Information Security
Procedures
Last modified 4/3/2020
Step-by-step documents that provide a specified way of completing a process or activity.
- Data Usage Form (DUF) Procedure
- Deploying a ConfigMgr Antimalware Policy Procedure
- Deploying a ConfigMgr Configuration Baseline Procedure
- Deploying a ConfigMgr Microsoft Defender for Endpoint Policy Procedure
- InCommon Certificate Request Procedures
- Linking a Group Policy Object Procedure
- Monitoring a ConfigMgr Configuration Baseline Procedure
- Out-of-Band Access Request Procedures
- Query Devices for Users that are Local Administrator Procedure
- Ransomware Response Procedure
- User Account Review Request Procedure