Information
Important This documentation space contains information about PATROL Agents when deployed in a BMC Helix Operations Management environment. If you are a TrueSight Operations Management user, see PATROL Agent 24.3.01

Securing the PATROL Agent components


This topic lists the security guidelines for the PATROL Agent and related components.

Securing files with sensitive information

To effectively secure sensitive information within PATROL components, it's essential to implement strict file access controls. This includes the following key practices:

  • Restrict access to files containing sensitive information, such as certificates and user credentials. These files must be secured by restricting access to all users except the owner.
  • Lock down the access to files that can encrypt or decrypt the data containing sensitive or confidential information, such as sec_encrypt_p3x.exe or mcxpagent.exe.
  • Do not store the files containing sensitive data on the network shares with open access.

    Warning

    Important

    The above security guidelines apply to all the PATROL components.

 

Securing access to the PATROL Agent

To ensure secure access to the PATROL Agent and maintain proper authorization within your environment, follow these best practices:

  • Use the Agent Access Control List (ACL) to restrict the access to the PATROL Agent. For more information, see Controlling-access-to-the-agent.
  • Use the PATROL Agent selection criteria in the BMC Helix Operations Management authorization profile for policy management. The PATROL Agent ACL defined in the BMC Helix Operations Management Administration doesn't overlap with the Agent ACLs defined within the PATROL Agent.

     For more information, see the following topics:

 

Securing the system running PATROL Agent

To secure the PATROL Agent system, set appropriate permissions to authenticate users and manage trusted connections. Use an application account for the PATROL Agent's default account, disable unnecessary shells, and perform data monitoring with restricted access. To minimize security risks and prevent client connections to unauthorized users, use user names with limited privileges. To further secure the PATROL Agent system, implement the following best practices:

  • Set the following permissions for authenticating users to run the agent query tool between BMC Helix Operations Management and the PATROL Agent:
    • Allow execution of Agent Actions
    • Allow only trusted connections to PATROL Agents

           For more information, see Running a query on the PATROL Agent.

 

Securing monitored resources

Provide read-only access to user accounts for monitoring resources like Oracle, WebSphere, and vCenter. For detailed security recommendations, refer to the documentation for each specific knowledge module.

 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC PATROL Agent for BMC Helix Operations Management 25.4