Source |
Target |
Port/Protocols | |
---|---|---|---|
Content Matrix Console
|
Job DB, Agent DB |
MSSQL (default 1433 TCP) or SQLCE | |
SharePoint Server (remote machine) |
Native Web Service |
User selected port (TCP) | |
Nintex Web Service |
443 (TCP) or 80 (TCP) | ||
MEWS |
Native Web Service port (TCP) | ||
SharePoint DB |
MSSQL (default 1433 TCP) | ||
Quest Web Services |
Metalogix License Service |
443 (TCP) | |
Nintex Conversion Service |
443 (TCP) | ||
Azure Cloud |
Azure Blob Storage |
443 (TCP) | |
Azure Queue |
443 (TCP) | ||
Microsoft Office 365 (SPO CSOM) |
443 (TCP) | ||
Nintex Online |
443 (TCP) | ||
PowerShell |
Content Matrix Agents |
135 (TCP) and dynamic ports (TCP) | |
Content Matrix Agents |
Agent DB |
MSSQL (default 1433 TCP) or SQLCE |
Figure 2: List of protocols used and associated ports
.
Metalogix® Content Matrix relies upon
·Windows Authentication and Active Directory group membership to authenticate users
·Forms Based Authentication which authenticates through IIS
·Azure Active Directory authenticating via Office 365 OAuth Authentication
·Azure Active Directory authenticating via Office 365 Web Browser
Metalogix® Content Matrix cryptographic usage is based on FIPS 140-2 compliant cryptographic functions. Metalogix® Content Matrix makes use of FIPS 140-2 compliant encryption keys stored locally using Microsoft DPAPI.
Metalogix® Content Matrix has undergone a Quest internal Self-Affirmation process to confirm that all cryptographic usage relies exclusively on Third-Party FIPS 140-2 validated modules.
More information: Microsoft and FIPS: https://www.microsoft.com/en-us/trustcenter/compliance/fips
Metalogix® Content Matrix is Air Gap compliant.
What is Air Gap?
Air Gap is an architecture based on physical separation and trusted people. Its goal is to demonstrably protects all product builds and code delivery from potential mischievous employee or external actors, regardless of world location.
Air Gap Components
Air Gap consists of:
· A secure facility within Quest that contains the complete supply and assembly chain for all products in scope.
·Limited access: only select employees have access to review, accept, and transfer contributions into this environment.
·A vetted secure build process which entirely separates the Product Development from the Product Build.
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center