6.7

Table Of Contents
Securing ESXi Hosts 3
The ESXi hypervisor architecture has many built-in security features such as CPU isolation, memory
isolation, and device isolation. You can configure additional features such as lockdown mode, certificate
replacement, and smart card authentication for enhanced security.
An ESXi host is also protected with a firewall. You can open ports for incoming and outgoing traffic as
needed, but should restrict access to services and ports. Using the ESXi lockdown mode and limiting
access to the ESXi Shell can further contribute to a more secure environment. Starting with vSphere 6.0,
ESXi hosts participate in the certificate infrastructure. Hosts are provisioned with certificates that are
signed by the VMware Certificate Authority (VMCA) by default.
See the VMware white paper Security of the VMware vSphere Hypervisor for additional information on
ESXi security.
This chapter includes the following topics:
n
General ESXi Security Recommendations
n
Certificate Management for ESXi Hosts
n
Customizing Hosts with the Security Profile
n
Assigning Privileges for ESXi Hosts
n
Using Active Directory to Manage ESXi Users
n
Using vSphere Authentication Proxy
n
Configuring Smart Card Authentication for ESXi
n
Using the ESXi Shell
n
UEFI Secure Boot for ESXi Hosts
n
Securing ESXi Hosts with Trusted Platform Module
n
ESXi Log Files
General ESXi Security Recommendations
To protect an ESXi host against unauthorized intrusion and misuse, VMware imposes constraints on
several parameters, settings, and activities. You can loosen the constraints to meet your configuration
needs. If you do, make sure that you are working in a trusted environment and take other security
measures.
VMware, Inc.
39