Veritas Access Appliance 8.4 Initial Configuration Guide
- Getting to know the Access Appliance
- Preparing to configure the appliance
- Configuring the appliance for the first time
- Getting started with the Veritas Access GUI
- Network connection management
- Resetting the appliance to factory settings
- Appliance security
- About Access appliance user account privileges
- About the Access Appliance intrusion detection system
- About Access appliance operating system security
- Recommended IPMI settings on the Access appliance
About data security on the Access appliance
The Access appliance uses policy-driven mechanisms to protect data in your Access environment.
Data security is improved by using the following measures to avoid data leaks:
Real-time intrusion detection mechanisms to audit access to confidential data
Logging and real-time tracking of all restores.
Access to the backed up data is only granted to authenticated appliance users and processes.
All backed up data in storage (VPFS) is marked with Cyclic Redundancy Check (CRC) digital signatures when the backup takes place. A maintenance task continuously re-computes the CRC digital signatures and compares it with the original signature to detect if there has been any unwanted tampering or corruption in the storage.
Encryption of data in transit and at rest for services like the Veritas Cloud Service and AutoSupport.