Information Security

Monitoring a ConfigMgr Configuration Baseline Procedure

Last modified 10/7/2020

This procedure should be followed when you need monitor a ConfigMgr Configuration Baseline.

Procedure

You will need to authenticate with your ISU credentials to access this content.

Restricted Content - Login is Required

Content has been restricted to logged in users. Please click here to login now.

Additional Information

This procedure is used in the following processes: