6.0.3

Table Of Contents
Required Privileges for Common Tasks 150
5
Securing ESXi Hosts 153
Use Scripts to Manage Host Conguration Seings 154
Congure ESXi Hosts with Host Proles 155
General ESXi Security Recommendations 156
Certicate Management for ESXi Hosts 160
Customizing Hosts with the Security Prole 173
Assigning Permissions for ESXi 187
Using Active Directory to Manage ESXi Users 189
Using vSphere Authentication Proxy 192
Conguring Smart Card Authentication for ESXi 196
ESXi SSH Keys 199
Using the ESXi Shell 201
Modifying ESXi Web Proxy Seings 205
vSphere Auto Deploy Security Considerations 206
Managing ESXi Log Files 206
6
Securing vCenter Server Systems 209
vCenter Server Security Best Practices 209
Verify Thumbprints for Legacy ESXi Hosts 213
Verify that SSL Certicate Validation Over Network File Copy Is Enabled 214
vCenter Server TCP and UDP Ports 215
Control CIM-Based Hardware Monitoring Tool Access 216
7
Securing Virtual Machines 217
Limit Informational Messages from Virtual Machines to VMX Files 217
Prevent Virtual Disk Shrinking 218
Virtual Machine Security Best Practices 218
8
Securing vSphere Networking 227
Introduction to vSphere Network Security 227
Securing the Network with Firewalls 228
Secure the Physical Switch 231
Securing Standard Switch Ports With Security Policies 232
Securing vSphere Standard Switches 232
Secure vSphere Distributed Switches and Distributed Port Groups 234
Securing Virtual Machines with VLANs 234
Creating a Network DMZ on a Single ESXi Host 236
Creating Multiple Networks Within a Single ESXi Host 237
Internet Protocol Security 239
Ensure Proper SNMP Conguration 242
Use Virtual Switches with the vSphere Network Appliance API Only If Required 243
vSphere Networking Security Best Practices 243
9
Best Practices Involving Multiple vSphere Components 247
Synchronizing Clocks on the vSphere Network 247
Storage Security Best Practices 250
vSphere Security
4 VMware, Inc.