You are using an outdated browser. Please upgrade your browser to improve your experience.
expand-card-line calendar-line -->If you follow best practices, your ESXi and vCenter Server can be as secure as or even more secure than an environment that does not include virtualization.
This manual includes best practices for the different components of your vSphere infrastructure.
vSphere component | Resource |
---|---|
ESXi host | Securing ESXi Hosts |
vCenter Server system | vCenter Server Security Best Practices |
Virtual machine | Virtual Machine Security Best Practices |
vSphere Networking | vSphere Networking Security Best Practices |
This manual is only one of the sources you must use to ensure a secure environment.
VMware security resources, including security alerts and downloads, are available on the Web.
Topic | Resource |
---|---|
Information on ESXi and vCenter Server security and operations, including secure configuration and hypervisor security. | https://core.vmware.com/security |
VMware security policy, up-to-date security alerts, security downloads, and focus discussions of security topics. | http://www.vmware.com/go/security |
Corporate security response policy | http://www.vmware.com/support/policies/security_response.html |
VMware is committed to helping you maintain a secure environment. Security issues are corrected in a timely manner. The VMware Security Response Policy states our commitment to resolve possible vulnerabilities in our products.
VMware supports a variety of storage systems, software agents such as backup agents, system management agents, and so forth. You can find lists of agents, tools, and other software that supports ESXi by searching http://www.vmware.com/vmtn/resources/ for ESXi compatibility guides.
The industry offers more products and configurations than VMware can test. If VMware does not list a product or configuration in a compatibility guide, Technical Support attempts to help you with any problems, but cannot guarantee that the product or configuration can be used. Always evaluate security risks for unsupported products or configurations carefully.