Information Security

Monitoring a ConfigMgr Configuration Baseline Procedure

Last modified 10/7/2020

This procedure should be followed when you need monitor a ConfigMgr Configuration Baseline.

Procedure

You will need to authenticate with your ISU credentials to access this content.

Restricted Content - Login is Required

Content has been restricted to logged in users. Please click here to login now.

Additional Information

This procedure is used in the following processes:


Feedback

To suggest an update to this article, ISU students, faculty, and staff should submit an Update Knowledge/Help Article request and all others should use the Get IT Help form.