Reference Guide
Table Of Contents
- Dell EMC OpenManage Integration Version 7.3 with Microsoft System Center (OMIMSSC) for System Center Operations Manager (SCOM) Security Configuration Guide
- Contents
- Figures
- Tables
- PREFACE
- Security Quick Reference
- Product and Subsystem Security
- Security Controls Map
- Authentication
- Login security settings
- Authentication types and setup considerations
- User and credential management
- Network security
- Data security
- Cryptography
- Auditing and logging
- Serviceability
- OMIMSSC Operating System update
- Product code integrity
- Miscellaneous Configuration and Management
Security Quick Reference
Topics:
• Deployment models
•
Virtual Hard Disk (VHD) and Open Virtual Appliance (OVA) deployment
• Security profiles
Deployment models
You can deploy Dell EMC OpenManage Integration with Microsoft System Center (OMIMSSC) for System Center Operations
Manager (OMIMSSC) as a VHD or OVA in Hyper-V or ESXi environment, as applicable.
Virtual Hard Disk (VHD) and Open Virtual Appliance
(OVA) deployment
OMIMSSC is available in VHD and OVA formats. It can be downloaded online. Go to https://www.dell.com/support and select
Browse all products > Software > Enterprise Systems Management > OpenManage Integration for Microsoft System
Center Operations Manager (SCOM). Select the required OMIMSSC version and download the VHD or OVA file. Deploy the
OMIMSSC Appliance on Hyper-V or ESXi as a virtual machine, as applicable.
The VHD and OVA deployment models include a pre-configured bundle with the OMIMSSC software and the Linux operating
system that the OMIMSSC software runs on.
The VHD and OVA environment also includes a pre-configured firewall that is tuned to the OMIMSSC communication
requirement with the integrated systems.
For more information about deploying OMIMSSC, see the Dell EMC OpenManage Integration with Microsoft System Center
(OMIMSSC) for System Center Operations Manager (SCOM) User`s Guide available at https://www.dell.com/support.
Security profiles
OMIMSSC for SCOM by default installs and configures the self-signed certificate for the management website. To avoid
potential security risks, recommendation is to use a trusted certificate signed by a Certificate Authority (CA). It is highly
recommended to replace the Certificate Authority (CA) signed certificates for the stronger security environments.
2
Security Quick Reference 9