Category: Security

March 8, 2016
Time-Saving Tip for RBA Security Roles

By Garth Jones I needed to create a number of Role-Based Administration (RBA) report reader security roles in order to test each ConfigMgr feature and function. This was done to…

July 23, 2015
The Four Files You Need to Remove From Configuration Manager Environment (Reporting)

By Garth Jones Dana Epp gave a presentation on how hackers can gain access to your environment and how ConfigMgr administrators can reduce these threats. To get more insight into…

July 22, 2015
The Four Files You Need to Remove from Configuration Manager’s Environment (Testing a Configuration Baseline Manually)

By Garth Jones Recently Dana Epp gave a presentation on how hackers can gain access to your environment and how ConfigMgr administrators can reduce these threats. To help get the…

July 21, 2015
The Four Files You Need to Remove from Configuration Manager’s Environment (Deploying the Baseline)

By Garth Jones In last week’s blog posts I talked about a presentation that Dana Epp gave on how hackers can gain access to your environment through information found in…

July 16, 2015
The Four Files You Need to Remove from Configuration Manager’s Environment (Baseline)

By Garth Jones In my last blog post I talked about a presentation that Dana Epp gave on how hackers can gain access to your environment through four different files….

July 15, 2015
The Four Files You Need to Remove from Configuration Manager’s Environment

By Garth Jones Dana Epp (@DanaEpp) recently gave a fascinating presentation about the vulnerabilities facing Configuration Manager, from daily outside threats to the challenges confronting ConfigMgr administrators and Microsoft Deployment…