![]() ![]() ![]() Hardening includes making sure you will notice when an attack is/or has taken place and then having logs and traces saved for law-enforcement and security specialists when needed. While these components may offer useful features to the administrator, if they provide ‘back-door’ access to the system, they must be removed during the hardening process.īut also, creating visibility in what goes on in the infrastructure is part of hardening your infrastructure. One of the main measures in hardening is removing all non-essential software programs and utilities from the deployed Veeam components. Hardening is about securing the infrastructure against attacks by reducing its attack surface and thus eliminating as many risks as possible. It follows security best practices so that customers reduce chances of being compromised. This chapter provides practical advice to help administrators to harden their infrastructure. ![]() This site uses Just the Docs, a documentation theme for Jekyll. Restoring VMs to an HPE 3PAR with thin disks.Backup Repository HA using Windows Storage Replica. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |