Export (0) Print
Expand All
Expand Minimize

Security and Privacy for Wi-Fi Profiles in Configuration Manager

Updated: November 1, 2013

Applies To: System Center 2012 R2 Configuration Manager

noteNote
The information in this topic applies only to System Center 2012 R2 Configuration Manager.

This topic contains security and privacy information for Wi-Fi profiles in System Center 2012 Configuration Manager.

Use the following security best practices when you manage Wi-Fi profiles for devices.

 

Security best practice More information

Whenever possible, choose the most secure options that your Wi-Fi infrastructure and client operating systems can support.

Wi-Fi profiles provide a convenient method to centrally distribute and manage Wi-Fi settings that your devices already support. Configuration Manager does not add Wi-Fi functionality.

Identify, implement, and follow any security best practices that have been recommended for your devices and Wi-Fi infrastructure.

You can use Wi-Fi profiles to configure client devices to connect to Wi-Fi servers, and then evaluate whether those devices become compliant after the profiles are applied. The management point sends compliance information to the site server, and the information is stored in the site database. The information is encrypted when devices send it to the management point, but it is not stored in encrypted format in the site database. The database retains the information until the site maintenance task Delete Aged Configuration Management Data deletes it. The default deletion interval is 90 days, but you can change it. Compliance information is not sent to Microsoft.

By default, devices do not evaluate Wi-Fi profiles. In addition, you must configure the VPN profiles, and then deploy them to users.

Before you configure Wi-Fi profiles, consider your privacy requirements.

See Also

-----
For additional resources, see Information and Support for Configuration Manager.

Tip: Use this query to find online documentation in the TechNet Library for System Center 2012 Configuration Manager. For instructions and examples, see Search the Configuration Manager Documentation Library.
-----
Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft