Chapter 12

Hardening the vSphere Environment

In this chapter, you will learn to:

  • Use the Hardening Guide
  • Work with the Guidelines
    • Virtual Machines
    • ESX(i) Hosts
    • vNetwork
    • vCenter Server
    • COS
  • Bring It All Together

Hardening a system involves closing the potential security holes. Examples of security holes include unnecessary software and user accounts, unused services, unused network ports, and the mixing of management traffic with client traffic over a port group. Hardening a system improves the security of that system by diminishing the number of potential vectors of attack. Nowadays you can’t risk running a nonsecure system, unless you run a completely isolated system or you simply don’t care if the system becomes compromised. And don’t ...

Get VMware vSphere™ PowerCLI Reference: Automating vSphere Administration now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.