<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Qlik Sense Enterprise on Windows: Securing and Hardening Server in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/ta-p/1712239</link>
    <description>&lt;P&gt;Security of&amp;nbsp;Qlik Sense Enterprise&amp;nbsp;on Windows can be approached in the below discrete&amp;nbsp;areas. All these&amp;nbsp;areas provide different options for increasing security in a deployment, and thereby mitigating vulnerabilities and protecting against attackers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Content:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-TOC indent="15" liststyle="none" maxheadinglevel="4"&gt;&lt;/LI-TOC&gt;&lt;/P&gt;
&lt;BLOCKQUOTE class="quote"&gt;Be aware that a high level of server hardening can lead to failure in your deployment. Be mindful of always having a backup to restore to in case your configuration leads to irreversible failure.&lt;/BLOCKQUOTE&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;1. Authentication&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows supports multiple different&amp;nbsp;&lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Deploy_QSEoW/Server-Security-Authentication-Solutions.htm" target="_blank" rel="noopener"&gt;Authentication Solutions&lt;/A&gt;;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Windows (NTLM)&lt;/LI&gt;
&lt;LI&gt;Kerberos&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Ticketing&lt;/LI&gt;
&lt;LI&gt;SAML&lt;/LI&gt;
&lt;LI&gt;JWT&lt;/LI&gt;
&lt;LI&gt;Header&lt;/LI&gt;
&lt;LI&gt;Anonymous&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Qlik can not specify which authentication method is appropriate for each deployment. It is advisable to review currently supported alternatives within your organization and/or Identity Provider (IdP) to implement the most suitable solution for your use case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;2. Authorization&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows provides two levels of native authorization in the product.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Security Rules&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Administer_QSEoW/Managing_QSEoW/design-access-control.htm" target="_blank" rel="noopener"&gt;Attribute based access control (ABAC)&lt;/A&gt;, which is configured through Qlik Sense security rules. This article will not go in&amp;nbsp;depth on how to best implement security rules for your requirements, but it is highly recommended to think of your users based on the capabilities that you intend to provide them. For example different roles and capabilities as shown in image below, allows for a&amp;nbsp;security rule framework to be designed and implemented. This can be done&amp;nbsp;either by yourself by referencing &lt;A href="https://help.qlik.com/en-US/sense-admin/May2021/Content/Sense_Helpsites/Home-deployadminister.htm" target="_blank" rel="noopener"&gt;Qlik Sense Help for Administrators&lt;/A&gt;&amp;nbsp;and available assets or by engaging with a Qlik Consultant or Qlik Partner.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Security Roles.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/56121i7B09AA03B9A137D5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Security Roles.png" alt="Security Roles.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Section Access&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Row level data reduction, which is configured through &lt;A href="https://help.qlik.com/en-US/sense/May2021/Subsystems/Hub/Content/Sense_Hub/Scripting/Security/manage-security-with-section-access.htm" target="_blank" rel="noopener"&gt;Section Access&lt;/A&gt;&amp;nbsp;at&amp;nbsp;Qlik Sense app level. This article will not go in&amp;nbsp;depth on Section Access implementation, but with this reduction a single file can be used to hold the data for a number of users or user groups. Qlik Sense&amp;nbsp;uses the information in the section access for authentication and authorization, and dynamically reduces the data, so that users only see their own data.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Section Access.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/56129i28E37B3C5594AE92/image-size/large?v=v2&amp;amp;px=999" role="button" title="Section Access.png" alt="Section Access.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;3. Operating System Hardening&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows inherits the available protocols, cipher suites, key exchanges and other security hardening which are enabled on the Windows Server operating Qlik Sense.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step 1: Disabling protocols and ciphers&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Windows Server has a&amp;nbsp;lot of protocols enabled by default;&amp;nbsp;however protocols, ciphers, hashes and key exchanges that are considered deprecated or not secure enough should be disabled. There are many ways of doing this, and the Windows administrator and&amp;nbsp;security experts&amp;nbsp;should be consulted so that local policies are accurately applied.