O'Reilly logo

VMware vSphere™ PowerCLI Reference: Automating vSphere Administration by Jonathan Medd, Arnim van Lieshout, Glenn Sizemore, Alan Renouf, Luc Dekens

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12

Hardening the vSphere Environment

In this chapter, you will learn to:

  • Use the Hardening Guide
  • Work with the Guidelines
    • Virtual Machines
    • ESX(i) Hosts
    • vNetwork
    • vCenter Server
    • COS
  • Bring It All Together

Hardening a system involves closing the potential security holes. Examples of security holes include unnecessary software and user accounts, unused services, unused network ports, and the mixing of management traffic with client traffic over a port group. Hardening a system improves the security of that system by diminishing the number of potential vectors of attack. Nowadays you can’t risk running a nonsecure system, unless you run a completely isolated system or you simply don’t care if the system becomes compromised. And don’t ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required