Information Technology Reference
In-Depth Information
Figure 8.13
vCenter Server's
logs are visible from
within the Log
Browser section of
the vSphere Web
Client.
Securing Virtual Machines
As with vCenter Server, any discussion of how to secure a VM is really a discussion of how to
secure the guest OS within that VM. Entire topics have been and are being written about how
to secure Windows, Linux, Solaris, and the other guest OSes vSphere supports, so we won't
attempt to cover that sort of material here. We will provide two recommendations around secur-
ing VMs. One of these is specii c to the vSphere virtualized environment, whereas the other is
broader and more general.
First, we want to call your attention to the vSphere network security policies.
Confi guring Network Security Policies
vSphere provides some outstanding virtual networking functionality, particularly with the
addition of the vSphere Distributed Switch and third-party distributed virtual switches. These
virtual switches provide several different security-related policies you can set to help ensure
that the security of your VMs is maintained. We discussed all these settings in Chapter 5,
“Creating and Coni guring Virtual Networks.”
 
Search WWH ::




Custom Search