6.0.3

Table Of Contents
Use High RDP Encryption Levels
On each Windows computer in the infrastructure, ensure that Remote Desktop Host Conguration seings
are set to ensure the highest level of encryption appropriate for your environment.
Verify vSphere Web Client Certificates
Instruct users of one of thevSphere Web Client or other client applications to never ignore certicate
verication warnings. Without certicate verication, the user might be subject of a MiTM aack.
Set the vCenter Server Password Policy
By default, vCenter Server changes the vpxuser password automatically every 30 days. You can change that
value from the vSphere Web Client.
Procedure
1 Select the vCenter Server in the vSphere Web Client object hierarchy.
2 Click the Manage tab and the  subtab.
3 Click Advanced  and enter VimPasswordExpirationInDays in the lter box.
4 Set VirtualCenter.VimPasswordExpirationInDays to comply with your requirements.
Protecting the vCenter Server Windows Host
Protect the Windows host where vCenter Server is running against vulnerabilities and aacks by ensuring
that the host environment is as secure as possible.
n
Maintain a supported operating system, database, and hardware for the vCenter Server system. If
vCenter Server is not running on a supported operating system, it might not run properly, making
vCenter Server vulnerable to aacks.
n
Keep the vCenter Server system properly patched. By staying up-to-date with operating system
patches, the server is less vulnerable to aack.
n
Provide operating system protection on the vCenter Server host. Protection includes antivirus and anti-
malware software.
n
On each Windows computer in the infrastructure, ensure that Remote Desktop (RDP) Host
Conguration seings are set to ensure the highest level of encryption according to industry-standard
guidelines or internal guidelines.
For operating system and database compatibility information, see the vSphere Compatibility Matrixes.
Removing Expired or Revoked Certificates and Logs from Failed Installations
Leaving expired or revoked certicates or leaving vCenter Server installation logs for failed installation on
your vCenter Server system can compromise your environment.
Removing expired or revoked certicates is required for the following reasons.
n
If expired or revoked certicates are not removed from the vCenter Server system, the environment can
be subject to a MiTM aack
n
In certain cases, a log le that contains the database password in plain text is created on the system if
vCenter Server installation fails. An aacker who breaks into the vCenter Server system, might gain
access to this password and, at the same time, access to the vCenter Server database.
Chapter 6 Securing vCenter Server Systems
VMware, Inc. 211