Use this checklist to verify that your Microsoft System Center Configuration Manager 2007 environment conforms to the recommended security best practices for Configuration Manager 2007 features. This topic supports and summarizes content in the Security and Privacy for Configuration Manager 2007 section of the Configuration Manager Documentation Library. Before implementing these best practices in your environment, test them thoroughly.
If you are familiar with Configuration Manager 2007 concepts and security procedures, you might be able to work directly from this checklist and use this guide as reference information.
Configuration Manager Console Security Best Practices
Configuration Manager Console Security Best Practices and Privacy Information
□ |
Always use an account with least permissions when running the Configuration Manager console |
□ |
Do not allow users who are not administrators to use the Configuration Manager console on the site server |
□ |
Limit Web browsing from the Configuration Manager console |
□ |
Do not allow low rights Terminal Service users to establish connections with site system roles |
□ |
Protect the XML output from the Transfer Site Settings wizard |
□ |
Do not allow users who are not administrators to access the site server via Remote Desktop or Terminal Services |
Software Distribution Security Best Practices
Software Distribution Security Best Practices and Privacy Information
□ |
Always configure advertisements to download content |
□ |
Do not allow users to interact with programs if run with administrative rights is required |
□ |
Do not create subcollections if you need to restrict software distribution on them |
□ |
Set package access permissions at package creation |
□ |
Secure software at the package access level |
□ |
After upgrading, if you had packages in SMS 2003, update all packages |
Best Practices for Distribution Points
□ |
Remove the distribution point role from the site server |
|
□ |
Do not create distribution point shares or branch distribution points on Internet-based clients |
|
□ |
After switching to a custom Web site, remove the default virtual directories |
|
□ |
Implement access controls to protect branch distribution points |
|
□ |
Enable the encrypted mode for Application Virtualization Streaming enabled distribution points |
Software Updates Security Best Practices
Software Updates Security Best Practices and Privacy Information
□ |
Do not change the default permissions on software update packages |
□ |
Control access to the download location for software updates |
□ |
Use UTC for evaluating deployment times |
□ |
Follow best practices for securing WSUS |
□ |
Enable CRL checking |
□ |
If the software update point is configured in a perimeter network, configure the site server to retrieve the data from the site system |
□ |
If you must deploy software updates to SMS 2003 clients, run the Inventory Tool for Microsoft Updates on a primary site server that is highest in the hierarchy |
□ |
Configure WSUS to use a custom web site |
□ |
Enable BITS 2.5 for the site and the distribution points |
Operating System Deployment Security Best Practices
Operating System Deployment Security Best Practices and Privacy Information
□ |
Implement access controls to protect bootable media |
□ |
If the client certificate is compromised, block the certificate |
□ |
Secure the communication channel between the site server and the PXE service point |
□ |
Use PXE service points only on secure network segments |
□ |
Configure the PXE service point to respond to PXE requests only on specified network interfaces |
□ |
Require a password to PXE boot |
□ |
Manually delete state migration point folders when they are decommissioned |
□ |
Do not configure the deletion policy to delete user state immediately |
□ |
Control physical access to computers using USB flash drives for task sequences |
□ |
Implement access controls to protect the reference computer imaging process |
□ |
Always install the most recent security updates on the reference computer |
□ |
Monitor for unauthorized multicast-enabled distribution points |
□ |
If you must deploy operating systems to unknown computer, implement access controls to prevent unauthorized computers from connecting to the network |
□ |
Always configure task sequence advertisements to download content |
□ |
Enable encryption for multicast packages |
Asset Intelligence Security Best Practices
Asset Intelligence Security Best Practices and Privacy Information
□ |
Protect the registration certificate |
Reporting Security Best Practices
Reporting Security Best Practices
□ |
Restrict queries and reports to authorized viewers |
□ |
Use the reporting users group to control access to the reporting point |
□ |
Manage security for users who connect directly to the SQL Server computer |
□ |
Enable HTTPS access for reporting points |
Desired Configuration Management Security Best Practices
Desired Configuration Management Security Best Practices and Privacy Information
□ |
Sign configuration data to verify the integrity of your configuration items |
Mobile Device Clients Security Best Practices
Mobile Device Clients Security Best Practices and Privacy Information
□ |
Use native mode whenever possible |
□ |
Require mobile device clients to use passwords |
Network Access Protection Security Best Practices
Network Access Protection Security Best Practices
□ |
Do not rely on NAP to secure a network from malicious users |
□ |
Use consistent NAP policies throughout the site hierarchy to minimize confusion |
□ |
Do not enable the Network Access Protection client agent immediately on new Configuration Manager sites |
□ |
Do not rely on NAP as an instantaneous or real-time enforcement mechanism |
Inventory Security Best Practices
Inventory Security Best Practices and Privacy Information
□ |
Enable inventory encryption |
□ |
Disable IDMIF and NOIDMIF collection |
□ |
Do not use file collection to collect critical files or sensitive information |
□ |
Do not use file collection to collect critical files or sensitive information |
Remote Tools Security Best Practices
Remote Tools Security Best Practices and Privacy Information
□ |
Use either Group Policy or Configuration Manager to configure Remote Assistance settings, but not both |
|
□ |
Do not consider the “Ask for permission” setting to be adequate security for remote tools for Windows 2000 clients |
|
□ |
Enable "Ask for permission" setting |
|
□ |
Enable notification |
|
□ |
Prevent users from changing policy or notification settings |
|
□ |
Limit the Permitted Viewers list |
|
□ |
Specify required global groups |
|
□ |
Specify the domain context for user accounts |
|
□ |
Do not rely on collection security to control remote tools access |
|
□ |
Do not enter passwords for privileged accounts when remotely administering Windows 2000 computers |
Wake On LAN Security Best Practices
Wake On LAN Security Best Practices
□ |
Use unicast for sending wake-up packets |
□ |
If you must use subnet-directed broadcasts, configure routers to allow IP-directed broadcasts only from the site server and only on a non-default port number |
Out of Band Management Security Best Practices
Out of Band Management Security Best Practices and Privacy Information
□ |
Request customized firmware before purchasing AMT-based computers |
□ |
Use in-band provisioning instead of out of band provisioning |
□ |
Manually revoke certificates and delete Active Directory accounts for AMT-based computers that are blocked by a Configuration Manager 2007 SP1 site |
□ |
Control the request and installation of the provisioning certificate |
□ |
Ensure that you request a new provisioning certificate before the existing certificate expires |
□ |
If the AMT provisioning certificate is revoked, delete it from the certificate store on the out of band service point site system server and reconfigure the out of band management component with a valid AMT provisioning certificate |
□ |
If you must revoke a provisioning certificate supplied by an internal CA, revoke the certificate in the Certification Authority console |
□ |
Use a dedicated certificate template for provisioning AMT-based computers |
□ |
Use out of band management instead of Wake On LAN |
□ |
Disable AMT in the firmware if the computer is not supported for out of band management |
□ |
Use a dedicated OU to publish AMT-based computers |
□ |
Use Group Policy to restrict user rights for the AMT Accounts |
□ |
Use a dedicated collection for in-band provisioning |
□ |
Configure an alternate port for server provisioning |
□ |
For Configuration Manager 2007 SP2 only: Ensure only authorized administrators perform auditing actions and manage the audit logs as required |