6.5.1

Table Of Contents
vSphere Networking Security Best Practices 195
9
Best Practices Involving Multiple vSphere Components 200
Synchronizing Clocks on the vSphere Network 200
Storage Security Best Practices 204
Verify That Sending Host Performance Data to Guests is Disabled 207
Setting Timeouts for the ESXi Shell and vSphere Web Client 208
10
Managing TLS Protocol Configuration with the TLS Configurator Utility 209
Ports That Support Disabling TLS Versions 209
Disabling TLS Versions in vSphere 211
Install the TLS Configuration Utility 212
Perform an Optional Manual Backup 213
Disable TLS Versions on vCenter Server Systems 215
Disable TLS Versions on ESXi Hosts 216
Disable TLS Versions on Platform Services Controller Systems 218
Revert TLS Configuration Changes 219
Disable TLS Versions on vSphere Update Manager 221
11
Defined Privileges 225
Alarms Privileges 226
Auto Deploy and Image Profile Privileges 227
Certificates Privileges 228
Content Library Privileges 229
Cryptographic Operations Privileges 230
Datacenter Privileges 232
Datastore Privileges 233
Datastore Cluster Privileges 233
Distributed Switch Privileges 234
ESX Agent Manager Privileges 235
Extension Privileges 235
Folder Privileges 235
Global Privileges 236
Host CIM Privileges 237
Host Configuration Privileges 237
Host Inventory 238
Host Local Operations Privileges 239
Host vSphere Replication Privileges 240
Host Profile Privileges 240
Network Privileges 241
Performance Privileges 241
Permissions Privileges 241
vSphere Security
VMware, Inc. 5