Reference Guide

Table Of Contents
Figures..........................................................................................................................................5
Tables........................................................................................................................................... 6
Chapter 1: PREFACE......................................................................................................................7
Chapter 2: Security Quick Reference............................................................................................ 9
Deployment models.............................................................................................................................................................9
Virtual Hard Disk (VHD) and Open Virtual Appliance (OVA) deployment............................................................. 9
Security profiles................................................................................................................................................................... 9
Chapter 3: Product and Subsystem Security................................................................................10
Security Controls Map...................................................................................................................................................... 10
Authentication..................................................................................................................................................................... 11
Access control............................................................................................................................................................... 11
OMIMSSC Appliance administration........................................................................................................................ 11
Infrastructure monitoring using Microsoft System Center Operations Manager (SCOM)
Console .................................................................................................................................................................... 12
Login security settings......................................................................................................................................................12
OMIMSSC Appliance administration........................................................................................................................12
Infrastructure monitoring using Microsoft System Center Operations Manager (SCOM) Console........13
Authentication types and setup considerations..........................................................................................................13
OMIMSSC Appliance administration........................................................................................................................14
Infrastructure monitoring using Microsoft System Center Operations Manager (SCOM) Console ...... 14
User and credential management.................................................................................................................................. 16
Pre-loaded accounts................................................................................................................................................... 16
Managing credentials.................................................................................................................................................. 16
Authorization................................................................................................................................................................. 17
Network security................................................................................................................................................................18
Network exposure........................................................................................................................................................18
Port information and communication matrix for OMIMSSC appliance........................................................... 18
Data security...................................................................................................................................................................... 20
Data at rest encryption.............................................................................................................................................. 20
Sensitive Data Migration............................................................................................................................................ 21
Cryptography...................................................................................................................................................................... 21
Manage HTTPS certificate ....................................................................................................................................... 21
Auditing and logging.......................................................................................................................................................... 21
Download troubleshooting bundle........................................................................................................................... 22
Serviceability...................................................................................................................................................................... 22
Security patches..........................................................................................................................................................22
OMIMSSC Operating System update...........................................................................................................................22
Product code integrity..................................................................................................................................................... 23
Chapter 4: Miscellaneous Configuration and Management........................................................... 24
Contents
Contents 3