Reference Guide

Chapter 1: Preface........................................................................................................................ 4
Legal disclaimers.................................................................................................................................................................. 4
Scope of document.............................................................................................................................................................4
Audience................................................................................................................................................................................ 4
Related Documentation......................................................................................................................................................4
Chapter 2: Deployment models......................................................................................................5
Chapter 3: Product and Subsystem Security................................................................................. 6
Security controls map.........................................................................................................................................................6
Access control......................................................................................................................................................................6
Login security settings....................................................................................................................................................... 7
Failed login behavior...................................................................................................................................................... 7
Emergency user lockout............................................................................................................................................... 7
User and credential management.................................................................................................................................... 7
Username and Password complexity.........................................................................................................................7
Role and scope-based access control in OpenManage Enterprise ........................................................................ 7
Data security.........................................................................................................................................................................9
Cryptography...................................................................................................................................................................... 10
Auditing and logging.......................................................................................................................................................... 10
Serviceability....................................................................................................................................................................... 10
Chapter 4: Contacting Dell........................................................................................................... 11
Chapter 5: Accessing support content from the Dell EMC support site........................................ 12
Contents
Contents 3