Securing the Configuration Manager infrastructure
Effective management and monitoring can greatly improve the security of your Configuration Manager environment. A potential compromise of the management application is a threat that you cannot allow and ignore. Their target includes every type of business, and their objective is to steal valuable intellectual property and business secrets for military and economic advantage. These attackers often attempt to compromise Domain Controllers. As companies increase their attention toward securing Domain Controllers, management systems become the next point of attack.
The critical infrastructure components that could be the subject of attacks include Configuration Manager site systems, accounts used by Configuration Manager, intersite and intrasite communication, Windows Intune, and other infrastructure services that Configuration Manager relies on. Before securing these components, spend some time in designing and planning the Configuration Manager...