Summary
This chapter describes the infrastructure security for Configuration Manager and the delegation of administrative access. The chapter included a detailed description of a new role-based administration model and an overview of the Configuration Manager controls and security accounts. The chapter also provided considerations for securing the hierarchy design, audit support and server configurations, and placement. In the second part of the chapter, we saw the required steps to back up, recover, and maintain our Configuration Manager environment.
In the next chapter, we will discuss how to troubleshoot common issues such as server or client malfunctions, network communication problems, or incorrect permissions.