{"id":2961374,"date":"2026-03-25T10:35:45","date_gmt":"2026-03-25T17:35:45","guid":{"rendered":"https:\/\/www.esri.com\/arcgis-blog\/?post_type=blog&#038;p=2961374"},"modified":"2026-03-27T15:35:20","modified_gmt":"2026-03-27T22:35:20","slug":"where-to-start-when-securing-your-arcgis-enterprise","status":"publish","type":"blog","link":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise","title":{"rendered":"Where to Start When Securing Your ArcGIS Enterprise"},"author":357482,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":""},"categories":[37501],"tags":[],"industry":[],"product":[36571],"class_list":["post-2961374","blog","type-blog","status-publish","format-standard","hentry","category-administration","product-arcgis-enterprise"],"acf":{"authors":[{"ID":357482,"user_firstname":"Justin","user_lastname":"Mallinckrodt","nickname":"Justin Mallinckrodt","user_nicename":"jmallinckrodt","display_name":"Justin Mallinckrodt","user_email":"JMallinckrodt@esri.com","user_url":"","user_registered":"2024-05-21 17:02:14","user_description":"Based in Redlands, CA, Justin has a background in computer science, specializing in networking and administration. Since joining ESRI in 2016, he has been passionate about exploring the global applications of GIS technology and its role in enhancing decision-making processes. As a Product Manager for ArcGIS Enterprise, Justin is dedicated to listening to customer feedback and developing software solutions that address their unique challenges.","user_avatar":"<img data-del=\"avatar\" src='https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/g4817778-justin-mallinckrodt-3z7a3329-e1734726845355-213x200.jpg' class='avatar pp-user-avatar avatar-96 photo ' height='96' width='96'\/>"}],"short_description":"Protecting your ArcGIS Enterprise deployment has never been more critical","flexible_content":[{"acf_fc_layout":"content","content":"<p>In today\u2019s evolving cybersecurity landscape, protecting your ArcGIS Enterprise deployment has never been more critical. Attackers are becoming more sophisticated, and GIS systems often containing sensitive operational data are increasingly targeted.<\/p>\n<p>Newer releases of ArcGIS Enterprise continue to strengthen secure\u2011by\u2011default behavior, reducing the number of manual steps required to harden a deployment. Features such as restricted proxy behavior and improved logging are enabled automatically in current releases, allowing administrators to focus on validation and monitoring rather than foundational security setup.<\/p>\n<p>This guide curates the most important resources ArcGIS Enterprise administrators should use to maintain a strong security posture so you know exactly where to start, what to check, and how to stay protected.<\/p>\n"},{"acf_fc_layout":"content","content":"<h2><strong>Check If You\u2019re at Risk<\/strong><\/h2>\n"},{"acf_fc_layout":"content","content":"<h3>Start with a Security Health Check<\/h3>\n"},{"acf_fc_layout":"content","content":"<p>Before you can strengthen your system, you need to know where your vulnerabilities are. ArcGIS provides multiple security assessment tools that evaluate your deployment for potentially risky configuration settings. These tools do not detect active compromises, but they help identify gaps that could increase exposure if left unaddressed.<\/p>\n"},{"acf_fc_layout":"content","content":"<h3>Run Security Scans<\/h3>\n"},{"acf_fc_layout":"content","content":"<p>Leverage Esri\u2019s tools to audit your deployment. The <a href=\"https:\/\/trust.arcgis.com\/en\/security\/security-overview.htm#ESRI_SECTION1_4931BCA440B2490F8AF2DF817F236F6B\"><strong>ArcGIS Security Adviser <\/strong><\/a><span class=\"NormalTextRun CommentHighlightHovered SCXW127767113 BCX8\">is<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW127767113 BCX8\">\u00a0designed to\u00a0<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW127767113 BCX8\">scan your ArcGIS Enterprise configuration and flag risky settings. <\/span>The Portal for ArcGIS component of your ArcGIS Enterprise installation on includes a Python script, <a class=\"Hyperlink SCXW127767113 BCX8\" href=\"https:\/\/enterprise.arcgis.com\/en\/portal\/latest\/administer\/windows\/scan-your-portal-for-security-best-practices.htm\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW127767113 