Go to main content

Oracle® SuperCluster M8 and SuperCluster M7 Security Guide

Exit Print View

Updated: June 2020
 
 

Network Monitoring

After the networks are configured based on the security guidelines, regular review and maintenance is needed.

Follow these guidelines to ensure the security of local and remote access to the system:

  • Review logs for possible incidents and archive them in accordance with your organization's security policies.

  • Perform periodic reviews of the client access network to ensure that host and Oracle ILOM settings remain intact.

For more information, refer to the security guides for the Oracle Solaris OS: