Secure the server
After configuring the N-central server, you must secure it. Securing the server ensures that all communication between the server, agents, probes, and users is protected from unauthorized access or interception.
Complete the following key tasks to harden your server environment and maintain compliance with security best practices:
-
Apply network security settings to control access and restrict traffic to approved ports and protocols.
-
Configure SSL certificates to encrypt communication between the server and connected devices.
These key tasks reduce the risk of data exposure, strengthen authentication and encryption, and prepare your environment for secure operations across all N-central services.
