Reference Guide
Table Of Contents
- Dell EMC PowerStore Security Configuration Guide
- Contents
- Additional Resources
- Authentication and access
- Hardware root of trust
- Authenticating and Managing User Accounts, Roles, and Privileges
- Certificates
- Secure communication between PowerStore appliances within a cluster
- Secure communication for replication and data import
- vSphere Storage API for Storage Awareness support
- CHAP authentication
- Configuring CHAP
- External SSH access
- Configuring external SSH access
- NFS secure
- Security on file system objects
- File systems access in a multiprotocol environment
- Understanding Common AntiVirus Agent (CAVA)
- Code signing
- Communication security settings
- Auditing
- Data security settings
- Secure serviceability settings
- Operational description of SupportAssist
- SupportAssist options
- SupportAssist Connect via Gateway option
- SupportAssist Connect Directly option
- Requirements for SupportAssist Connect via Gateway
- Requirements for SupportAssist Connect Directly
- Configuring SupportAssist
- Configure SupportAssist
- CloudIQ
- Cybersecurity
- Security Alert Settings
- TLS cipher suites
- Directory Services
system. Although the operating system is resistant to viruses, Windows clients that access the storage system require virus
protection. Virus protection on clients reduces the chance that they will store an infected file on the server, and protects them
if they open an infected file. This antivirus solution consists of a combination of the operating system software, CAVA agent,
and a third-party antivirus engine. The CAVA software and a third-party antivirus engine must be installed on a Windows Server
in the domain.
For additional information about CAVA, which is part of Common Event Enabler (CEE), see Using the Common Event Enabler on
Windows Platforms at https://www.dell.com/powerstoredocs.
Code signing
PowerStore is designed to accept software upgrades for both new releases and patch releases. A master GNU Privacy Guard
(GPG) key signs all PowerStore software packages and Dell EMC controls this GPG key. The PowerStore software upgrade
process verifies the signature of the software package, and rejects invalid signatures that might indicate possible tampering or
corruption. The verification step is built into the upgrade process, and the signature of the software package is automatically
verified during the pre-installation phase.
Authentication and access 27