Please enter search query.
Search <book_title>...
Access Appliance Online Help
Last Published:
2021-05-09
Product(s):
Appliances (7.4.3)
Platform: Veritas 3340,Access Appliance OS
- Getting started
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- About the NFS shares
- About S3 buckets for NetBackup
- Managing storage
- Managing file sharing services
- Monitoring and troubleshooting
- Provisioning and managing file systems
- Creating a file system
- Configuring a replication job
- Provisioning and managing shares
- Managing policies
- Managing settings
- About replication
- About Access Appliance product licensing
- About the File Transfer Protocol
- About Veritas Data Deduplication
- About alert management
STIG overview for Access Appliance
The Security Technical Implementation Guides (STIGs) provide technical guidance for increasing the security of information systems and software to help prevent malicious computer attacks. This type of security is also referred to as hardening.
In version 7.4.3, you can enable OS STIG hardening rules for increased security. These rules are based on the following profile from the Defense Information Systems Agency (DISA):
STIG for Red Hat Enterprise Linux 7 Server - Version 0.1.43
The STIG option is enabled at cluster level. If the STIG option is enabled, the STIG rules are enforced on both the nodes in a cluster.