Skip to main content

Using SCCM to Detect Unauthorized Software

This blog article, posted in September 2014, explains how the inventory feature of the software SCCM can also be used to detect and remove unauthorized software. (CSC: Inventory of Authorized and Unauthorized Software; CSC: Malware Defenses)

Language
Turkish
ILR Level
2+/3
ACTFL Proficiency
Superior
Material Type
Language Learning Object
Modality
Reading
Topic
Science/Technology
Learning Objectives
Maintenance & Improvement
Publication Year
2016
LLO Logo