Chapter 13 Hardening the vSphere Environment
In this chapter, you will learn to:
- Use the Hardening Guides
- Work with the Guidelines
- ESXi Hosts
- Virtual Machines
- vNetwork
- vCenter Server
- Bring It All Together
Hardening a system involves closing the potential security holes. Examples of security holes include unnecessary software and user accounts, unused services, and unused network ports. Hardening a system improves the security of that system by decreasing the number of potential attack vectors. Don’t risk running an insecure system, unless you run a completely isolated system or you simply do not care if the system becomes compromised. And, don’t forget that there are many legal requirements that oblige you to secure your systems.
Get VMware vSphere PowerCLI Reference now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.