&amp;nbsp;For&amp;nbsp;simplicity, understanding and a good overview &lt;A href="https://www.nartac.com/Products/IISCrypto" target="_blank" rel="noopener"&gt;IIS Crypto 3.0&lt;/A&gt;&amp;nbsp;can be a good tool for evaluating current Windows configuration and applying changes.&amp;nbsp;&lt;BR /&gt;Keep in mind that "Best Practice" today might not be recommended in the near future, what was considered "safe" a while ago is not necessarily considered so today. For this reason, it is also important to regularly scan servers for potential vulnerabilities and revisit configurations as required.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Windows Server needs to be restarted for these settings changes to take effect. It&amp;nbsp;is also important to ensure that all components running on the server still operate as expected after hardening is applied, for example, older non-Qlik software might not be compliant with the latest options and standards.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IIS Crypto Example.png" style="width: 985px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/173980i72981912AD782805/image-size/large?v=v2&amp;amp;px=999" role="button" title="IIS Crypto Example.png" alt="IIS Crypto Example.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step 2: Firewalls&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Firewalls typically should be closed, with required ports only opened for intended purposes.&lt;BR /&gt;See &lt;A href="https://help.qlik.com/en-US/sense-admin/May2021/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Deploy_QSEoW/Ports.htm" target="_blank" rel="noopener"&gt;Qlik Sense Enterprise on Windows ports overview&lt;/A&gt; for details on required port based on the deployed architecture.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step 3: Service Account Permission&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;For most organizations, local administrator rights allow for an easier deployment, but Qlik Sense Enterprise on&amp;nbsp;Windows does not require local administrator rights in order to function. This can be an attractive option inside some organizations. This will require additional configuration of boot strap mode as described in &lt;A href="https://help.qlik.com/en-US/sense-admin/May2021/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Deploy_QSEoW/Services.htm" target="_blank" rel="noopener"&gt;Qlik Sense Enterprise on Windows Services&lt;/A&gt;.&lt;BR /&gt;For a brief overview of the rights needed by a Qlik Sense Enterprise service account:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Full control over the share used by Qlik Sense Enterprise&lt;/LI&gt;
&lt;LI&gt;Full control over the installation directory (default: C:\Program Files\Qlik)&lt;/LI&gt;
&lt;LI&gt;Full control over %ProgramData%\Qlik&lt;/LI&gt;
&lt;LI&gt;Full control over any folders used as data connections&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Qlik Sense Enterprise for Windows does not officially support Group Managed Service Accounts (gMSA), but it can operate using one. The initial barrier is that the installer requires a service account and password to be entered during installation. A domain or local account could be substituted for the install stages only to be swapped out in the Windows Services applet (services.msc) after installation. Some functionality may require workarounds (e.g. A User Directory Connection to Active Directory).&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step 4: Anti-Virus&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows does require exceptions from anti-virus scan to avoid potential disk I/O conflicts. Refer to&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/Qlik-Sense-Folder-And-Files-To-Exclude-From-Anti-Virus-Scanning/ta-p/1715685" target="_blank" rel="noopener"&gt;Qlik Sense Folder And Files To Exclude From AntiVirus Scanning&lt;/A&gt;&amp;nbsp;for more details.&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step 5 (Optional): FIPS&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows can run with Federal Information Processing Standards (FIPS) enabled on the Windows Server. This does require a few adjustments of configuration files due to Qlik using non-FIPS compliant algorithms for minor tasks like hash checks. See&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/Running-Qlik-Sense-on-Windows-systems-with-FIPS-compliance/ta-p/1715095" target="_blank" rel="noopener"&gt;Running Qlik Sense on Windows systems with FIPS compliance enabled&lt;/A&gt;&amp;nbsp;for more details on Qlik Sense and FIPS.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;4. PostgreSQL Hardening&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows uses PostgreSQL to store meta-data relating to a Qlik Sense site. In multi-node sites or sites where PostgreSQL is isolated from Qlik Sense Enterprise for Windows additional security can be applied;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Database Traffic Encryption&lt;/LI&gt;
