6.0

View Security Reference 1
When you are configuring a secure View environment, you can change settings and make adjustments in
several areas to protect your systems.
n
View Accounts on page 8
You must set up system and database accounts to administer View components.
n
View Security Settings on page 8
View includes several settings that you can use to adjust the security of the configuration. You can
access the settings by using View Administrator, by editing group profiles, or by using the ADSI Edit
utility, as appropriate.
n
View Resources on page 16
View includes several configuration files and similar resources that must be protected.
n
View Log Files on page 17
View creates log files that record the installation and operation of its components.
n
View TCP and UDP Ports on page 17
View uses TCP and UDP ports for network access between its components.
n
Services on a View Connection Server Host on page 20
The operation of View depends on several services that run on a View Connection Server host.
n
Services on a Security Server on page 21
The operation of View depends on several services that run on a security server.
n
Configuring Security Protocols and Cipher Suites on a View Connection Server Instance or on a
Security Server on page 21
You can configure the security protocols and cipher suites that are accepted by View Connection
Server instances. You can define a global acceptance policy that applies to all View Connection Server
instances in a replicated group, or you can define an acceptance policy for individual View Connection
Server instances and security servers
VMware, Inc.
7