Integrated security features – HP Insight Control User Manual
Page 7

Server migration enables you to easily transfer the settings from an existing CMS to a new
one.
See
Chapter 9 “Migrating existing physical or virtual servers to another server”
for more
information.
•
Scalable monitoring for hundreds of servers
Insight Control and Systems Insight Manager
can monitor and manage hundreds of servers.
See also the latest HP Insight Control Release Notes at
for more information.
Integrated security features
The HP Insight Software Getting Started Guide lists security considerations and best practices
recommended by HP. Review that information to ensure you have implemented an appropriate
security solution for your environment.
The following features have been integrated into Systems Insight Manager and Insight Control
to make them secure:
•
Browser Connections
Systems Insight Manager enforces a secure HTTPS connection to the web browser.
•
User Names and Passwords
A Systems Insight Manager administrator has total flexibility to configure user accounts
and passwords to allow or restrict actions on managed systems. User logins are authenticated
by the OS on the CMS, and alll passwords are encrypted. See the HP Systems Insight Manager
User Guide for more information about security:
See also
User name and password not accepted
in the “Troubleshooting Insight Control
features” chapter.
•
Firewalls
Systems Insight Manager and Insight Control work with a firewall if you open the appropriate
ports.
For more information about managing HP servers through a firewall, see the Systems Insight
Manager information library, which contains a white paper that describes management
protocols, separating the management network, managing through a firewall using a single
network, and open ports on the CMS:
•
Digital signature
HP software, firmware, drivers, applications, and other executables are delivered with an
electronic cryptographic signature. This electronic signature gives you an industry standard
method to verify the integrity and authenticity of the code you have received before you
deploy it.
This digital signature is used in a signature verification process as follows:
— To verify and validate the authenticity of the code; that is, that HP created the code in
question.
— To verify and validate the integrity of the code; that is, that the code in question was
not altered since it was originally signed by HP.
See the HP Insight Software Getting Started Guide at
for additional security recommendations.
Integrated security features
7