Configuration Management Database
Learn to use a configuration management database (CMDB) to manage the assets of an organization.
We'll cover the following...
Identify authorized devices
The first step in protecting endpoints is to identify them. One of the most dangerous things on a network is a rogue, unmanaged device with an unknown patch level and security posture. Maintaining an inventory of devices makes it easier to identify those who aren’t authorized or secure enough to be on the network.
Take the time to discover and document all assets properly. These include the following:
-
Servers ...