices to follow when using more than one Configuration Manager 2007 site in a hierarchy.
- Best Practices for Service Continuity
Gives a brief overview of maintaining Configuration Manager 2007 data availability.
- Best Practices for Securing Communications
Describes best practices to follow to help secure communication channels between site systems, including IPsec recommendations.
- Best Practices for Securing Site Systems
Describes best practices to follow to help protect site system roles, including the site database server and Internet-based site systems.
- Best Practices for Securing Clients
Describes best practices to follow to help protect Configuration Manager 2007 client computers.
- Best Practices for Securing Internet-Based Clients
Describes best practices to follow to help protect Configuration Manager 2007 client computers that are not inside your corporate network.
- Best Practices for Securing Name Resolution
Describes best practices to follow to help secure name resolution methods used by Configuration Manager 2007.
- Best Practices for Certificate Management
Describes best practices to follow to help secure the aspects of your certificate infrastructure used by Configuration Manager 2007.
- Best Practices for Maintaining Configuration Manager Security
Describes best practices to follow to help maintain Configuration Manager 2007 security.