Skip to content

Latest commit

 

History

History
65 lines (39 loc) · 4.54 KB

cpprotectsys.md

File metadata and controls

65 lines (39 loc) · 4.54 KB
copyright lastupdated keywords subcollection
years
1994, 2019
2019-04-09
aregular backups, private network, IBM Cloud infrastructure,
customer-portal

{:shortdesc: .shortdesc} {:codeblock: .codeblock} {:tip: .tip} {:screen: .screen} {:new_window: target="_blank"}

Protecting your systems

{: #customerportal_protsys}

Protecting your systems ensures that your systems are running smoothly and without unnecessary interruptions.

Use the private network

{: #cp_bpuseprivnet}

You can manage your devices in the most secure environment possible by using the {{site.data.keyword.BluSoftlayer_notm}} infrastructure private network. When possible, interact with your devices by using a VPN connection and enable network spanning so that your systems communicate over the private network. To access the private network, edit the user’s VPN access from the User List External link icon{:new_window}. Use the Virtual Private Network External link icon{:new_window} list to connect to one of the various VPN options.

For more information about using a VPN connection, see About VPN.

Don't leave RDP, SSH, or control ports on the public network

{: #cp_bpnordpsshcponpubnet}

The public network is great for many things but certain aspects, when left available on the public network through open ports, can leave your system vulnerable. Protect yourself by disabling RDP or restricting SSH on the public network. If these services must be available on the public network, consider moving RDP or SSH to a custom port number.

Safeguard your data through regular backups

{: #cp_bpsafedataregback}

You can schedule backups to ensure that your data is safely stored outside of your device, and to be able to reload it if it is lost.

{{site.data.keyword.BluSoftlayer_notm}} infrastructure offers multiple backup solutions to ensure that you can retrieve your data if the drive fails or if user makes an error. Backup solutions currently include NAS, EVault backup, and R1Soft CDP, which are all available in various storage options. For example, you can choose one of the following backup services to store your data in a secure location:

  • EVault backup is an automated, agent-based backup system and a popular “set-and-forget” solution for managing your device. It's compatible with Microsoft software that includes Exchange and SQL through plug-ins. EVault users interact with this service through EVault’s WebCC Web-based application.
  • R1Soft Continuous Data Protection (CDP) can be installed on your server or self-managed virtual machine. You can use it if you're looking for a single interface to manage all of your backups. You interact with R1Soft CDP through your proprietary management system, which allows agents to be installed on virtual machines and offers database plug-ins for more functions.

Check out the Storage External link icon{:new_window} page for more information on each backup solution and see Getting started with backup services for more information about backing up your data.

Don't assume that you have redundancy; know that you do

{: #cp_bpknowredundant}

{{site.data.keyword.BluSoftlayer_notm}} infrastructure offers multiple add-on redundancies that include dual-path, redundant power supplies, and RAID configurations. Verify that you provisioned one or more of these features to ensure that you're working in a redundant environment and that you're protected if there's a failure.

Confirm that your information is backed before you reload your OS

{: #cp_bpnoperfOSwobackupconf}

Reloading your operating system removes all data from the hard disk of the device. Before you initiate the OS reload, back up your information and verify the success of that backup so no information is lost. After an OS reload is completed, lost information can't be retrieved.

Don’t remove Adaptec Storage Manager (ASM)

{: #cp_bpsupdontremovasm}

{{site.data.keyword.BluSoftlayer_notm}} infrastructure uses ASM to monitor your RAID array status. If you delete this software, the support team can't monitor your device. If ASM is removed from your device, RAID failure alerts on your device aren't available and you aren't notified of the failure through the automatic notification system.