SCCM 2012 R2 Boundaries and Security Considerations
-
Description
-
Reviews (0)
Description
In this course, you will learn how to create and manage SCCM Boundary Groups for segmenting your network for management. You will also learn about security considerations for connecting clients to SCCM, overall data integrity, and administrative delegation. This course provides additional information on using boundary groups to organize devices on the network for SCCM management using Boundary groups. It also covers security considerations for communicating with clients and other endpoints in the SCCM infrastructure as well as role-based administrative delegation.
Be the first to review “SCCM 2012 R2 Boundaries and Security Considerations” Cancel reply
Reviews
There are no reviews yet.