About the Operations Manager 2007 Security Guide
Applies To: Operations Manager 2007 R2, Operations Manager 2007 SP1
This guide provides you with security-related information as it pertains to Operations Manager 2007. The topics discussed in this release of the security guide are described in the following section.
For future releases of this document, see the Operations Manager 2007 Security Guide (https://go.microsoft.com/fwlink/?LinkId=64017).
In This Section
Describes the accounts in Operations Manager 2007 that you will provide credentials for. |
|
Describes how role-based security is implemented. |
|
Run As Accounts and Run As Profiles in Operations Manager 2007 |
Describes how Run As Accounts and Run As Profiles are used. |
Authentication and Data Encryption for Windows Computers in Operations Manager 2007 |
Describes how and when data between various Operations Manager components is encrypted and instructions about how to obtain and use certificates. |
Authentication and Data Encryption for UNIX and Linux Operating Systems |
Describes how to securely deploy agents to UNIX-based and Linux-based computers. |
Describes when certificates must be used so that authentication can take place between the ACS Forwarder and the ACS Collector. |
|
Security Considerations for Agentless Management in Operations Manager 2007 |
Provides information about security considerations for agentless management. |
Shows how to use Secure Sockets Layer (SSL) with the Web console in Operations Manager 2007. |
|
Lists the operations available, broken out by profile. |
|
Lists the hash values for the UNIX and Linux agents |
External Resources
For an online version of help, see Operations Manager 2007 Help (https://go.microsoft.com/fwlink/?LinkID=77739).