&lt;LI&gt;Hardening what endpoints are allowed to connect to PostgreSQL as described in&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/PostgreSQL-postgresql-conf-and-pg-hba-conf-explained/ta-p/1713744" target="_blank" rel="noopener"&gt;PostgreSQL: postgresql.conf and pg_hba.conf explained&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;5. Generalized Web Server best practices&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Qlik Sense Proxy service bundled with Qlik Sense Enterprise on&amp;nbsp;Windows is simply a web-service. This means applying general practice guidance but in the context of Qlik Sense as described below.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Apply a trusted certificate&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows acts as a Certificate Authority (CA) during initial installation and signs a certificate that is applied on all encrypted traffic between Qlik Sense services. The same Qlik Sense signed certificate is applied as default certificate also for incoming connections from&amp;nbsp;users accessing Qlik Sense Hub and QMC. This default certificate is not intended for production use, unless user access to Qlik Sense comes through a network load balancer or reverse proxy that trusts the Qlik Sense certificate. For direct user access to Qlik Sense Proxy, a&amp;nbsp;fully trusted certificate can typically&amp;nbsp;be acquired from your local IT and then &lt;A href="https://community.qlik.com/t5/Qlik-Support-Updates-Blog/Qlik-Sense-Hub-and-QMC-with-a-custom-SSL-certificate/ba-p/1608077" target="_blank" rel="noopener"&gt;applied on the Qlik Sense Proxy service&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As of July 2019, Qlik Sense Enterprise on&amp;nbsp;Windows support&amp;nbsp;SHA1 and SHA2 certificates. If SHA384 or SHA512 certificates are needed, then a network load balancer or reverse proxy can be configured in front of Qlik Sense which offloads to Qlik Sense.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Optional: Additional HTTP Response Headers&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;There are numerous HTTP response headers that can be used in attempting to secure a server. Below are a couple of the most common ones, but as always it is recommended to consult local IT and web security expert on what the recommendations are.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any additional HTTP response header values can be configured in Qlik Sense Virtual Proxy settings under Additional response headers as shown in the below image and described in&amp;nbsp;&lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Administer_QSEoW/Managing_QSEoW/edit-virtual-proxy.htm" target="_blank" rel="noopener"&gt;Qlik Sense for Administrators: Virtual Proxies&lt;/A&gt;. It is recommended to trial any header changes in a new virtual proxy, as poor configuration may accidentally lock you out from Qlik Sense access.&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;HTTP Strict Transport Security (HSTS)&lt;/STRONG&gt;&amp;nbsp;HTTP Strict Transport Security (HSTS) is an opt-in security enhancement which any web application can support through the use of a special response header. When a supported browser receives this header that browser will prevent any communication sent over HTTP in the future and will redirect all traffic over HTTPS instead. Caution is advised when implementing HSTS, as it might block HTTP access to certain pages that actually requires it or needs to be excluded from HSTS. See&amp;nbsp;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security" target="_blank" rel="noopener"&gt;MDN Web Docs: Strict-Transport-Security&lt;/A&gt;&amp;nbsp;for more details on configuration options.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Optional: X-Content-Type-Options&amp;nbsp;&lt;/STRONG&gt;X-Content-Type-Options response HTTP header is a marker used by the server to indicate that the MIME types advertised in the Content-Type headers should not be changed and be followed. This allows to opt-out of MIME type sniffing.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;X-Frame-Options&lt;/STRONG&gt; will prevent the site to be embedded in an iFrame, which can effective mitigate against&amp;nbsp;ClickJacking attacks&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Content-Security-Policy: policy &lt;/STRONG&gt;(old:&amp;nbsp;&lt;STRONG&gt;X-XSS-Protection&lt;/STRONG&gt;)&amp;nbsp;improves security against some types of XSS (cross-site scripting) attacks.
