Javascript must be enabled to download our products and perform other essential functions on the website.

ionicons-v5-m
ionicons-v5-j
Buy Now Download Free Trial
ionicons-v5-m
ionicons-v5-f

PA Storage Monitor Product Security

Non-Cloud

All settings, databases, network information, etc., stays on your servers. The product is not cloud-based.

Secure SSL Connections

By default, PA Storage Monitor uses SSL/TLS secured HTTP communications between the Console, Satellites and the Central Monitoring Service. If encryption is turned off, remote connections (remote Consoles and Satellites) are not allowed.

The SSL/TLS connection can run on any port, and defaults to port 8080.

OpenSSL and Ciphers

SSL/TLS is implemented using the latest version of OpenSSL

This means notable exploits are quickly patched, including:

  • SWEET32
  • LogJam
  • POODLE
  • ChangeCipherSpec
  • Heartbleed

The embedded HTTPS server supports Forward Secrecy by supporting ephemeral Diffie-Hellman key exchange, depending on the encryption cipher that is negotiated between client and server.

PA Server Monitor SSL Settings

There are two SSL/TLS security settings available which can be changed in Settings > HTTP Server Settings.

Supported Protocols

Here you can control which protocols the HTTPS server will use.

SSLv2 is not allowed, and SSLv3 is disabled by default.

Cipher Strength

Various ciphers settings are available, with the "Strongest ciphers" setting being the most robust at the time the product was released.


Cipher names and information can be found at https://www.openssl.org/docs/apps/ciphers.html

For an alternate cipher override value and discussion, see http://stackoverflow.com/questions/3775836/disable-weak-ciphers-in-ssl-connection.

Self-Signed Certificate

By default, a self-signed SSL certificate is used, but you may replace that with your own certificate using the instructions at:
www.poweradmin.com/help/lateststmhelp.aspx?page=report_other_ssl_cert.aspx

The generated self-signed SSL certificates are currently 2048 bit. The default signature algorithm is sha1RSA, signature algorithm of sha1, and the public key is RSA 2048 bits.

The self-signed certificates can be easily regenerated at any time.

HTTPS Server Limits

The internal HTTPS server is very small and light. It supports a fixed number of connections, and each connection will only upload or download a fixed amount of data. These limits are registry configurable.

Fuzzing/Scanning

For many years, a number of customers regularly fuzz test and run vulnerability scanners on our software (and other software that they run on site). Any time an issue is found it is fixed within two business days. Most of the time it has involved adding an HTTP header, such as X-XSS-Protection: 1, X-Frame-Options:SAMEORIGIN, etc. It has now been a number of years since any problems have been found, and we always welcome feedback. We recently asked a white-hat tester to look at our software and nothing was found.

Service Security

The monitoring service supports security alerts for anything that might change or affect monitoring. These are available at Settings > Security Alerts.

In addition, the monitoring service can be locked such that it cannot be stopped by the Windows Service Control Manager. This setting is at the bottom of the Settings dialog. If the service is terminated, the service is configured to automatically get restarted by the Windows Service Control Manager.

User Credentials

There are a variety of different credentials that might be put into the system depending on monitoring needs:

  • Windows
  • SNMP
  • Web Proxy Server
  • ODBC Database Connection String
  • SMTP Server
  • Website
  • SSL Certificate Private Key
  • VMWare ESX

ALL of these credentials are encrypted using Microsoft's recommended method of storing credentials via the CryptProtectData function. This encrypts the credentials such that they can only be decrypted on the computer where they are stored using an encryption key that is managed by the operating system.

The encrypted credentials are stored in the registry at:

HKEY_LOCAL_MACHINE\software\PAServerMonitor\Creds

Disabling Export

There are a few places in the product where the configuration can be exported to disk, with the option to export credentials. This export option can be completely disabled by setting:

HKEY_LOCAL_MACHINE\software\PAStorageMonitor\Protected
[DWORD] DisablePasswordExport = 1

Other protected settings are discussed here: Security Protected Settings.

Monitoring Protocols

Communication with individual servers is done using standard protocols (SNMP, Windows SMB, etc).

Communications via Windows RPC is done using standard Windows APIs, which means all communication and access is governed by the Windows security model.

Individual monitors need different permissions depending on what resource is being targeted. Please see Monitoring Permissions for more details.

Database Access

By default, an embedded SQLite database is used to store data. This can be changed to store data in a MS SQL Server database. In that case, the database login needs access to create, update and delete tables and indices. It does not need access to, nor does it try to use any statements that would modify, create or delete individual databases, including the database it stores data in.

Product Logins

There are a few ways of logging in and interacting with the product:

  • Local Console Login - login to the Central Service from the Central Service computer using the local Console application. This does not require a password, but does require the user to be an administrator on the computer. This type of login can be disabled (see DisableBlankLocalLogin on ).
  • Remote Console Login - users can be added to the system, and they can login remotely using a Console on their computer. We recommend enabling 2FA (two factor authentication).
  • Web Login - users can login to view reports. This login can require a username and password (default). This login can also require 2FA.

Filter Access to Devices

All product logins tie a user to an account. Accounts can have their access filtered such that they can only access specific groups of devices, with potentially limited rights to those devices. The product uses a "never trust the client" posture, which means the backend service enforces all constraints.

I wanted to say thank you for the brilliant product, PA Server Monitor! It has given me a much greater sense of security and confidence in my network administration duties, and is an absolute must for every admins toolkit.

Joe J., TechProse , USA ionicons-v5-b