6.5.1

Table Of Contents
Additional vCenter Server TCP and UDP Ports 125
5
Securing Virtual Machines 128
Enable or Disable UEFI Secure Boot for a Virtual Machine 128
Limit Informational Messages From Virtual Machines to VMX Files 130
Prevent Virtual Disk Shrinking 130
Virtual Machine Security Best Practices 131
6
Virtual Machine Encryption 141
How vSphere Virtual Machine Encryption Protects Your Environment 142
vSphere Virtual Machine Encryption Components 144
Encryption Process Flow 145
Virtual Disk Encryption 147
Prerequisites and Required Privileges for Encryption Tasks 148
Encrypted vSphere vMotion 149
Encryption Best Practices, Caveats, and Interoperability 150
7
Use Encryption in Your vSphere Environment 156
Set up the Key Management Server Cluster 156
Create an Encryption Storage Policy 163
Enable Host Encryption Mode Explicitly 164
Disable Host Encryption Mode 165
Create an Encrypted Virtual Machine 165
Clone an Encrypted Virtual Machine 166
Encrypt an Existing Virtual Machine or Virtual Disk 167
Decrypt an Encrypted Virtual Machine or Virtual Disk 168
Change the Encryption Policy for Virtual Disks 169
Resolve Missing Key Issues 169
vSphere Virtual Machine Encryption and Core Dumps 170
8
Securing vSphere Networking 175
Introduction to vSphere Network Security 175
Securing the Network With Firewalls 177
Secure the Physical Switch 180
Securing Standard Switch Ports with Security Policies 181
Securing vSphere Standard Switches 181
Standard Switch Protection and VLANs 183
Secure vSphere Distributed Switches and Distributed Port Groups 185
Securing Virtual Machines with VLANs 186
Creating Multiple Networks Within a Single ESXi Host 189
Internet Protocol Security 191
Ensure Proper SNMP Configuration 195
vSphere Security
VMware, Inc. 4