Configuration Management Database

Learn to use a configuration management database (CMDB) to manage the assets of an organization.

Identify authorized devices

The first step in protecting endpoints is to identify them. One of the most dangerous things on a network is a rogue, unmanaged device with an unknown patch level and security posture. Maintaining an inventory of devices makes it easier to identify those who aren’t authorized or secure enough to be on the network.

Take the time to discover and document all assets properly. These include the following:

  • Servers

  • Workstations

  • Network equipment

  • Mobile devices

Start with the production network, but don’t exclude other test, development, and staging environments. The result is an asset database, also known as a configuration management database (CMDB). A CMDB is a centralized repository of asset information.

Get hands-on with 1400+ tech skills courses.