Reference Guide
Table Of Contents
Tables........................................................................................................................................... 4
Chapter 1: PREFACE..................................................................................................................... 5
Chapter 2: Security quick reference.............................................................................................. 7
Deployment models............................................................................................................................................................. 7
Security profiles................................................................................................................................................................... 7
Chapter 3: Product and subsystem security.................................................................................. 8
Security controls map.........................................................................................................................................................8
Authentication...................................................................................................................................................................... 9
Login security settings....................................................................................................................................................... 9
Authentication types and setup considerations......................................................................................................... 10
Authorization.......................................................................................................................................................................10
Network security................................................................................................................................................................10
Data security........................................................................................................................................................................ 11
Cryptography....................................................................................................................................................................... 11
Auditing and logging...........................................................................................................................................................11
Serviceability....................................................................................................................................................................... 12
Security updates and patches...................................................................................................................................12
Product code integrity...................................................................................................................................................... 12
Chapter 4: Miscellaneous Configuration and Management Elements............................................ 13
OpenManage Integration with Microsoft Windows Admin Center Licensing......................................................13
Credential Security Service Provider (CredSSP).......................................................................................................14
OS to iDRAC Pass through..............................................................................................................................................14
Protect authenticity and integrity..................................................................................................................................15
Manage backup and restore in OMIMSWAC.............................................................................................................. 15
Chapter 5: Contacting Dell...........................................................................................................16
Contents
Contents 3