Users Guide

Contents
1 Introduction....................................................................................................................................................6
Installation........................................................................................................................................................................... 6
What is new in this release................................................................................................................................................7
Updating individual system components......................................................................................................................... 7
Storage Management Service..........................................................................................................................................8
Instrumentation Service.................................................................................................................................................... 8
Remote Access Controller................................................................................................................................................ 8
Logs..................................................................................................................................................................................... 8
Systems management standards availability.................................................................................................................. 8
Availability on supported operating systems.............................................................................................................8
Server Administrator Home Page.................................................................................................................................... 9
Other Documents You May Need.................................................................................................................................... 9
Accessing documents from the Dell EMC support site......................................................................................... 10
Obtaining Technical Assistance........................................................................................................................................11
Contacting Dell EMC.........................................................................................................................................................11
2 Setup And Administration.............................................................................................................................12
Role-Based Access Control.............................................................................................................................................12
User privileges.............................................................................................................................................................12
Authentication...................................................................................................................................................................13
Microsoft Windows Authentication..........................................................................................................................13
Red Hat Enterprise Linux And SUSE Linux Enterprise Server Authentication....................................................13
VMware ESXi Server Authentication....................................................................................................................... 13
Encryption..........................................................................................................................................................................14
Assigning User Privileges.................................................................................................................................................14
Adding users to a domain on Windows operating systems................................................................................... 14
Creating Server Administrator users for supported Red Hat Enterprise Linux and SUSE Linux
Enterprise Server operating systems....................................................................................................................... 14
Disabling Guest And Anonymous Accounts In Supported Windows Operating Systems..................................17
Conguring The SNMP Agent.................................................................................................................................. 17
Firewall Conguration On Systems Running Supported Red Hat Enterprise Linux Operating Systems
And SUSE Linux Enterprise Server..........................................................................................................................23
3 Using Server Administrator..........................................................................................................................25
Logging In And Out..........................................................................................................................................................25
Server Administrator Local System Login...............................................................................................................25
Server Administrator Managed System Login — Using the Desktop Icon........................................................ 26
Server Administrator Managed System Login — Using The Web Browser.......................................................26
Central web server login........................................................................................................................................... 26
Using The Active Directory Login.............................................................................................................................27
Single Sign-On............................................................................................................................................................27
Conguring Security Settings On Systems Running A Supported Microsoft Windows Operating System...28
Contents
3