&lt;BLOCKQUOTE class="quote"&gt;&lt;EM&gt;Policy&lt;/EM&gt;&amp;nbsp;is a placeholder for your policy of choice and cannot be used as a value. See&amp;nbsp;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP#writing_a_policy" target="_blank" rel="noopener"&gt;&lt;EM&gt;Writing a Policy &lt;/EM&gt;(Mozilla)&lt;/A&gt;&amp;nbsp;for examples.&lt;/BLOCKQUOTE&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="custom headers.png" style="width: 801px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/113746iBE5367B443621B4B/image-size/large?v=v2&amp;amp;px=999" role="button" title="custom headers.png" alt="custom headers.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 Nov 2024 13:29:47 GMT</pubDate>
    <dc:creator>ToniKautto</dc:creator>
    <dc:date>2024-11-07T13:29:47Z</dc:date>
    <item>
      <title>Qlik Sense Enterprise on Windows: Securing and Hardening Server</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/ta-p/1712239</link>
      <description>&lt;P&gt;Security of&amp;nbsp;Qlik Sense Enterprise&amp;nbsp;on Windows can be approached in the below discrete&amp;nbsp;areas. All these&amp;nbsp;areas provide different options for increasing security in a deployment, and thereby mitigating vulnerabilities and protecting against attackers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Content:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-TOC indent="15" liststyle="none" maxheadinglevel="4"&gt;&lt;/LI-TOC&gt;&lt;/P&gt;
&lt;BLOCKQUOTE class="quote"&gt;Be aware that a high level of server hardening can lead to failure in your deployment. Be mindful of always having a backup to restore to in case your configuration leads to irreversible failure.&lt;/BLOCKQUOTE&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;1. Authentication&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows supports multiple different&amp;nbsp;&lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Deploy_QSEoW/Server-Security-Authentication-Solutions.htm" target="_blank" rel="noopener"&gt;Authentication Solutions&lt;/A&gt;;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Windows (NTLM)&lt;/LI&gt;
&lt;LI&gt;Kerberos&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Ticketing&lt;/LI&gt;
&lt;LI&gt;SAML&lt;/LI&gt;
&lt;LI&gt;JWT&lt;/LI&gt;
&lt;LI&gt;Header&lt;/LI&gt;
&lt;LI&gt;Anonymous&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Qlik can not specify which authentication method is appropriate for each deployment. It is advisable to review currently supported alternatives within your organization and/or Identity Provider (IdP) to implement the most suitable solution for your use case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;2. Authorization&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows provides two levels of native authorization in the product.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Security Rules&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Administer_QSEoW/Managing_QSEoW/design-access-control.htm" target="_blank" rel="noopener"&gt;Attribute based access control (ABAC)&lt;/A&gt;, which is configured through Qlik Sense security rules. This article will not go in&amp;nbsp;depth on how to best implement security rules for your requirements, but it is highly recommended to think of your users based on the capabilities that you intend to provide them. For example different roles and capabilities as shown in image below, allows for a&amp;nbsp;security rule framework to be designed and implemented. This can be done&amp;nbsp;either by yourself by referencing &lt;A href="https://help.qlik.com/en-US/sense-admin/May2021/Content/Sense_Helpsites/Home-deployadminister.htm" target="_blank" rel="noopener"&gt;Qlik Sense Help for Administrators&lt;/A&gt;&amp;nbsp;and available assets or by engaging with a Qlik Consultant or Qlik Partner.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Security Roles.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/56121i7B09AA03B9A137D5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Security Roles.png" alt="Security Roles.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Section Access&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Row level data reduction, which is configured through &lt;A href="https://help.qlik.com/en-US/sense/May2021/Subsystems/Hub/Content/Sense_Hub/Scripting/Security/manage-security-with-section-access.htm" target="_blank" rel="noopener"&gt;Section Access&lt;/A&gt;&amp;nbsp;at&amp;nbsp;Qlik Sense app level. This article will not go in&amp;nbsp;depth on Section Access implementation, but with this reduction a single file can be used to hold the data for a number of users or user groups. Qlik Sense&amp;nbsp;uses the information in the section access for authentication and authorization, and dynamically reduces the data, so that users only see their own data.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Section Access.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/56129i28E37B3C5594AE92/image-size/large?v=v2&amp;amp;px=999" role="button" title="Section Access.png" alt="Section Access.