6.5.1

Table Of Contents
Configure ESXi Hosts with Host Profiles
Host profiles allow you to set up standard configurations for your ESXi hosts and automate compliance to
these configuration settings. Host profiles allow you to control many aspects of host configuration
including memory, storage, networking, and so on.
You can configure host profiles for a reference host from the vSphere Web Client and apply the host
profile to all hosts that share the characteristics of the reference host. You can also use host profiles to
monitor hosts for host configuration changes. See the vSphere Host Profiles documentation.
You can attach the host profile to a cluster to apply it to all hosts in the cluster.
Procedure
1 Set up the reference host to specification and create a host profile.
2 Attach the profile to a host or cluster.
3 Apply the host profile of the reference host to other hosts or clusters.
General ESXi Security Recommendations
To protect an ESXi host against unauthorized intrusion and misuse, VMware imposes constraints on
several parameters, settings, and activities. You can loosen the constraints to meet your configuration
needs. If you do, make sure that you are working in a trusted environment and take other security
measures.
Built-In Security Features
Risks to the hosts are mitigated out of the box as follows:
n
ESXi Shell and SSH are disabled by default.
n
Only a limited number of firewall ports are open by default. You can explicitly open additional firewall
ports that are associated with specific services.
n
ESXi runs only services that are essential to managing its functions. The distribution is limited to the
features required to run ESXi.
n
By default, all ports that are not required for management access to the host are closed. Open ports if
you need additional services.
n
By default, weak ciphers are disabled and communications from clients are secured by SSL. The
exact algorithms used for securing the channel depend on the SSL handshake. Default certificates
created on ESXi use PKCS#1 SHA-256 with RSA encryption as the signature algorithm.
n
A Tomcat Web service is used internally by ESXi to support access by Web clients. The service has
been modified to run only functions that a Web client requires for administration and monitoring. As a
result, ESXi is not vulnerable to the Tomcat security issues reported in broader use.
n
VMware monitors all security alerts that can affect ESXi security and issues a security patch if
needed.
vSphere Security
VMware, Inc. 42