beautypg.com

Integrated security features – HP Insight Control User Manual

Page 7

background image

Server migration enables you to easily transfer the settings from an existing CMS to a new
one.

See

Chapter 9 “Migrating existing physical or virtual servers to another server”

for more

information.

Scalable monitoring for hundreds of servers

Insight Control and Systems Insight Manager

can monitor and manage hundreds of servers.

See also the latest HP Insight Control Release Notes at

http://www.hp.com/go/insightcontrol/docs/

for more information.

Integrated security features

The HP Insight Software Getting Started Guide lists security considerations and best practices
recommended by HP. Review that information to ensure you have implemented an appropriate
security solution for your environment.

The following features have been integrated into Systems Insight Manager and Insight Control
to make them secure:

Browser Connections

Systems Insight Manager enforces a secure HTTPS connection to the web browser.

User Names and Passwords

A Systems Insight Manager administrator has total flexibility to configure user accounts
and passwords to allow or restrict actions on managed systems. User logins are authenticated
by the OS on the CMS, and alll passwords are encrypted. See the HP Systems Insight Manager
User Guide
for more information about security:

http://www.hp.com/go/foundationmgmt/docs

See also

User name and password not accepted

in the “Troubleshooting Insight Control

features” chapter.

Firewalls

Systems Insight Manager and Insight Control work with a firewall if you open the appropriate
ports.

For more information about managing HP servers through a firewall, see the Systems Insight
Manager information library, which contains a white paper that describes management
protocols, separating the management network, managing through a firewall using a single
network, and open ports on the CMS:

http://h18013.www1.hp.com/products/servers/management/hpsim/infolibrary.html

Digital signature

HP software, firmware, drivers, applications, and other executables are delivered with an
electronic cryptographic signature. This electronic signature gives you an industry standard
method to verify the integrity and authenticity of the code you have received before you
deploy it.

This digital signature is used in a signature verification process as follows:

— To verify and validate the authenticity of the code; that is, that HP created the code in

question.

— To verify and validate the integrity of the code; that is, that the code in question was

not altered since it was originally signed by HP.

See the HP Insight Software Getting Started Guide at

http://www.hp.com/go/insightcontrol/docs/

for additional security recommendations.

Integrated security features

7