6.6

Table Of Contents
Contents
Secure Conguration 5
1
vRealize Operations Manager Security Posture 7
2
Secure Deployment of vRealize Operations Manager 9
Verify the Integrity of Installation Media 9
Hardening the Deployed Software Infrastructure 9
Reviewing Installed and Unsupported Software 10
VMware Security Advisories and Patches 10
3
Secure Conguration of vRealize Operations Manager 11
Secure the vRealize Operations Manager Console 12
Change the Root Password 12
Managing Secure Shell, Administrative Accounts, and Console Access 13
Set Boot Loader Authentication 17
Single-User or Maintenance Mode Authentication 18
Monitor Minimal Necessary User Accounts 18
Monitor Minimal Necessary Groups 18
Reseing the vRealize Operations Manager Administrator Password (Linux) 19
Congure NTP on VMware Appliances 20
Disable the TCP Timestamp Response on Linux 20
Enable FIPS 140-2 Mode 20
TLS for Data in Transit 21
Enabling TLS on Localhost Connections 24
Application Resources That Must be Protected 25
Congure PostgreSQL Client Authentication 26
Apache Conguration 27
Disable Conguration Modes 28
Managing Nonessential Software Components 28
End Point Operations Management Agent 31
Additional Secure Conguration Activities 37
4
Network Security and Secure Communication 39
Conguring Network Seings for Virtual Application Installation 39
Conguring Ports and Protocols 47
5
Auditing and Logging on your vRealize Operations Manager System 49
Securing the Remote Logging Server 49
Use an Authorized NTP Server 49
Client Browser Considerations 49
VMware, Inc.
3