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun CommentStart CommentHighlightClicked SCXW127767113 BCX8\" data-ccp-charstyle=\"Hyperlink\">portalS<\/span><span class=\"NormalTextRun CommentHighlightClicked SCXW127767113 BCX8\" data-ccp-charstyle=\"Hyperlink\">can.py<\/span><\/span><\/a><span class=\"TextRun SCXW127767113 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun CommentHighlightClicked SCXW127767113 BCX8\">,<\/span><\/span> that checks for common security issues. ArcGIS Server also has this same python script called, <a href=\"https:\/\/enterprise.arcgis.com\/en\/server\/latest\/administer\/windows\/scan-arcgis-server-for-security-best-practices.htm\">serverScan.py<\/a>. Running these scripts generates an HTML report of critical or important weaknesses it finds \u2013 such as an unrestricted proxy, HTTP communication, or exposed services directories. Review these scan results and address any \u201cCritical\u201d or \u201cImportant\u201d issues promptly.<\/p>\n<p>If using ArcGIS Enterprise on Kubernetes, you can use the python script called <a href=\"https:\/\/enterprise-k8s.arcgis.com\/en\/latest\/administer\/scan-for-security-best-practices.htm\">kubernetesScan.py<\/a>. The script is available in the directory where you extracted the deployment package under setup\/tools\/security and provides a similar output to the portalScan.py script.<\/p>\n"},{"acf_fc_layout":"content","content":"<h3>Stay Current with Supported Versions<\/h3>\n"},{"acf_fc_layout":"content","content":"<p>It&#8217;s important to keep your ArcGIS Enterprise deployment on a <a class=\"Hyperlink SCXW8660765 BCX8\" href=\"https:\/\/support.esri.com\/en-us\/products\/arcgis-enterprise\/life-cycle\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW8660765 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun CommentStart CommentHighlightPipeHovered CommentHighlightHovered SCXW8660765 BCX8\" data-ccp-charstyle=\"Hyperlink\">supported release\u00a0<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW8660765 BCX8\" data-ccp-charstyle=\"Hyperlink\">in\u00a0<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW8660765 BCX8\" data-ccp-charstyle=\"Hyperlink\">G<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW8660765 BCX8\" data-ccp-charstyle=\"Hyperlink\">eneral\u00a0<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW8660765 BCX8\" data-ccp-charstyle=\"Hyperlink\">A<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW8660765 BCX8\" data-ccp-charstyle=\"Hyperlink\">vailability or\u00a0<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW8660765 BCX8\" data-ccp-charstyle=\"Hyperlink\">E<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW8660765 BCX8\" data-ccp-charstyle=\"Hyperlink\">xtended\u00a0<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW8660765 BCX8\" data-ccp-charstyle=\"Hyperlink\">S<\/span><span class=\"NormalTextRun CommentHighlightHovered SCXW8660765 BCX8\" data-ccp-charstyle=\"Hyperlink\">upport<\/span><\/span><\/a> and regularly apply security patches to maintain protection against vulnerabilities. Running a supported release in these phases of the product lifecycle ensures access to patches, security updates, and the latest hardening improvements. Running a retired release of ArcGIS Enterprise represents a high\u2011risk security posture. While restricting network access may reduce exposure temporarily, it does not address the underlying risk created by unpatched software. In many cases, this situation indicates that the organization may benefit from reevaluating its deployment strategy, including upgrading to a current release or considering a hosted option where security updates are managed automatically. If you\u2019re on a supported version, deploy the latest updates as they are released for the various components including Portal for ArcGIS, ArcGIS Server, ArcGIS Data Store, and ArcGIS Web Adaptor. It is important to be aware that you can subscribe to the <a href=\"https:\/\/www.esri.com\/arcgis-blog\/feed\/atom\/?post_type=blog&amp;product=trust-arcgis&amp;tag=CVE\">RSS feed<\/a>, which provides notifications regarding security patches and their associated risks.