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;3. Operating System Hardening&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows inherits the available protocols, cipher suites, key exchanges and other security hardening which are enabled on the Windows Server operating Qlik Sense.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step 1: Disabling protocols and ciphers&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Windows Server has a&amp;nbsp;lot of protocols enabled by default;&amp;nbsp;however protocols, ciphers, hashes and key exchanges that are considered deprecated or not secure enough should be disabled. There are many ways of doing this, and the Windows administrator and&amp;nbsp;security experts&amp;nbsp;should be consulted so that local policies are accurately applied.&amp;nbsp;For&amp;nbsp;simplicity, understanding and a good overview &lt;A href="https://www.nartac.com/Products/IISCrypto" target="_blank" rel="noopener"&gt;IIS Crypto 3.0&lt;/A&gt;&amp;nbsp;can be a good tool for evaluating current Windows configuration and applying changes.&amp;nbsp;&lt;BR /&gt;Keep in mind that "Best Practice" today might not be recommended in the near future, what was considered "safe" a while ago is not necessarily considered so today. For this reason, it is also important to regularly scan servers for potential vulnerabilities and revisit configurations as required.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Windows Server needs to be restarted for these settings changes to take effect. It&amp;nbsp;is also important to ensure that all components running on the server still operate as expected after hardening is applied, for example, older non-Qlik software might not be compliant with the latest options and standards.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IIS Crypto Example.png" style="width: 985px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/173980i72981912AD782805/image-size/large?v=v2&amp;amp;px=999" role="button" title="IIS Crypto Example.png" alt="IIS Crypto Example.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step 2: Firewalls&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Firewalls typically should be closed, with required ports only opened for intended purposes.&lt;BR /&gt;See &lt;A href="https://help.qlik.com/en-US/sense-admin/May2021/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Deploy_QSEoW/Ports.htm" target="_blank" rel="noopener"&gt;Qlik Sense Enterprise on Windows ports overview&lt;/A&gt; for details on required port based on the deployed architecture.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step 3: Service Account Permission&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;For most organizations, local administrator rights allow for an easier deployment, but Qlik Sense Enterprise on&amp;nbsp;Windows does not require local administrator rights in order to function. This can be an attractive option inside some organizations. This will require additional configuration of boot strap mode as described in &lt;A href="https://help.qlik.com/en-US/sense-admin/May2021/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Deploy_QSEoW/Services.htm" target="_blank" rel="noopener"&gt;Qlik Sense Enterprise on Windows Services&lt;/A&gt;.&lt;BR /&gt;For a brief overview of the rights needed by a Qlik Sense Enterprise service account:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Full control over the share used by Qlik Sense Enterprise&lt;/LI&gt;
&lt;LI&gt;Full control over the installation directory (default: C:\Program Files\Qlik)&lt;/LI&gt;
&lt;LI&gt;Full control over %ProgramData%\Qlik&lt;/LI&gt;
&lt;LI&gt;Full control over any folders used as data connections&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Qlik Sense Enterprise for Windows does not officially support Group Managed Service Accounts (gMSA), but it can operate using one. The initial barrier is that the installer requires a service account and password to be entered during installation. A domain or local account could be substituted for the install stages only to be swapped out in the Windows Services applet (services.msc) after installation. Some functionality may require workarounds (e.g. A User Directory Connection to Active Directory).&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step 4: Anti-Virus&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows does require exceptions from anti-virus scan to avoid potential disk I/O conflicts. Refer to&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/Qlik-Sense-Folder-And-Files-To-Exclude-From-Anti-Virus-Scanning/ta-p/1715685" target="_blank" rel="noopener"&gt;Qlik Sense Folder And Files To Exclude From AntiVirus Scanning&lt;/A&gt;&amp;nbsp;for more details.&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step 5 (Optional): FIPS&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows can run with Federal Information Processing Standards (FIPS) enabled on the Windows Server. This does require a few adjustments of configuration files due to Qlik using non-FIPS compliant algorithms for minor tasks like hash checks. See&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/Running-Qlik-Sense-on-Windows-systems-with-FIPS-compliance/ta-p/1715095" target="_blank" rel="noopener"&gt;Running Qlik Sense on Windows systems with FIPS compliance enabled&lt;/A&gt;&amp;nbsp;for more details on Qlik Sense and FIPS.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;4. PostgreSQL Hardening&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows uses PostgreSQL to store meta-data relating to a Qlik Sense site. In multi-node sites or sites where PostgreSQL is isolated from Qlik Sense Enterprise for Windows additional security can be applied;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Database Traffic Encryption&lt;/LI&gt;
