O'Reilly logo

VMware vSphere Security Cookbook by Mike Greer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Guest virtual machine hardening

As a part of the defense-in-depth strategy, the ability to isolate the virtual machine from network threats requires augmentation in the ability to isolate the virtual machine from the possible admin insider threat. vSphere administrators have what equates to physical access to the operating system and the data contained therein.

Getting ready

Each VM communicates with the hypervisor to monitor guests, devices, storage, and tools. This section details several options to verify and set a strong security posture for the virtualization environment and the guest virtual machines in particular. Each of the settings in this section are verified or set under an account included in the administrator account role.

How to do ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required