Solved

Microsoft Security Compliance Manager SCM 2.5 how do I use it on my Windows 2008 server?

Posted on 2013-01-09
1
658 Views
Last Modified: 2013-01-09
Microsoft Security Compliance Manager SCM 2.5 how do I use it on my Windows 2008 server?
I have never use MSC before, am trying to see how I check the security on my Windows 2008 server.
Can you show me?
0
Comment
Question by:lanman777
1 Comment
 
LVL 57

Accepted Solution

by:
Mike Kline earned 500 total points
ID: 38759663
Have you installed the product yet, there is good documentation that you can go through in the tool (see screenshot below)

1
That screenshot is from 3.0 but 2.5 has a similar screen.

Some thing l like

The Attachment\Guides gives you a lot of great documents to look at
You can import your group policies and compare to Microsoft Baselines
All settings are there in one tool which is convenient.

Thanks

Mike
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Resolve DNS query failed errors for Exchange
Possible fixes for Windows 7 and Windows Server 2008 updating problem. Solutions mentioned are from Microsoft themselves. I started a case with them from our Microsoft Silver Partner option to open a case and get direct support from Microsoft. If s…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question