&lt;LI&gt;Hardening what endpoints are allowed to connect to PostgreSQL as described in&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/PostgreSQL-postgresql-conf-and-pg-hba-conf-explained/ta-p/1713744" target="_blank" rel="noopener"&gt;PostgreSQL: postgresql.conf and pg_hba.conf explained&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;5. Generalized Web Server best practices&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Qlik Sense Proxy service bundled with Qlik Sense Enterprise on&amp;nbsp;Windows is simply a web-service. This means applying general practice guidance but in the context of Qlik Sense as described below.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Apply a trusted certificate&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Qlik Sense Enterprise on Windows acts as a Certificate Authority (CA) during initial installation and signs a certificate that is applied on all encrypted traffic between Qlik Sense services. The same Qlik Sense signed certificate is applied as default certificate also for incoming connections from&amp;nbsp;users accessing Qlik Sense Hub and QMC. This default certificate is not intended for production use, unless user access to Qlik Sense comes through a network load balancer or reverse proxy that trusts the Qlik Sense certificate. For direct user access to Qlik Sense Proxy, a&amp;nbsp;fully trusted certificate can typically&amp;nbsp;be acquired from your local IT and then &lt;A href="https://community.qlik.com/t5/Qlik-Support-Updates-Blog/Qlik-Sense-Hub-and-QMC-with-a-custom-SSL-certificate/ba-p/1608077" target="_blank" rel="noopener"&gt;applied on the Qlik Sense Proxy service&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As of July 2019, Qlik Sense Enterprise on&amp;nbsp;Windows support&amp;nbsp;SHA1 and SHA2 certificates. If SHA384 or SHA512 certificates are needed, then a network load balancer or reverse proxy can be configured in front of Qlik Sense which offloads to Qlik Sense.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Optional: Additional HTTP Response Headers&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;There are numerous HTTP response headers that can be used in attempting to secure a server. Below are a couple of the most common ones, but as always it is recommended to consult local IT and web security expert on what the recommendations are.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any additional HTTP response header values can be configured in Qlik Sense Virtual Proxy settings under Additional response headers as shown in the below image and described in&amp;nbsp;&lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Administer_QSEoW/Managing_QSEoW/edit-virtual-proxy.htm" target="_blank" rel="noopener"&gt;Qlik Sense for Administrators: Virtual Proxies&lt;/A&gt;. It is recommended to trial any header changes in a new virtual proxy, as poor configuration may accidentally lock you out from Qlik Sense access.&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;HTTP Strict Transport Security (HSTS)&lt;/STRONG&gt;&amp;nbsp;HTTP Strict Transport Security (HSTS) is an opt-in security enhancement which any web application can support through the use of a special response header. When a supported browser receives this header that browser will prevent any communication sent over HTTP in the future and will redirect all traffic over HTTPS instead. Caution is advised when implementing HSTS, as it might block HTTP access to certain pages that actually requires it or needs to be excluded from HSTS. See&amp;nbsp;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security" target="_blank" rel="noopener"&gt;MDN Web Docs: Strict-Transport-Security&lt;/A&gt;&amp;nbsp;for more details on configuration options.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Optional: X-Content-Type-Options&amp;nbsp;&lt;/STRONG&gt;X-Content-Type-Options response HTTP header is a marker used by the server to indicate that the MIME types advertised in the Content-Type headers should not be changed and be followed. This allows to opt-out of MIME type sniffing.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;X-Frame-Options&lt;/STRONG&gt; will prevent the site to be embedded in an iFrame, which can effective mitigate against&amp;nbsp;ClickJacking attacks&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Content-Security-Policy: policy &lt;/STRONG&gt;(old:&amp;nbsp;&lt;STRONG&gt;X-XSS-Protection&lt;/STRONG&gt;)&amp;nbsp;improves security against some types of XSS (cross-site scripting) attacks.
