Information Security
Monitoring a ConfigMgr Configuration Baseline Procedure
Last modified 10/7/2020
This procedure should be followed when you need monitor a ConfigMgr Configuration Baseline.
Procedure
You will need to authenticate with your ISU credentials to access this content.
Restricted Content - Login is Required
Content has been restricted to logged in users. Please click here to login now.
Additional Information
This procedure is used in the following processes:
Feedback
To suggest an update to this article, ISU students, faculty, and staff should submit an Update Knowledge/Help Article request and all others should use the Get IT Help form.