Managing HP Servers through Firewalls with Insight Management 7.0
25
Policies required for IM DVD Installation
The following security policies are mandatorily to be enabled before proceeding with the DVD
Installation. If the below policies are enabled and proceed with the installation then DVD installation
will complete successfully.
Table 10 Security Policies required for IM DVD Installation
User rights assignments Security Options Why it’s required
Bypass traverse checking
Everyone, LOCAL SERVICE, NETWORK
SERVICE,
Administrators, Users, Backup Operators
For to fetch the details from the IIS server
manager.
Access this computer from the
network
Everyone, Administrators, Users, Backup
Operators
To pass the service credentials screen in
installer
Log on as a service
NT SERVICE\ALL SERVICES, Classic
.NET AppPool, DefaultAppPool
To pass the service credentials screen in
installer
Debug Programs Administrators SQL Express 2008 R2 installation
Manage auditing and security
logs
Administrators SQL Express 2008 R2 installation
Back up files and directories Administrators, Backup Operators RDP Installation
Load and unload device
drivers
Administrators RDP Installation
Restore files and directories Administrators, Backup Operators RDP Installation
Take ownership of files or
other objects
Administrators RDP Installation
Additional policies required for proper operations of the system
Below are the additional polices needed to be enabled for the proper functioning of the system.
Table 11 Additional Policies need to be enabled
User rights assignments Security Options Why it’s required
Allow log on locally
Administrators, Account Operators,
Server Operators, Print Operators,
Backup Operators
Determines which users can log on to the
computer
Allow log on through Remote
Desktop Services
Administrators
This security setting determines which
users or groups have permission to log on
as a Remote Desktop Services client.
Force shutdown from a remote
system
Administrators, Server Operators
This security setting determines which
users are allowed to shut down a
computer from a remote location on the
network. Misuse of this user right can
result in a denial of service.
Shut down the system
Administrators, Server Operators, Print
Operators, Backup Operators
This security setting determines which