Hi Mike,
it’s relatively easy to limit a key to just execute the Checkmk agent. So in cases where no additional ports should be opened or agent output can be useful for an attacker, SSH is an appropriate way (deeplink to the section):
Hi Mike,
it’s relatively easy to limit a key to just execute the Checkmk agent. So in cases where no additional ports should be opened or agent output can be useful for an attacker, SSH is an appropriate way (deeplink to the section):