<\/p>\n"},{"acf_fc_layout":"content","content":"<h3>Keep Software Updated &amp; Configure Key Settings<\/h3>\n"},{"acf_fc_layout":"content","content":"<p>Running the latest release of ArcGIS Enterprise ensures you benefit from improved security enhancements. For instance, ArcGIS Enterprise 12.0 restricts the portal\u2019s proxy capability by default, eliminating a class of attacks that exploit an open proxy. This aligns with best practices outlined in the <a href=\"https:\/\/www.esri.com\/training\/catalog\/65afed44729953102f9cfd11\/arcgis-enterprise-hardening-guide\/\">ArcGIS Enterprise Hardening Guide<\/a>.<\/p>\n"},{"acf_fc_layout":"content","content":"<h2><strong>Detection and Response: What to Do If You Find a Risk<\/strong><\/h2>\n"},{"acf_fc_layout":"content","content":"<p>Once you identify potential risks, the next step is applying proven hardening practices.<\/p>\n"},{"acf_fc_layout":"content","content":"<h3>Harden Your Configuration<\/h3>\n"},{"acf_fc_layout":"content","content":"<p>If an assessment reveals weaknesses, such as a scan using <a href=\"https:\/\/trust.arcgis.com\/en\/security\/security-overview.htm#ESRI_SECTION1_4931BCA440B2490F8AF2DF817F236F6B\">ArcGIS Security Adviser<\/a> or the portalScan.py script, take corrective action immediately. For example, if your ArcGIS Enterprise administrative interfaces are accessible to the public, close those doors. If possible, restrict them to internal networks or VPN access, and enable multi-factor authentication for administrator logins. Implement all the fixes recommended by the Security Adviser or portalScan and serverScan results (enforce HTTPS-only, disable anonymous access, etc.). Critically ensure no unexpected add-ons or extensions are present.<\/p>\n"},{"acf_fc_layout":"sidebar","content":"<p><strong><u>Critical Fixes Checklist<\/u><\/strong><\/p>\n<p>This list highlights a few common starting points, but it is not a complete security baseline. For a prioritized and comprehensive set of controls, refer to the <a href=\"https:\/\/content.esri.com\/resources\/enterprisegis\/arcgis_enterprise_hardening_guide.pdf\">ArcGIS Enterprise Hardening Guide.<\/a><\/p>\n<ul>\n<li>Enable MFA for administrative accounts<\/li>\n<li>Disable anonymous access<\/li>\n<li>Restrict administrative interfaces to internal networks<\/li>\n<li>Remove unknown or unused API extensions, SOEs, or add\u2011ons<\/li>\n<li>Enforce HTTPS\u2011only communication<\/li>\n<\/ul>\n","image_reference":false,"layout":"standard","image_reference_figure":"","snippet":"","spotlight_name":"","section_title":"","position":"Center","spotlight_image":false},{"acf_fc_layout":"content","content":"<h3>Logging and Monitoring Require Centralized Analysis<\/h3>\n"},{"acf_fc_layout":"content","content":"<p>ArcGIS Enterprise generates logs that are essential for security monitoring, but reviewing these logs manually is not a realistic or effective way to detect suspicious activity at scale. Meaningful detection requires centralizing logs and applying automated analysis. For this reason, organizations should forward ArcGIS Enterprise logs to a Security Information and Event Management (SIEM) system, where events can be correlated, analyzed, and alerted on in real time.<\/p>\n<p>Logging capabilities have improved incrementally across ArcGIS Enterprise releases, with newer versions providing more complete audit coverage. Older releases may lack sufficient logging detail for effective detection, further reinforcing the importance of staying current. Guidance for exporting ArcGIS Enterprise logs to a SIEM is provided in the <a href=\"https:\/\/content.esri.com\/resources\/enterprisegis\/arcgis_enterprise_hardening_guide.pdf\">ArcGIS Enterprise Hardening Guide<\/a>.<\/p>\n<p>Also monitor ArcGIS Server logs for unexpected requests (for instance, odd parameters or base64-encoded payloads in REST calls). Attackers who gain administrative access to ArcGIS Enterprise have access to legitimate APIs in an unintended way, so a sudden spike in administrative actions could indicate potential trouble. Consider setting alerts for these anomalies to help keep you notified at all times.