ONTAP Technical Reports
Applications and databases
Business continuity
Data protection and disaster recovery
FlexCache and FlexGroup volumes
NAS
Networking
SAN
Security
Overview
NetApp solution for ransomware
Ransomware and NetApp's protection portfolio
SnapLock and tamperproof snapshot copies
FPolicy file blocking
Data Infrastructure Insights Storage Workload Security
Autonomous Ransomware Protection (ARP)
Cyber vaulting
Active IQ ransomware protection
BlueXP ransomware protection
NetApp and Zero Trust
Zero Trust overview
Architect Zero Trust approach
Automation for Zero Trust at scale
Zero Trust hybrid cloud deployments
Attribute-based access control
Overview
Approaches to ABAC with ONTAP
Security hardening
Overview
ONTAP security hardening guidelines
ONTAP security hardening overview
ONTAP image validation
Local storage administrator accounts
Roles, applications, and authentication
Default administrative accounts
Multi administrator verification
Snapshot copy locking
Set up certificate-based API access
ONTAP OAuth 2.0 Token Based Authentication for REST API
Login and password parameters
System administration methods
ONTAP autonomous ransomware protection
Storage administrative system auditing
Storage encryption
Data replication encryption
IPsec data-in-flight encryption
FIPS mode and TLS and SSL management
Create a CA-signed digital certificate
Online certificate status protocol
SSHv2 management
NetApp AutoSupport
Network Time Protocol
NAS file system local accounts (CIFS workgroup)
NAS file system auditing
Configure CIFS SMB signing and sealing
NFS securing
Enable Lightweight Directory Access Protocol signing and sealing
Create and use a NetApp FPolicy
LIF security
Protocol and port security
SnapCenter
Tiering
Virtualization
Legal notices