6.1
Table Of Contents
- Site Recovery Manager Security
- Contents
- About VMware Site Recovery Manager Security
- Updated Information
- Site Recovery Manager Security Reference
- Site Recovery Manager Services
- Site Recovery Manager Network Ports
- Site Recovery Manager Configuration Files
- Site Recovery Manager Certificates and Keys
- Site Recovery Manager License and EULA Files
- Site Recovery Manager Log Files
- Site Recovery Manager Accounts
- Site Recovery Manager Security Updates and Patches
- Best Practices For Securing Site Recovery Manager Server
- Index
Site Recovery Manager creates an additional solution user on each remote site during the pairing process
of sites that do not use Enhanced Linked Mode. Site Recovery Manager uses the solution user to perform
necessary operations on the remote site.
NOTE You must not delete and modify the roles and privileges associated with the solution user accounts.
For more information about the solution users and authentication between the local and remote site, see
the Site Recovery Manager Authentication topic in the Site Recovery Manager Installation and Configuration
documentation.
Site Recovery Manager Security Updates and Patches
You can apply Site Recovery Manager security updates and patches as they are made available by VMware.
You can apply security updates and patches of the host operating system as they are made available by the
vendors of the host operating system.
Site Recovery Manager Host Operating System Versions
For information about the supported host operating systems for Site Recovery Manager Server, see the
Compatibility Matrixes for Site Recovery Manager 6.1 at https://www.vmware.com/support/srm/srm-compat-
matrix-6-1.html.
Applying Site Recovery Manager Patches and Security Updates
You apply Site Recovery Manager security patches and updates by performing an in-place upgrade of your
existing Site Recovery Manager installation. For information about upgrading Site Recovery Manager, see
In-Place Upgrade of Site Recovery Manager Server in Site Recovery Manager Installation and Configuration.
Best Practices For Securing Site Recovery Manager Server
Best practices for securing Site Recovery Manager Server can protect your environment from possible
security problems.
The secure operation of Site Recovery Manager depends on the proper configuration and maintenance of
the Site Recovery Manager Server operating system.
n
Run Site Recovery Manager only on a supported host operating system, database, and hardware. If
Site Recovery Manager is not running on a supported host operating system, Site Recovery Manager
might not run properly.
n
Apply the latest operating system updates and patches to protect the host operating system from
malicious attacks. Apply the latest Site Recovery Manager updates and patches to address any known
issues with Site Recovery Manager.
n
Ensure the integrity of your Site Recovery Manager deployment when you run Site Recovery Manager
as a VM. See the Virtual Machine Security Best Practices topic in the vSphere Security documentation.
n
Limit installation of software and disable services that Site Recovery Manager does not use, to free
resources and to decrease the possibilities for server attacks. Unneeded software and services consume
CPU, storage, memory, and bandwidth resources and increase the chance of server attacks.
n
Allow only administrators to access the server. To limit the number of accounts that an attacker can use,
limit the number of accounts that can access the server.
n
Check the network ports that Site Recovery Manager uses and configure a firewall to protect your
server.
n
Separate the Site Recovery Manager management network traffic from workload traffic to protect
management servers from attacks.
Site Recovery Manager Security
14 VMware, Inc.