<\/p>\n"},{"acf_fc_layout":"content","content":"<h3>Enhance Network Defense<\/h3>\n"},{"acf_fc_layout":"content","content":"<p>Treat your ArcGIS Enterprise deployment as a high-value target on the network. Use a Web Application Firewall (WAF) to filter and inspect traffic to ArcGIS Enterprise endpoints. In many instances, a WAF could detect and block malicious web shell traffic. A WAF or intrusion detection system can provide an extra layer of awareness and protection for attacks that bypass normal software defenses.<\/p>\n"},{"acf_fc_layout":"content","content":"<h3>Be Ready to Respond<\/h3>\n"},{"acf_fc_layout":"content","content":"<p>If you do find evidence of a breach (for example, a malicious extension or suspicious administrator activity), have an incident response plan. This may involve coordinating with your IT security team at first but report the issue immediately through ESRI\u2019s <a href=\"https:\/\/trust.arcgis.com\/en\/security-concern\/\">Report a Security Issue page<\/a>. Early engagement ensures appropriate investigation and guidance.<\/p>\n"},{"acf_fc_layout":"content","content":"<h2><strong>Build Long\u2011Term Security Readiness<\/strong><\/h2>\n"},{"acf_fc_layout":"content","content":"<p>Security is ongoing, not a one\u2011time setup. To detect threats early, GIS administrators should actively monitor ArcGIS Enterprise logs and set up alerts for anomalies.<\/p>\n<p>Staying vigilant and proactive can greatly reduce the chance of a successful cyber-attack on your GIS infrastructure. By checking for risks and promptly hardening your ArcGIS Enterprise environment, you help ensure that your organization\u2019s spatial data and services remain secure against today\u2019s ever-increasing cyber threats.<\/p>\n<p>Additional resources:<\/p>\n<p><a href=\"https:\/\/trust.arcgis.com\/en\/\">https:\/\/trust.arcgis.com\/en\/<\/a><\/p>\n<p><a href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/2025-top-3-new-critical-security-recommendations\">https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/2025-top-3-new-critical-security-recommendations<\/a><\/p>\n<p><a href=\"https:\/\/enterprise.arcgis.com\/en\/portal\/latest\/administer\/windows\/scan-your-portal-for-security-best-practices.htm\">https:\/\/enterprise.arcgis.com\/en\/portal\/latest\/administer\/windows\/scan-your-portal-for-security-best-practices.htm<\/a><\/p>\n<p><a href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/understanding-arcgis-server-soe-compromise\">https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/understanding-arcgis-server-soe-compromise<\/a><\/p>\n"},{"acf_fc_layout":"content","content":"<h2><strong>Must\u2011Have ArcGIS Enterprise Security Resources<\/strong><\/h2>\n"},{"acf_fc_layout":"content","content":"<p>Here\u2019s a curated list of Esri resources to support your security strategy:<\/p>\n<p><strong>Scanning &amp; Assessment Tools<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/goto.arcgis.com\/security-privacy-adviser\">ArcGIS Security Advisor<\/a><\/li>\n<li><a href=\"https:\/\/enterprise.arcgis.com\/en\/portal\/latest\/administer\/windows\/scan-your-portal-for-security-best-practices.htm\">portalScan.py<\/a><\/li>\n<li><a href=\"https:\/\/enterprise.arcgis.com\/en\/server\/latest\/administer\/windows\/scan-arcgis-server-for-security-best-practices.htm\">serverScan.py<\/a><\/li>\n<li><a href=\"https:\/\/enterprise-k8s.arcgis.com\/en\/latest\/administer\/scan-for-security-best-practices.htm\">kubernetesScan.py<\/a><\/li>\n<\/ul>\n<p><strong>Hardening &amp; Best Practices<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/content.esri.com\/resources\/enterprisegis\/arcgis_enterprise_hardening_guide.pdf\">ArcGIS Enterprise Hardening Guide<\/a><\/li>\n<li><a href=\"https:\/\/trust.arcgis.com\/en\/\">Esri Trust Center (Best Practices &amp; Guidance)<\/a><\/li>\n<\/ul>\n<p><strong>Security Advisory &amp; Incident Context<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/2025-top-3-new-critical-security-recommendations\">Esri Critical Security Recommendations<\/a><\/li>\n<li><a href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/trust-arcgis\/administration\/understanding-arcgis-server-soe-compromise\">Understanding the ArcGIS Server SOE Compromise<\/a><\/li>\n<\/ul>\n<p><strong>Planning &amp; Version Support<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/support.esri.com\/en-us\/products\/arcgis-enterprise\/life-cycle\">ArcGIS Enterprise Product Lifecycle &amp; Support