Preferred Server security recommendations

Recommended Security Best Practices for Preferred Server Configuration

This article outlines critical security recommendations for configuring Preferred Servers to ensure a secure and efficient application of updates in your environment. These guidelines address the use of HTTPS and SMB protocols, proper authentication methods, FQDN (Fully Qualified Domain Name) requirements, and configurations that minimize risks associated with insecure connections.

Key Security Recommendations

Summary

By following the recommendations above, you can decrease exposure to security risks while maintaining compatibility across your organization. Always prioritize Kerberos authentication, use FQDNs, enforce SMB v3 encryption, and validate certificates carefully to achieve a secure Preferred Server setup.

For further assistance, please contact Ivanti Support.