Windows HPC Server 2008 R2: Security
Updated: December 2011
Applies To: Windows HPC Server 2008 R2
This document helps you to understand the security implications of configuration choices that you can make in Windows® HPC Server 2008 R2. It also describes how to perform specific tasks that directly affect security in an HPC cluster, such as the task of designating HPC cluster administrators and HPC cluster users.
Featured content
Security Considerations for Using Azure Nodes in a Windows HPC Cluster
Security Considerations for SQL Server Databases used by Windows HPC Server 2008 R2
Security Considerations for File and Folder Permissions in Windows HPC Server 2008 R2
In this document
Title | Description |
---|---|
Checklist of Security Settings That Can Be Tightened with Windows HPC Server 2008 R2 |
Provides a list of the Mayn security settings for Windows HPC Server 2008 R2 that are described in this document and describes how to tighten them. |
Security Considerations for Network Topologies in Windows HPC Server 2008 R2 |
Describes the security implications of network design decisions such as whether to isolate your compute nodes on a separate network or networks. |
Security Considerations for SQL Server Databases used by Windows HPC Server 2008 R2 |
Describes the range of security options that are available for the SQL Server databases that are used by Windows HPC Server 2008 R2. |
Security Considerations for Deploying Compute Nodes in Windows HPC Server 2008 R2 |
Describes the security implications of using the Pre-Boot Execution Environment (PXE) for compute node deployment. This section also describes a security-related setting that you can configure in compute node templates. |
Security Considerations for Designating HPC Cluster Users and Administrators |
Describes the two cluster roles that you can specify in HPC Cluster Manager: HPC cluster user and HPC cluster administrator. |
Security Considerations for File and Folder Permissions in Windows HPC Server 2008 R2 |
Lists types of files and folders that have security implications in an HPC cluster, describes their locations, and describes why they are important. |
Security Considerations for Handling Cluster Credentials in Windows HPC Server 2008 R2 |
Describes how credentials (user names and passwords) are handled during installation, configuration, and job submission in an HPC cluster. This section also describes how you can control the length of time that job-submission credentials are stored on the head node. |
Configuring Firewall Exceptions and Access for Client Applications with Windows HPC Server 2008 R2 |
Describes how firewall exceptions and access settings affect the ability of client applications to run in an HPC cluster. |
Security Considerations for Using Azure Nodes in a Windows HPC Cluster |
Describes security considerations for deploying and running jobs on Windows Azure nodes that have been added to an HPC cluster (a Windows Azure “burst” scenario) |
Not covered in this document
This document does not describe security basics, that is, strategies and risk-management methods that provide a foundation for security across your organization. Some examples of security basics are restricting physical access to your servers and networks, and using strong passwords. This document also does not describe methods for applying software updates (which can help strengthen the security of a server) to nodes in your HPC cluster. For more information about these topics, see "Additional references," later in this topic.