Phases<\/a><\/li>\n<\/ul>\n"}],"related_articles":"","show_article_image":false,"card_image":false,"wide_image":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Where to Start When Securing Your ArcGIS Enterprise<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Where to Start When Securing Your ArcGIS Enterprise\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise\" \/>\n<meta property=\"og:site_name\" content=\"ArcGIS Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/esrigis\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T22:35:20+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ESRI\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise\"},\"author\":{\"name\":\"Justin Mallinckrodt\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/5a7f0fbd764296931a3cd436fdd19c56\"},\"headline\":\"Where to Start When Securing Your ArcGIS Enterprise\",\"datePublished\":\"2026-03-25T17:35:45+00:00\",\"dateModified\":\"2026-03-27T22:35:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise\"},\"wordCount\":8,\"publisher\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\"},\"articleSection\":[\"Administration\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise\",\"name\":\"Where to Start When Securing Your ArcGIS Enterprise\",\"isPartOf\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#website\"},\"datePublished\":\"2026-03-25T17:35:45+00:00\",\"dateModified\":\"2026-03-27T22:35:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esri.com\/arcgis-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Where to Start When Securing Your ArcGIS Enterprise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#website\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/\",\"name\":\"ArcGIS Blog\",\"description\":\"Get insider info from Esri product teams\",\"publisher\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esri.com\/arcgis-blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#organization\",\"name\":\"Esri\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png\",\"contentUrl\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png\",\"width\":400,\"height\":400,\"caption\":\"Esri\"},\"image\":{\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/esrigis\/\",\"https:\/\/x.com\/ESRI\",\"https:\/\/www.linkedin.com\/company\/5311\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/5a7f0fbd764296931a3cd436fdd19c56\",\"name\":\"Justin Mallinckrodt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/g4817778-justin-mallinckrodt-3z7a3329-e1734726845355-213x200.jpg\",\"contentUrl\":\"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/g4817778-justin-mallinckrodt-3z7a3329-e1734726845355-213x200.jpg\",\"caption\":\"Justin Mallinckrodt\"},\"description\":\"Based in Redlands, CA, Justin has a background in computer science, specializing in networking and administration. Since joining ESRI in 2016, he has been passionate about exploring the global applications of GIS technology and its role in enhancing decision-making processes. As a Product Manager for ArcGIS Enterprise, Justin is dedicated to listening to customer feedback and developing software solutions that address their unique challenges.\",\"jobTitle\":\"Product Manager\",\"worksFor\":\"Esri\",\"url\":\"https:\/\/www.esri.com\/arcgis-blog\/author\/jmallinckrodt\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Where to Start When Securing Your ArcGIS Enterprise","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise","og_locale":"en_US","og_type":"article","og_title":"Where to Start When Securing Your ArcGIS Enterprise","og_url":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise","og_site_name":"ArcGIS Blog","article_publisher":"https:\/\/www.facebook.com\/esrigis\/","article_modified_time":"2026-03-27T22:35:20+00:00","twitter_card":"summary_large_image","twitter_site":"@ESRI","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise#article","isPartOf":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise"},"author":{"name":"Justin Mallinckrodt","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/5a7f0fbd764296931a3cd436fdd19c56"},"headline":"Where to Start When Securing Your ArcGIS