The following product documentation contains additional security information:
Table 19-3 Security Consideration Links
Product/Technology
Security Considerations Section Link
OES Installation
Security Considerations in the Installation Guide
Multifactor Authentication
Multifactor Authentication Service in the Installation Guide
OES CIFS
Security Guidelines for CIFS in the OES CIFS for Linux Administration Guide.
OES Cluster Services
Security Considerations in the OES Cluster Services for Linux Administration Guide
Cloud Integrated Storage
Best Practices and Common Questions in the Cloud Integrated Storage Administration Guide
Domain Services for Windows
OES 23.4: OES Domain Services for Windows Security Guide
Distributed Files Services (DFS)
Security Considerations in the Distributed File Services Administration Guide for Linux
Dynamic Storage Technology
Security Considerations in the Dynamic Storage Technology Administration Guide
eDirectory
Security Considerations in the NetIQ eDirectory Administration Guide
File Systems
OES 2023: File Systems Management Guide (information throughout the guide)
Identity Manager 4.7
Security Best Practices in the NetIQ Identity Manager Security Guide.
iPrint for OES
Setting Up a Secure Printing Environment in the OES 23.4: OES iPrint Administration Guide
Linux User Management
Security Considerations in the Linux User Management Administration Guide
Client for Open Enterprise Server
Security Considerations in the Client for Open Enterprise Server Administration Guide
NCP Server for Linux
Security Considerations for NCP Server in the NCP Server for Linux Administration Guide
OES Remote Manager
Security Considerations in the OES 23.4: OES Remote Manager Administration Guide
Storage Services
Securing Access to NSS Volumes, Directories, and Files and Security Considerations in the Storage Services File System (NSS) Administration Guide for Linux
OES Migration Tools
Security Considerations for Data Migration in the Migration Tool Administration Guide
firewalld
Masquerading and Firewalls in the SLES Security Guide