6.7

Table Of Contents
Check Privileges After vCenter Server Restart
Check for privilege reassignment when you restart vCenter Server. If the user or group that has the
Administrator role on the root folder cannot be validated during a restart, the role is removed from that
user or group. In its place, vCenter Server grants the Administrator role to the vCenter Single Sign-On
administrator, administrator@vsphere.local by default. This account can then act as the vCenter Server
administrator.
Reestablish a named administrator account and assign the Administrator role to that account to avoid
using the anonymous vCenter Single Sign-On administrator account (administrator@vsphere.local by
default).
Use High RDP Encryption Levels
On each Windows computer in the infrastructure, ensure that Remote Desktop Host Configuration
settings are set to ensure the highest level of encryption appropriate for your environment.
Verify vSphere Web Client Certificates
Instruct users of one of the vSphere Web Client or other client applications to never ignore certificate
verification warnings. Without certificate verification, the user might be subject of a MiTM attack.
Set the vCenter Server Password Policy
By default, vCenter Server changes the vpxuser password automatically every 30 days. You can change
that value from the vSphere Web Client.
Procedure
1 Log in to a vCenter Server system using the vSphere Web Client.
2 Select the vCenter Server system in the object hierarchy.
3 Click Configure.
4 Click Advanced Settings and enter VimPasswordExpirationInDays in the filter box.
5 Set VirtualCenter.VimPasswordExpirationInDays to comply with your requirements.
Removing Expired or Revoked Certificates and Logs from Failed Installations
Leaving expired or revoked certificates or leaving vCenter Server installation logs for failed installation on
your vCenter Server system can compromise your environment.
Removing expired or revoked certificates is required for the following reasons.
n
If expired or revoked certificates are not removed from the vCenter Server system, the environment
can be subject to a MiTM attack
n
In certain cases, a log file that contains the database password in plain text is created on the system
if vCenter Server installation fails. An attacker who breaks into the vCenter Server system, might gain
access to this password and, at the same time, access to the vCenter Server database.
vSphere Security
VMware, Inc. 112