Enterprise","datePublished":"2026-03-25T17:35:45+00:00","dateModified":"2026-03-27T22:35:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise"},"wordCount":8,"publisher":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization"},"articleSection":["Administration"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise","url":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise","name":"Where to Start When Securing Your ArcGIS Enterprise","isPartOf":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#website"},"datePublished":"2026-03-25T17:35:45+00:00","dateModified":"2026-03-27T22:35:20+00:00","breadcrumb":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esri.com\/arcgis-blog\/products\/arcgis-enterprise\/administration\/where-to-start-when-securing-your-arcgis-enterprise#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esri.com\/arcgis-blog\/"},{"@type":"ListItem","position":2,"name":"Where to Start When Securing Your ArcGIS Enterprise"}]},{"@type":"WebSite","@id":"https:\/\/www.esri.com\/arcgis-blog\/#website","url":"https:\/\/www.esri.com\/arcgis-blog\/","name":"ArcGIS Blog","description":"Get insider info from Esri product teams","publisher":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esri.com\/arcgis-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esri.com\/arcgis-blog\/#organization","name":"Esri","url":"https:\/\/www.esri.com\/arcgis-blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png","contentUrl":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2018\/04\/Esri.png","width":400,"height":400,"caption":"Esri"},"image":{"@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/esrigis\/","https:\/\/x.com\/ESRI","https:\/\/www.linkedin.com\/company\/5311\/"]},{"@type":"Person","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/5a7f0fbd764296931a3cd436fdd19c56","name":"Justin Mallinckrodt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/arcgis-blog\/#\/schema\/person\/image\/","url":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/g4817778-justin-mallinckrodt-3z7a3329-e1734726845355-213x200.jpg","contentUrl":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2024\/12\/g4817778-justin-mallinckrodt-3z7a3329-e1734726845355-213x200.jpg","caption":"Justin Mallinckrodt"},"description":"Based in Redlands, CA, Justin has a background in computer science, specializing in networking and administration. Since joining ESRI in 2016, he has been passionate about exploring the global applications of GIS technology and its role in enhancing decision-making processes. As a Product Manager for ArcGIS Enterprise, Justin is dedicated to listening to customer feedback and developing software solutions that address their unique challenges.","jobTitle":"Product Manager","worksFor":"Esri","url":"https:\/\/www.esri.com\/arcgis-blog\/author\/jmallinckrodt"}]}},"text_date":"March 25, 2026","author_name":"Justin Mallinckrodt","author_page":"https:\/\/www.esri.com\/arcgis-blog\/author\/jmallinckrodt","custom_image":"https:\/\/www.esri.com\/arcgis-blog\/app\/uploads\/2025\/08\/Newsroom-Keyart-Wide-1920-x-1080.jpg","primary_product":"ArcGIS Enterprise","tag_data":[],"category_data":[{"term_id":37501,"name":"Administration","slug":"administration","term_group":0,"term_taxonomy_id":37501,"taxonomy":"category","description":"","parent":0,"count":426,"filter":"raw"}],"product_data":[{"term_id":36571,"name":"ArcGIS Enterprise","slug":"arcgis-enterprise","term_group":0,"term_taxonomy_id":36571,"taxonomy":"product","description":"","parent":0,"count":975,"filter":"raw"}],"primary_product_link":"https:\/\/www.esri.com\/arcgis-blog\/?s=#&products=arcgis-enterprise","_links":{"self":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog\/2961374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/users\/357482"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/comments?post=2961374"}],"version-history":[{"count":0,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/blog\/2961374\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/media?parent=2961374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/categories?post=2961374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/tags?post=2961374"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/industry?post=2961374"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.esri.com\/arcgis-blog\/wp-json\/wp\/v2\/product?post=2961374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}