Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

PowerProtect Data Manager 19.9 Security Configuration Guide

About this guide

This guide provides an overview of security configuration settings available in PowerProtect Data Manager, secure deployment, and physical security controls that are required to ensure the secure operation of the product.

Authentication
Authentication describes the settings, configuration options, and means by which users and external systems identify themselves to PowerProtect Data Manager.
Authorization
Authorization describes how PowerProtect Data Manager maps an authenticated user or external system to a level of access or permissions. More broadly, authentication describes what users are allowed to do.
Log Settings
A log is a chronological record that helps you to examine the sequence of activities surrounding or leading up to an operation, procedure, or event in a security-related transaction from beginning to end. This chapter describes how to access and manage the logs files available in PowerProtect Data Manager.
Network and Communication Security Settings
Communication security settings enable the establishment of secure communication channels between PowerProtect Data Manager components, PowerProtect Data Manager components and external systems, and PowerProtect Data Manager components and external components. This chapter describes the PowerProtect Data Manager uses secure channels for communication and how to configure PowerProtect Data Manager in a firewall environment.
Data Security Settings
Data security settings enable you to define controls that prevent unauthorized access and disclosure of data that is permanently stored by PowerProtect Data Manager. This chapter describes the settings available to ensure the protection of the data that is handled by PowerProtect Data Manager.
Cryptography
This chapter describes the cryptographic options and components for PowerProtect Data Manager, including how to manage the security certificates in use.
REST API procedures
This appendix describes other ways that you can accomplish some goals for which the preferred instructions use the web user interface (UI) or the command-line interface (CLI).

  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\