This guide provides an overview of security configuration settings available in
PowerProtect Data Manager, secure deployment, and physical security controls that are required to ensure the secure operation of the product.
Authentication
Authentication describes the settings, configuration options, and means by which users and external systems identify themselves to
PowerProtect Data Manager.
Authorization
Authorization describes how
PowerProtect Data Manager maps an authenticated user or external system to a level of access or permissions. More broadly, authentication describes what users are allowed to do.
Log Settings
A log is a chronological record that helps you to examine the sequence of activities surrounding or leading up to an operation, procedure, or event in a security-related transaction from beginning to end. This chapter describes how to access and manage the logs files available in
PowerProtect Data Manager.
Network and Communication Security Settings
Communication security settings enable the establishment of secure communication channels between
PowerProtect Data Manager components,
PowerProtect Data Manager components and external systems, and
PowerProtect Data Manager components and external components. This chapter describes the
PowerProtect Data Manager uses secure channels for communication and how to configure
PowerProtect Data Manager in a firewall environment.
Data Security Settings
Data security settings enable you to define controls that prevent unauthorized access and disclosure of data that is permanently stored by
PowerProtect Data Manager. This chapter describes the settings available to ensure the protection of the data that is handled by
PowerProtect Data Manager.
Cryptography
This chapter describes the cryptographic options and components for
PowerProtect Data Manager, including how to manage the security certificates in use.
REST API procedures
This appendix describes other ways that you can accomplish some goals for which the preferred instructions use the web user interface (UI) or the command-line interface (CLI).
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\