Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering System Center Configuration Manager

You're reading from   Mastering System Center Configuration Manager Master how to configure, back up, and secure access to System Center Configuration Manager with this practical guide

Arrow left icon
Product type Paperback
Published in Dec 2014
Publisher Packt
ISBN-13 9781782175452
Length 278 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Vangel Krstevski Vangel Krstevski
Author Profile Icon Vangel Krstevski
Vangel Krstevski
Arrow right icon
View More author details
Toc

Table of Contents (10) Chapters Close

Preface 1. Introduction to System Center Configuration Manager 2012 R2 2. Assets and Compliance FREE CHAPTER 3. The Software Library 4. Reporting in Configuration Manager 5. Administration and Monitoring 6. Cloud Integration 7. Security and Backup 8. Troubleshooting Index

Preventing unauthorized administrative access


In addition to assigning users to appropriate roles, it is important to prevent the unauthorized or inappropriate use of administrative access. What follows is an explanation of how an attacker can gain rights on Configuration Manager:

  • An attacker can alter Configuration Manager security through Active Directory. Configuration Manager roles are assigned to Active Directory users and groups. Anyone who gains the requisite Active Directory privileges can add themselves to a group or can reset the password of a user account to get access to Configuration Manager.

  • An attacker can alter Configuration Manager security by directly modifying a Role Based Administration (RBA) object in the site database.

  • An attacker can steal the credentials or hijack the session of a legitimate administrator.

Protection against these risks requires effective security at the Active Directory and database layers and the maintenance of a strong auditing policy.

The Active Directory...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image