Security Best Practices
Following are some best practice recommendations that you should consider in order to enhance the security and privacy of ITM On-Prem (ObserveIT) installations and recorded sessions:
-
Ensure that the servers running ITM On-Prem (ObserveIT) components are physically secure. If possible, lock these computers in a secure room to which only authorized personnel have direct access.
-
Ensure that administrative rights to the Windows operating system are given only to those users that currently need them as part of their job description, and remove outdated users from administrative groups such as the default Administrators, Domain Admins, and Enterprise Admins groups.
-
Change the default ITM On-Prem (ObserveIT) Admin password frequently and control access to that account.
-
Strictly limit who is authorized to manage ITM On-Prem (ObserveIT) and view recorded sessions.
-
Enable Agent-to-Application Server traffic security.
-
Enable Database encryption and digital signing.
-
Enable Installation Security to prevent rough Agent installation.
-
Install digital certificates and set up SSL communications in IIS.
-
Prevent the usage and execution of specific applications, programs or file types by using Group Policy Objects (or GPO). If required, refer to the Microsoft articles:
-
Using Software Restriction Policies to Protect Against Unauthorized Software
-
How to Use Software Restriction Policies on Windows Server 2012
-
Protect traffic to and from critical servers by implementing IPsec Policies. If required, refer to the Microsoft article: IPsec.
-
Read and implement well-documented security guidelines.