Summary
In this chapter, we have explored the world of using certificates to secure our Configuration Manager environment. We have gone through the high-level process of setting up a test certificate authority and configuring the certificate templates.
It is also possible to set Configuration Manager so clients can sign and encrypt communication to their management point. If implementing certificates is overkill for you, this is also a good security step.
We also looked at the configuration steps involved to let Configuration Manager know about our certificates and enable our clients to communicate with our site using the certificates we have generated.
Finally, we explored how to generate certificates to use for our workgroup clients where we cannot use the domain to automatically enroll the certificates. In the next chapter, we will look at how to use inventory to our advantage and how to configure the inventory to work for us.