Security Configuration Management
Implement a security configuration management for
all workstations and servers in your organization.
What is Security Configuration Management?
Security Configuration Management is the management and control of secure configurations for an information system to enable security and facilitate the management of risk.
What are security configuration tools?
Security configuration tools such as Group Policies and Security Templates allow system administrators to consolidate security-related system settings into a single configuration file. These settings can then be applied consistently to any number of Windows machines.
Why is security configuration important?
Configuration management helps engineering teams build robust and stable systems through the use of tools that automatically manage and monitor updates to configuration data. Complex software systems are composed of components that differ in granularity of size and complexity.
What is an SCA and how is it used for Security Configuration Management?
A Security Configuration Assessment (SCA) is a grouping of configuration checks. These checks use a rule, or a combination of rules, to verify the state of a system. Rules, among other things, can run custom commands, inspect configuration files and look for running processes or Windows registry keys. These results can show how secure the current configurations are.

