Chapter 12

Hardening the vSphere Environment

In this chapter, you will learn to:

  • Use the Hardening Guide
  • Work with the Guidelines
    • Virtual Machines
    • ESX(i) Hosts
    • vNetwork
    • vCenter Server
    • COS
  • Bring It All Together

Hardening a system involves closing the potential security holes. Examples of security holes include unnecessary software and user accounts, unused services, unused network ports, and the mixing of management traffic with client traffic over a port group. Hardening a system improves the security of that system by diminishing the number of potential vectors of attack. Nowadays you can’t risk running a nonsecure system, unless you run a completely isolated system or you simply don’t care if the system becomes compromised. And don’t ...

Get VMware vSphere™ PowerCLI Reference: Automating vSphere Administration now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.