Export (0) Print
Expand All
Expand Minimize

Security and Privacy for Queries in Configuration Manager

Updated: December 1, 2011

Applies To: System Center 2012 Configuration Manager, System Center 2012 Configuration Manager SP1, System Center 2012 R2 Configuration Manager

Queries in Configuration Manager let you retrieve information from the site database based on the criteria that you specify. Configuration Manager collects the site database information during standard operation. For example, by using information that has been collected from discovery or inventory, you can configure a query to identify devices that meet specified criteria.

For more information about queries, see Introduction to Queries in Configuration Manager. For more information about any security best practices and privacy information for Configuration Manager operations that collect the information that you can retrieve by using queries, see Security Best Practices and Privacy Information for Configuration Manager.

Use the following security best practice for queries.


Security best practice More information

When you export or import a query that is saved to a network location, secure the location and secure the network channel.

Restrict who can access the network folder.

Use server message block (SMB) signing or Internet Protocol Security (IPsec) between the network location and the site server to prevent an attacker from tampering with the query data before it is imported.

See Also

For additional resources, see Information and Support for Configuration Manager.

Tip: Use this query to find online documentation in the TechNet Library for System Center 2012 Configuration Manager. For instructions and examples, see Search the Configuration Manager Documentation Library.
Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
© 2015 Microsoft