Reference Guide

Tables........................................................................................................................................... 4
Chapter 1: PREFACE..................................................................................................................... 5
Chapter 2: Security quick reference.............................................................................................. 6
Deployment models.............................................................................................................................................................6
Security profiles................................................................................................................................................................... 6
Chapter 3: Product and subsystem security.................................................................................. 7
Security controls map.........................................................................................................................................................7
Authentication...................................................................................................................................................................... 8
Login security settings....................................................................................................................................................... 8
Authentication types and setup considerations........................................................................................................... 9
Authorization........................................................................................................................................................................ 9
Network security................................................................................................................................................................. 9
Data security....................................................................................................................................................................... 10
Cryptography...................................................................................................................................................................... 10
Auditing and logging.......................................................................................................................................................... 10
Serviceability........................................................................................................................................................................ 11
Security updates and patches................................................................................................................................... 11
Product code integrity.......................................................................................................................................................11
Chapter 4: Miscellaneous Configuration and Management Elements............................................ 12
OpenManage Integration with Microsoft Windows Admin Center Licensing......................................................12
Credential Security Service Provider (CredSSP).......................................................................................................13
OS to iDRAC Pass through..............................................................................................................................................14
Protect authenticity and integrity..................................................................................................................................14
Manage backup and restore in OMIMSWAC...............................................................................................................14
Chapter 5: Contacting Dell...........................................................................................................15
Contents
Contents 3