Template:ZMC security notes

Table of contents
No headers

Version as of 01:28, 20 Apr 2024

to this version.

Return to Version archive.

View current version

You should take care to secure access to enterprise backup tools such as the Zmanda Management Console. This section notes some of the best practices to ensure that the ZMC and backups themselves are available only to authorized network administrators.

  • When installing the ZMC, choose https rather than http for ZMC access. Use http only if the administrator, backup server, and all backup clients reside in a single network that is isolated from the internet.
  • Only create accounts on the backup server and the ZMC server for those trusted with the data processed by these systems.
  • Make sure strong passwords (i.e. alpha and numerical, at least 8 characters) are in effect for all login accounts.
  • Use encryption when using the ZMC back up remote systems over the network.

In addition to these precautions, you should review the overall security of your network and follow the best practices for the industry. Entering the term "Network Security Best Practices" into any web search engine will yield a wealth of current information on the subject.