NetBackup™ 10.3.0.1 Application Guide
- Product overview
- Release notes
- Geting started
- Creating NetBackup application instances
- Managing NetBackup application instances
- Accessing NetBackup primary and media server instances for management tasks
- Managing users on a primary or a media server instance
- Running NetBackup commands on a primary or a media server application instance
- Managing users on a primary or a media server instance
- Accessing NetBackup WORM storage server instances for management tasks
- Managing users from the deduplication shell
- Managing certificates from the deduplication shell
- Configuring an isolated recovery environment using the web UI
- Managing NetBackup services from the deduplication shell
- Monitoring and troubleshooting NetBackup services from the deduplication shell
- Managing S3 service from the deduplication shell
- Managing users from the deduplication shell
Enabling extra OS STIG hardening on a primary or a media server instance
The Security Technical Implementation Guides (STIGs) provide technical guidance for increasing the security of information systems and software to help prevent malicious computer attacks. This type of security is also referred to as hardening.
OS STIG hardening rules are automatically enabled on primary and media server instances. These rules are based on the following profile from the Defense Information Systems Agency (DISA):
STIG for Red Hat Enterprise Linux Server
You can enable extra OS STIG hardening for increased security. The additional rules add protection to the sshd process and enforce stricter password policies.
Note the following about enabling extra OS STIG hardening:
This command does not allow individual rule control.
Once the option is enabled, it cannot be disabled.
Before the extra rules are enabled on the instance, you can have unlimited concurrent SSH sessions. After OS STIG hardening is enabled, the maximum number of concurrent SSH sessions is limited to 10.
To enable extra OS STIG hardening
- Open an SSH session to the instance as the appadmin user.
- Run the following command:
sudo /opt/veritas/appliance/pxcc/compliance/bin/pxcc_hardenvxos_on_demand.sh -s