Please enter search query.
Search <book_title>...
Veritas NetBackup™ Appliance Security Guide
Last Published:
2021-05-26
Product(s):
Appliances (4.0)
Platform: NetBackup Appliance OS
- About the NetBackup appliance Security Guide
- User authentication
- About user authentication on the NetBackup appliance
- About configuring user authentication
- About user name and password specifications
- User authorization
- Intrusion prevention and intrusion detection systems
- Log files
- Operating system security
- Data security
- Web security
- Network security
- Call Home security
- Remote Management Module (RMM) security
- STIG and FIPS conformance
- Appendix A. Security release content
A
- Active Directory user
- configure authentication, About configuring user authentication
- AD supported users
- configure server, About authenticating Active Directory users
- pre-requisites, About authenticating Active Directory users
- appliance log files
- appliance ports, About NetBackup appliance ports
- appliance security
- authentication
- authorization, About user authorization on the NetBackup appliance
- Administrator, About the Administrator user role
- NetBackupCLI user, About the NetBackupCLI user role
- AutoSupport
- customer registration, About AutoSupport
B
- Browse command
- appliance log files, Where to find NetBackup appliance log files using the Browse command
C
- Call Home
- alerts, About Call Home
- workflow, Understanding the Call Home workflow
- Call Home proxy server
- collect logs
- commands, Viewing log files using the Support command
- datacollect, Gathering device logs on a NetBackup appliance
- log file location, Viewing log files using the Support command
- types of logs, Viewing log files using the Support command
D
- data classification, About data classification
- data encryption, About data encryption
- KMS support, KMS support
- data integrity, About data integrity
- CRC verification, About data integrity
- end-to-end verification, About data integrity
- data security, About data security
- datacollect
- device logs, Gathering device logs on a NetBackup appliance
I
- intrusion detection system
- intrusion prevention system
- IPMI security
- recommendations, Recommended IPMI settings
- IPMI SSL certificate, Replacing the default IPMI SSL certificate
- IPsec
- network security, About IPsec Channel Configuration
K
- Kerberos
- authenticate NIS, About authenticating Kerberos-NIS users
L
- LDAP authentication pre-requisites, About authenticating LDAP users
- LDAP configuration methods, About authenticating LDAP users
- LDAP supported users
- configure server, About authenticating LDAP users
- pre-requisites, About authenticating LDAP users
- LDAP user
- configure authentication, About configuring user authentication
- local user
- configure authentication, About configuring user authentication
- log files
- introduction, About NetBackup appliance log files
- log forwarding
- configuration, Log Forwarding feature overview
- overview, Log Forwarding feature overview
- secure log transmission, Log Forwarding feature overview
- login banner
M
- Management Information Base (MIB), About the Management Information Base (MIB)
N
- NetBackupCLI
- run NetBackup commands, About the NetBackupCLI user role
- special directive operations, About the NetBackupCLI user role
- network security
- NIS configuration methods, About authenticating Kerberos-NIS users
- NIS supported users
- configure server, About authenticating Kerberos-NIS users
- pre-requisites, About authenticating Kerberos-NIS users
- NIS user
- configure authentication, About configuring user authentication
- NIS user authentication pre-requisites, About authenticating Kerberos-NIS users
- notifications, About Call Home
O
- operating system
- major components, Major components of the NetBackup appliance OS
- security highlights, About NetBackup appliance operating system security
- OS STIG hardening, OS STIG hardening for NetBackup appliance
P
- password
- credentials, About user name and password specifications
- encryption, About user name and password specifications
- password policy rules
- STIG compliant, About STIG-compliant password policy rules
- privileges
- user role, NetBackup appliance user role privileges
R
- replacing
- IPMI SSL certificate, Replacing the default IPMI SSL certificate
S
- Simple Network Management Protocol (SNMP), About SNMP
- SSL usage, About SSL usage
- Symantec Data Center Security
- about, About Symantec Data Center Security on the NetBackup appliance
- IDS policy, About the NetBackup appliance intrusion detection system
- IPS policy, About the NetBackup appliance intrusion prevention system
- managed mode, About Symantec Data Center Security on the NetBackup appliance, Running SDCS in managed mode on the NetBackup appliance
- unmanaged mode, About Symantec Data Center Security on the NetBackup appliance, Running SDCS in unmanaged mode on the NetBackup appliance
T
- Third-party certificates, About SSL usage
U
- unenforced STIG rules, Unenforced STIG hardening rules
- user, About user authentication on the NetBackup appliance
- Active Directory, About configuring user authentication
- add, About authorizing NetBackup appliance users
- admin, About user authentication on the NetBackup appliance
- Administrator, About user authentication on the NetBackup appliance
- AppComm, About user authentication on the NetBackup appliance
- authorize, About authorizing NetBackup appliance users
- Kerberos-NIS, About configuring user authentication
- LDAP, About configuring user authentication
- local, About configuring user authentication
- Maintenance, About user authentication on the NetBackup appliance
- manage role
- permissions, About authorizing NetBackup appliance users
- NetBackupCLI, About user authentication on the NetBackup appliance
- root, About user authentication on the NetBackup appliance
- sisips, About user authentication on the NetBackup appliance
- user authentication
- configure, About configuring user authentication
- guidelines, Generic user authentication guidelines
- user group
- add, About authorizing NetBackup appliance users
- manage role
- permissions, About authorizing NetBackup appliance users
- user name credentials, About user name and password specifications
- user role privileges
- NetBackup appliance, NetBackup appliance user role privileges
V
- vulnerability testing, Vulnerability scanning of the NetBackup appliance