Information Security
Monitoring a ConfigMgr Configuration Baseline Procedure
Last modified 10/7/2020
This procedure should be followed when you need monitor a ConfigMgr Configuration Baseline.
Procedure
You will need to authenticate with your ISU credentials to access this content.
Restricted Content - Login is Required
Content has been restricted to logged in users. Please click here to login now.
Additional Information
This procedure is used in the following processes: