Chapter 8
Securing VMware vSphere
On a scale of 1 to 10 in importance, security always rates close to a 10 in setting up and managing a vSphere environment. Well, maybe not —but it should. Even though VMware has increased the capabilities and features that come with its products, these same products and features must fit within the security policies applied to other servers. Most of the time, ESXi and vCenter Server fit easily and nicely within those security policies, but sometimes the process is a bit of a challenge. This chapter examines the tools and techniques that will help you ensure your vSphere environment appropriately follows the security policies of your organization.
In this chapter, you will learn to
- Configure and control authentication ...
Get Mastering VMware vSphere® 5 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.