6.7

Table Of Contents
Securing vCenter Server
Systems 4
Securing vCenter Server includes ensuring security of the host where vCenter Server is running, following
best practices for assigning privileges and roles, and verifying the integrity of the clients that connect to
vCenter Server.
This chapter includes the following topics:
n
vCenter Server Security Best Practices
n
Verify Thumbprints for Legacy ESXi Hosts
n
Verify that SSL Certificate Validation Over Network File Copy Is Enabled
n
Required Ports for vCenter Server and Platform Services Controller
n
Additional vCenter Server TCP and UDP Ports
vCenter Server Security Best Practices
Following vCenter Server security best practices helps you ensure the integrity of your vSphere
environment.
Best Practices for vCenter Server Access Control
Strictly control access to different vCenter Server components to increase security for the system.
The following guidelines help ensure security of your environment.
Use Named Accounts
n
If the local Windows administrator account currently has the Administrator role vCenter Server,
remove that role and assign the role to one or more named vCenter Server administrator accounts.
Grant the Administrator role only to those administrators who are required to have it. You can create
custom roles or use the No cryptography administrator role for administrators with more limited
privileges. Do not apply this role any group whose membership is not strictly controlled.
Note Starting with vSphere 6.0, the local administrator no longer has full administrative rights to
vCenter Server by default.
n
Install vCenter Server using a service account instead of a Windows account. The service account
must be an administrator on the local machine.
VMware, Inc.
110