Case Study

ITOM Visibility security overview

ITOM Visibility security overview

Pages 12 Pages

ITOM Visibility security overviewTable of contents Introduction 3 Understanding ITOM Visibility capabilities 4 ITOM Visibility Architecture 5 ServiceNow Instance security 6 MID Server security and trust 6 Credential security 7 Local credential storage 7 External credential storage 8 Credential-less discovery 9 Access requirements, protocols, and privileges 9 Port scanning 9 SNMP-based discovery 9 Windows hosts 9 Linux/Unix hosts 10 Applicative credentials 10 Other technology-specific credentials 10 Cloud Discovery 10 Additional security controls 11 Plain text patterns 11 Code signing 11 Command Audit Log 11 Syslog 11 Unauthorized changes 11 Frequently asked questions 11 2Introduction Visibility is critical in IT environments. Unless you have visibility of your infrastructure and know ho

Join for free to read