6.5

Table Of Contents
Disable Configuration Modes
As a best practice, when you install, congure, or maintain vRealize Operations Manager, you can modify
the conguration or seings to enable troubleshooting and debugging of your installation.
Catalog and audit each of the changes you make to ensure that they are properly secured. Do not put the
changes into production if you are not sure that your conguration changes are correctly secured.
Verifying the Host Server's Secure Configuration
For the secure operation of vRealize Operations Manager, you must secure and verify the hardening
activities.
For more information, see the Red Hat Enterprise Linux 6 hardening guidance in accordance with your
organization's security policies.
Endpoint Operations Management Agent
The Endpoint Operations Management agent adds agent-based discovery and monitoring capabilities to
vRealize Operations Manager.
The Endpoint Operations Management agent is installed on the hosts directly and might or might not be at
the same level of trust as the Endpoint Operations Management server. Therefore, you must verify that the
agents are securely installed.
Security Best Practices for Running Endpoint Operations Management Agents
You must follow certain security best practices while using user accounts.
n
For a silent installation, remove any credentials and server certicate thumbprints that were stored in
the AGENT_HOME/conf/agent.properties le.
n
Use a vRealize Operations Manager user account reserved specically for
Endpoint Operations Management agent registration. For more information, see the topic called "Roles
and Privileges" in vRealize Operations Manager in the vRealize Operations Manager Help.
n
Disable the vRealize Operations Manager user account that you use for agent registration after the
installation is over. You must enable the users access for agent administration activities. For more
information, see the topic called Conguring Users and Groups in vRealize Operations Manager in the
vRealize Operations Manager Help.
n
If a system that runs an agent is compromised, you can revoke the agent certicate using the
vRealize Operations Manager user interface by removing the agent resource. See the section called
Revoking an Agent for more detail.
Minimum Required Permissions for Agent Functionality
You require permissions to install and modify a service. If you want to discover a running process, the user
account you use to run the agent must also have privileges to access the processes and programs. For
Windows operating system installations, you require permissions to install and modify a service. For Linux
installations, you require permission to install the agent as a service, if you install the agent using a RPM
installer.
The minimum credentials that are required for the agent to register with the vRealize Operations Manager
server are those for a user granted the Agent Manager role, without any assignment to objects within the
system.
Secure Configuration
34 VMware, Inc.