From the course: Learning Microsoft Configuration Manager

Unlock the full course today

Join today to access over 24,800 courses taught by industry experts.

Configuration Manager security

Configuration Manager security

- [Presenter] Prior to installing Configuration Manager, security should be at the top of your mind and Microsoft does have security built into Configuration Manager. Let's take a look at some of those security features. Starting out with certificates, Configuration Manager uses a combination of certificates such as self-signed, as well as Public Key Infrastructure, or PKI. Use PKI certificates whenever possible. Some scenarios are going to require PKI certificates, but when they aren't available the site automatically generates its own self-signed certificates as needed. Configuration Manager trusted root key can provide a mechanism for Configuration Manager clients, they'll be able to verify that site systems belong to their own hierarchy. And that's needed just in case you have multiple different configuration manager setups with different hierarchies. Every site server generates a site exchange key to communicate with those sites. The key from the top level site in the hierarchy…

Contents