Export (0) Print
Expand All

Security and Privacy for System Center 2012 Configuration Manager

Updated: May 14, 2015

Applies To: System Center 2012 Configuration Manager, System Center 2012 Configuration Manager SP1, System Center 2012 Configuration Manager SP2, System Center 2012 R2 Configuration Manager, System Center 2012 R2 Configuration Manager SP1

The Security and Privacy for System Center 2012 Configuration Manager guide provides documentation to help you implement security and privacy for Configuration Manager.

Before you read this guide, make sure that you understand the basic concepts of System Center 2012 Configuration Manager. At a minimum, read Fundamentals of Configuration Manager. If you have already installed System Center 2012 Configuration Manager, identify the design decisions for your implementation. You might find the Configuration Manager planning and deployment content helpful. For more information, see the Site Administration for System Center 2012 Configuration Manager guide.

See the following for security-related features in the product:

This security and privacy guide assumes that you understand basic security principles.

In addition to this information, you can also use the Security Configuration Wizard (SCW) for System Center 2012 Configuration Manager. Run this wizard to help you reduce the attack surface for site system servers that run Windows Server 2008 R2. The wizard determines the minimum functionality required for the selected site system roles, and can disable functionality that is not required. The Security Configuration Wizard is included with the toolkit for System Center 2012 Configuration Manager, which you can download from the Microsoft Download Center:

For additional resources, see Information and Support for Configuration Manager.

Tip: Use this query to find online documentation in the TechNet Library for System Center 2012 Configuration Manager. For instructions and examples, see Search the Configuration Manager Documentation Library.
Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
© 2015 Microsoft