Scope

Securing Enterprise Server describes the various security-related aspects of Enterprise Server and how these can be used to "harden" an Enterprise Server installation. By explaining the available security features, options and their effects when configured, it enables sensible decisions about enterprise server instance security. It also includes recommendations to help administrators achieve a security posture suitable for modern production environments.

The intended audience is enterprise server instance administrators, including developers who run enterprise server instances for development and test purposes, who want to ensure that their Enterprise Server installation:

The features and configuration options discussed here are also described in the appropriate reference sections of the production documentation. This guide is intended to provide a single resource which can serve as a guide to ensure systems are configured appropriately from a security perspective. It also includes a checklist so administrators can consult a single topic to review which security features they have enabled. References to topics in your product Help are provided where relevant.

Some security aspects and guidelines for the operating systems hosting Enterprise Server are also reviewed.

What is not covered

This guide does not cover the following areas:

  • Enterprise Server for .NET.
  • Security configuration of some secondary enterprise server instance components, such as XDB.
  • Legacy features which should be disabled, such as the Micro Focus Directory Server Web user interface.
  • Securing development tools or the application development process (other than securing enterprise server instances used for development).
  • Samples, field-developed solutions (FDSs), third-party add-ons, and other components not part of the base Enterprise Server product.

Also, while the security of customer applications hosted under Enterprise Server is discussed briefly, that is a complex area which cannot be covered in any depth in this guide. Micro Focus recommends customers devote appropriate resources to industry best practices for producing secure software, including using a Secure Development Lifecycle, training employees in secure development techniques, and using tools to detect potential vulnerabilities (such as Micro Focus Fortify).