6.6

Table Of Contents
Secure Configuration of
vRealize Operations Manager 3
As a security best practice, you must secure the vRealize Operations Manager console and manage Secure
Shell (SSH), administrative accounts, and console access. Ensure that your system is deployed with secure
transmission channels.
You must also follow certain security best practices for running End Point Operations Management agents.
This chapter includes the following topics:
n
“Secure the vRealize Operations Manager Console,” on page 12
n
“Change the Root Password,” on page 12
n
“Managing Secure Shell, Administrative Accounts, and Console Access,” on page 13
n
“Set Boot Loader Authentication,” on page 17
n
“Single-User or Maintenance Mode Authentication,” on page 18
n
“Monitor Minimal Necessary User Accounts,” on page 18
n
“Monitor Minimal Necessary Groups,” on page 18
n
“Reseing the vRealize Operations Manager Administrator Password (Linux),” on page 19
n
“Congure NTP on VMware Appliances,” on page 20
n
“Disable the TCP Timestamp Response on Linux,” on page 20
n
“Enable FIPS 140-2 Mode,” on page 20
n
“TLS for Data in Transit,” on page 21
n
“Enabling TLS on Localhost Connections,” on page 24
n
Application Resources That Must be Protected,” on page 25
n
“Congure PostgreSQL Client Authentication,” on page 26
n
Apache Conguration,” on page 27
n
“Disable Conguration Modes,” on page 28
n
“Managing Nonessential Software Components,” on page 28
n
“End Point Operations Management Agent,” on page 31
n
Additional Secure Conguration Activities,” on page 37
VMware, Inc.
11