MicroStrategy ONE
Security Configurations in MicroStrategy
MicroStrategy's software platform ships with hardened security configurations present by default where possible. In many cases, security configurations are dependent upon the infrastructure where the system is operated. In other cases, security configurations may be dependent upon organizational requirements and unique operating environments. This section attempts to document different security configurations which are available to further harden a MicroStrategy deployment.