diff --git a/windows/application-management/app-v/revision-heidi/appv-security-considerations.md b/windows/application-management/app-v/revision-heidi/appv-security-considerations.md index a8fb09e7b9..64eb79bd48 100644 --- a/windows/application-management/app-v/revision-heidi/appv-security-considerations.md +++ b/windows/application-management/app-v/revision-heidi/appv-security-considerations.md @@ -17,32 +17,30 @@ This topic contains a brief overview of the accounts and groups, log files, and >[!IMPORTANT] >App-V is not a security product and does not provide any guarantees for a secure environment. -## PackageStoreAccessControl (PSAC) feature has been deprecated +## The PackageStoreAccessControl (PSAC) feature has been deprecated -Effective as of June, 2014, the PackageStoreAccessControl (PSAC) feature that was introduced in Microsoft Application Virtualization (App-V) 5.0 Service Pack 2 (SP2) has been deprecated in both single-user and multi-user environments. +Effective as of June, 2014, the PackageStoreAccessControl (PSAC) feature introduced in Microsoft Application Virtualization (App-V) 5.0 Service Pack 2 (SP2) has been deprecated in both single-user and multi-user environments. ## General security considerations -**Understand the security risks.** The most serious risk to App-V is that its functionality could be hijacked by an unauthorized user who could then reconfigure key data on App-V clients. The loss of App-V functionality for a short period of time due to a denial-of-service attack would not generally have a catastrophic impact. +**Understand the security risks.** The most serious risk to App-V is from unauthorized users hijacking an App-V client's functionality, giving the hacker the ability to reconfigure key data on App-V clients. By comparison, short-term loss of App-V functionality from a denial-of-service attack would not be as catastrophic. -**Physically secure your computers**. Security is incomplete without physical security. Anyone with physical access to an App-V server could potentially attack the entire client base. Any potential physical attacks must be considered high risk and mitigated appropriately. App-V servers should be stored in a physically secure server room with controlled access. Secure these computers when administrators are not physically present by having the operating system lock the computer, or by using a secured screen saver. +**Physically secure your computers**. A security strategy that doesn't consider physical security is incomplete. Anyone with physical access to an App-V server could potentially attack the entire client base, so potential physical attacks or thefts should be prevented at all cost. App-V servers should be stored in a physically secure server room with controlled access. Lock the computer with the operating system or a secured screen saver to keep computers secure when the administrators are away. -**Apply the most recent security updates to all computers**. To stay informed about the latest updates for operating systems, Microsoft SQL Server, and App-V, see the [Microsoft Security TechCenter](https://technet.microsoft.com/en-us/security/bb291012). +**Apply the most recent security updates to all computers**. To stay informed about the latest updates for operating systems, Microsoft SQL Server, and App-V, see the [Microsoft Security TechCenter](https://technet.microsoft.com/en-us/security/bb291012). (THIS LINK NEEDS TO BE UPDATED) -**Use strong passwords or pass phrases**. Always use strong passwords with 15 or more characters for all App-V and App-V administrator accounts. Never use blank passwords. For more information about password concepts, see [Password Policy](https://technet.microsoft.com/library/hh994572.aspx). +**Use strong passwords or pass phrases**. Always use strong passwords with 15 or more characters for all App-V and App-V administrator accounts. Never use blank passwords. For more information about password concepts, see [Password Policy](https://docs.microsoft.com/en-us/sql/relational-databases/security/password-policy) and [Strong Passwords](https://docs.microsoft.com/en-us/sql/relational-databases/security/strong-passwords). (THIS LINK NEEDS TO BE UPDATED) ## Accounts and groups in App-V -A best practice for user account management is to create domain global groups and add user accounts to them. Then, add the domain global accounts to the necessary App-V local groups on the App-V servers. +A best practice for user account management is to create domain global groups and add user accounts to them. After that, add the domain global accounts to the necessary App-V local groups on the App-V servers. >[!NOTE] >App-V client computer accounts that need to connect to the publishing server must be part of the publishing server’s **Users** local group. By default, all computers in the domain are part of the **Authorized Users** group, which is part of the **Users** local group. - - ### App-V server security -No groups are created automatically during App-V Setup. You should create the following Active Directory Domain Services global groups to manage App-V server operations. +No groups are created automatically during App-V setup. You should create the following Active Directory Domain Services global groups to manage App-V server operations.
App-V Management Admin group |
Used to manage the App-V management server. This group is created during the App-V Management Server installation.
-Important
-
There is no method to create the group using the management console after you have completed the installation. +Important +The management console can't create a new group after installation is complete.
@@ -69,23 +67,23 @@ No groups are created automatically during App-V Setup. You should create the fo
|
-Database read/write for Management Service account |
+Provides read/write access to the management database. This account should be created during the App-V management database installation. Provides read/write access to the management database. This account should be created during App-V management database installation. |
-App-V Management Service install admin account
-Note
-
This is only required if management database is being installed separately from the service. +Note +This is only required if the management database is being installed separately from the service. |
+Provides public access to schema-version table in management database. This account should be created during the App-V management database installation. Provides public access to schema-version table in management database. This account should be created during App-V management database installation. App-V Reporting Service install admin account
-Note
+Note
This is only required if reporting database is being installed separately from the service.
@@ -96,38 +94,25 @@ No groups are created automatically during App-V Setup. You should create the fo
|