41-47 of 161,000,000 results
Open links in new tab
  1. Use Microsoft Defender for Endpoint Security Settings ...

    Oct 20, 2025 · You'll find endpoint security policies under Endpoints > Configuration management > Endpoint security policies. The following list provides a brief description of each endpoint …

  2. CM.L2-3.4.2 Security Configuration Enforcement - DIB SCC ...

    CMMC Requirement CM.L2-3.4.2 – Security Configuration Enforcement: Establish and enforce security configuration settings for information technology products employed in organizational …

  3. 4-OP-H-25.03 IT Security Configuration Management Standard

    Misconfiguration – an incorrect or suboptimal configuration of an information system or system component that may lead to vulnerabilities. Security Configuration Management – the …

  4. Why Security Configuration Management (SCM) Matters

    Oct 28, 2024 · Discover why Security Configuration Management (SCM) is essential to prevent 'unforced errors' in security and maintain system integrity.

  5. Cloud Security Configuration Management: A Comprehensive …

    Nov 30, 2023 · Discover how to secure your cloud environments with Tufin’s comprehensive guide on cloud security configuration management. This article delves into the concept, its …

  6. Introducing the security configuration framework: A ...

    Apr 11, 2019 · The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, …

  7. Azure Security Control - Secure Configuration | Microsoft Learn

    Apr 23, 2025 · Follow recommendations from Azure Security Center on performing vulnerability assessments on your Azure compute resources. In addition, you may use Azure Resource …