Reference Guide

Figures..........................................................................................................................................4
Tables........................................................................................................................................... 5
Chapter 1: PREFACE..................................................................................................................... 6
Chapter 2: Security quick reference.............................................................................................. 8
Deployment models.............................................................................................................................................................8
Security profiles................................................................................................................................................................... 8
Chapter 3: Product and subsystem security.................................................................................. 9
Security controls map.........................................................................................................................................................9
Authentication...................................................................................................................................................................... 9
Login security settings......................................................................................................................................................10
Authentication types and setup considerations.......................................................................................................... 11
Pre-loaded accounts................................................................................................................................................... 14
Authorization.......................................................................................................................................................................16
RBAC privileges............................................................................................................................................................ 16
Role mapping.................................................................................................................................................................16
Network security.......................................................................................................................................................... 17
Internal network (CIFS) share.................................................................................................................................. 19
Field service debug (FSD)..........................................................................................................................................19
OpenManage Enterprise update...............................................................................................................................19
Data security...................................................................................................................................................................... 20
Cryptography..................................................................................................................................................................... 20
Certificate management............................................................................................................................................ 20
Auditing and logging................................................................................................................................................... 20
Logs................................................................................................................................................................................. 21
Network vulnerability scanning ................................................................................................................................21
Chapter 4: Contacting Dell.......................................................................................................... 23
Contents
Contents 3