6.4

Table Of Contents
Contents
Secure Conguration 5
1
vRealize Operations Manager Security Posture 7
2
Secure Deployment of vRealize Operations Manager 9
Verify the Integrity of Installation Media 9
Hardening the Deployed Software Infrastructure 9
Reviewing Installed and Unsupported Software 10
VMware Security Advisories and Patches 11
3
Secure Conguration of vRealize Operations Manager 13
Secure the vRealize Operations Manager Console 14
Change the Root Password 14
Managing Secure Shell, Administrative Accounts, and Console Access 15
Set Boot Loader Authentication 19
Single-User or Maintenance Mode Authentication 20
Monitor Minimal Necessary User Accounts 20
Monitor Minimal Necessary Groups 20
Reseing the vRealize Operations Manager Administrator Password (Linux) 21
Congure NTP on VMware Appliances 22
Disable the TCP Timestamp Response on Linux 22
Enable FIPS 140-2 Mode 22
TLS for Data in Transit 23
Application Resources That Must be Protected 26
Congure PostgreSQL Client Authentication 27
Apache Conguration 28
Disable Conguration Modes 29
Managing Nonessential Software Components 29
Windows Installed Deployment 32
Linux Installed Deployment 34
Endpoint Operations Management Agent 36
Additional Secure Conguration Activities 41
4
Network Security and Secure Communication 43
Conguring Network Seings for Virtual Application Installation 43
Conguring Ports and Protocols 51
5
Auditing and Logging on your vRealize Operations Manager System 53
Securing the Remote Logging Server 53
Use an Authorized NTP Server 53
Client Browser Considerations 53
VMware, Inc.
3