Category: Security

May 22, 2019
What Are the Supported SQL Server Views to Use with SCCM Reporting?

Have you ever wondered what SQL Server views you can use with SCCM current branch reporting? You wouldn’t be alone in asking this question because the views are not clearly…

February 27, 2019
How to Create a SCCM Report Reader AD Security Group and Import the Security Role

Why do you need a SCCM Report Reader AD security group and security role? The answer is quite simple. There is no reason for non-SCCM administrators to view reports from…

January 15, 2019
BIOS Dashboard is the Free Report

January 2019’s free System Center Configuration Manager (SCCM) report is the BIOS Dashboard. Get it here today! Why do you need this report? Keep reading below! Problem: Are you still…

March 8, 2016
Time-Saving Tip for RBA Security Roles

I needed to create a number of Role-Based Administration (RBA) report reader security roles in order to test each ConfigMgr feature and function. This was done to ensure that only…

July 23, 2015
The Four Files You Need to Remove From Configuration Manager Environment (Reporting)

By Garth Jones Dana Epp gave a presentation on how hackers can gain access to your environment and how ConfigMgr administrators can reduce these threats. To get more insight into…

July 22, 2015
The Four Files You Need to Remove from Configuration Manager’s Environment (Testing a Configuration Baseline Manually)

Recently Dana Epp gave a presentation on how hackers can gain access to your environment and how ConfigMgr administrators can reduce these threats. To help get the word out, I…

July 21, 2015
The Four Files You Need to Remove from Configuration Manager’s Environment (Deploying the Baseline)

In last week’s blog posts I talked about a presentation that Dana Epp gave on how hackers can gain access to your environment through information found in four specific files….

July 16, 2015
The Four Files You Need to Remove from Configuration Manager’s Environment (Baseline)

In my last blog post I talked about a presentation that Dana Epp gave on how hackers can gain access to your environment through four different files. Configuration Manager Administrators,…

July 15, 2015
The Four Files You Need to Remove from Configuration Manager’s Environment

Dana Epp (@DanaEpp) recently gave a fascinating presentation about the vulnerabilities facing Configuration Manager, from daily outside threats to the challenges confronting ConfigMgr administrators and Microsoft Deployment Toolkit (MDT) administrators…