O'Reilly logo

System Center 2012 Configuration Manager Unleashed by Greg Ramsey., Jason Sandys, Marcus Oh, Byron Holt, Kerrie Meyler

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

ConfigMgr Network Security

Network-based attacks are commonly used to steal data or carry out other malicious objectives. Here are some types of network attacks that could be launched ConfigMgr sites, site systems, and clients:

Misdirection attacks: Where a client or site system is provided with the wrong name or Internet Protocol (IP) address for the partner with which it needs to communicate. To avoid misdirection attacks, you must secure service advertisement and name resolution services.

Spoofing attacks: This is where a rogue system impersonates the actual system with which a client or site system needs to communicate. To defeat spoofing attacks, all communications must be properly authenticated.

Eavesdropping or sniffer-based attacks: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required