O'Reilly logo

VMware vSphere PowerCLI Reference by Matt Boren, Andrew Sullivan, Brian Graf, Glenn Sizemore, Jonathan Medd, Luc Dekens

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13 Hardening the vSphere Environment

In this chapter, you will learn to:

  • Use the Hardening Guides
  • Work with the Guidelines
  • ESXi Hosts
  • Virtual Machines
  • vNetwork
  • vCenter Server
  • Bring It All Together

Hardening a system involves closing the potential security holes. Examples of security holes include unnecessary software and user accounts, unused services, and unused network ports. Hardening a system improves the security of that system by decreasing the number of potential attack vectors. Don’t risk running an insecure system, unless you run a completely isolated system or you simply do not care if the system becomes compromised. And, don’t forget that there are many legal requirements that oblige you to secure your systems.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required