&lt;BLOCKQUOTE class="quote"&gt;&lt;EM&gt;Policy&lt;/EM&gt;&amp;nbsp;is a placeholder for your policy of choice and cannot be used as a value. See&amp;nbsp;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP#writing_a_policy" target="_blank" rel="noopener"&gt;&lt;EM&gt;Writing a Policy &lt;/EM&gt;(Mozilla)&lt;/A&gt;&amp;nbsp;for examples.&lt;/BLOCKQUOTE&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="custom headers.png" style="width: 801px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/113746iBE5367B443621B4B/image-size/large?v=v2&amp;amp;px=999" role="button" title="custom headers.png" alt="custom headers.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 13:29:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/ta-p/1712239</guid>
      <dc:creator>ToniKautto</dc:creator>
      <dc:date>2024-11-07T13:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: Securing and Hardening Server</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/tac-p/2431253#M13521</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;As of July 2019, Qlik Sense Enterprise on Windows support SHA1 and SHA2 certificates. If SHA384 or SHA512 certificates are needed, then a network load balancer or reverse proxy can be configured in front of Qlik Sense which offloads to Qlik Sense.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Any plans to make SHA512 available as an option in the near future for any virtual proxies? And/or do you have an example of the load balancer or reverse proxy that we might use if SHA512 is a hard requirement?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 11:14:58 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/tac-p/2431253#M13521</guid>
      <dc:creator>ThijsDeBruijnEscuLine</dc:creator>
      <dc:date>2024-03-15T11:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: Securing and Hardening Server</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/tac-p/2464579#M14152</link>
      <description>&lt;P&gt;On running a security scan on the server where QlikSense is running, we get the following warning: "TLS Protocol Session Renegotiation Security Vulnerability port 443/tcp over SSL&lt;BR /&gt;QID: 38596&lt;BR /&gt;Category: General remote services&lt;BR /&gt;Associated CVEs: CVE-2009-3555&lt;BR /&gt;Vendor Reference: -&lt;BR /&gt;Bugtraq ID: 36935&lt;BR /&gt;Service Modified: 02/29/2024&lt;BR /&gt;User Modified: -&lt;BR /&gt;Edited: No&lt;BR /&gt;PCI Vuln: No"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are running QSEOW August 2023 on a Windows Server 2022 VM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We need to know if this is a real vulnerability and, if this is so, what the solution for this is. I have seen this issue mentioned a couple of times in the Qlik Community, but without there being a definitive answer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Paul&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2024 12:31:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/tac-p/2464579#M14152</guid>
      <dc:creator>paulselousyoriz</dc:creator>
      <dc:date>2024-06-21T12:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: Securing and Hardening Server</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/tac-p/2541522#M16787</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;our vulnerability scan software, found the same vulnerability "TLS Session Renegotiation Vulnerability" on the Qlik November 2024 patch 9. We found a "TLS/SSL Server Supports Weak Cipher Algorithms" also.&lt;/P&gt;&lt;P&gt;Anyone found a remediation?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2026 13:24:38 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/tac-p/2541522#M16787</guid>
      <dc:creator>Uolter</dc:creator>
      <dc:date>2026-01-26T13:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: Securing and Hardening Server</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/tac-p/2541536#M16788</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/217172"&gt;@Uolter&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're able to configure your operating system to ensure you are not using weak ciphers. This is not configured in Qlik Sense, but it depends on the operating system.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See "Chapter 3" in this article (Disabling protocols and ciphers).&lt;/P&gt;
&lt;P&gt;For more information, see &lt;A href="https://community.qlik.com/t5/Official-Support-Articles/TLS-and-SSL-Support-in-Qlik-Sense-How-to-configure-Qlik-Sense/ta-p/1713720" target="_blank" rel="noopener"&gt;TLS and SSL Support in Qlik Sense: How to configure Qlik Sense and TLS&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;As for "&lt;SPAN&gt;TLS Session Renegotiation Vulnerability": if you mean&amp;nbsp;CVE-2009-3555, then i&lt;/SPAN&gt;t was confirmed that the components as part of the (NVD - CVE-2009-3555) are not part of the Qlik Sense product, so the identified vulnerability does not directly apply to Qlik Sense.&lt;/P&gt;
&lt;P&gt;Qlik Sense utilizes NodeJS for the referred ports, and renegotiation attack is mitigated as referred by NodeJS by a limit of three times every ten minutes.&lt;/P&gt;
&lt;P&gt;For more details - &lt;A href="https://nodejs.org/api/tls.html#client-initiated-renegotiation-attack-mitigation" target="_blank"&gt;https://nodejs.org/api/tls.html#client-initiated-renegotiation-attack-mitigation&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you have further concerns and want to log a security concern with us, please see &lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Qlik-Product-Security-and-Vulnerability-Policy/ta-p/1713629" target="_blank" rel="noopener"&gt;Qlik Product Security and Vulnerability Policy&lt;/A&gt;. It includes information on how to log a ticket with us for this topic.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2026 14:01:09 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-Securing-and-Hardening-Server/tac-p/2541536#M16788</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2026-01-26T14:01:09Z</dc:date>
    </item>
  </channel>
</rss>

