Configuration Management Database
Explore the role of a configuration management database (CMDB) in identifying and documenting network assets such as servers and workstations. Understand how maintaining up-to-date asset information supports stronger endpoint and network security. Learn best practices for creating, updating, and reviewing a CMDB to enhance your organization's cyber defense.
We'll cover the following...
Identify authorized devices
The first step in protecting endpoints is to identify them. One of the most dangerous things on a network is a rogue, unmanaged device with an unknown patch level and security posture. Maintaining an inventory of devices makes it easier to identify those who aren’t authorized or secure enough to be on the network.
Take the time to discover and document all assets properly. These include the following:
-
Servers ... ...