VMware VCM 5.3 - CONFIGURATION MANAGER SECURITY ENVIRONMENT REQUIREMENTS Manuale Utente Pagina 16

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 32
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 15
vCenter Configuration Manager Security Environment Requirements
TECHNICAL WHITE PAPER / 16
6.3 SQL Server best practices are followed
Direct login to the VCM SQL Server database bypasses the UI and its administrative controls. VMware recommends
using a host or network firewall to prevent direct SQL Server login. In addition, customers should follow the SQL
Server Security Best Practices when configuring the database instance that will store VCM data. These are available
in the SQL Server 2005 SP3 Security Features and Best Practices.
6
6.4 Only trusted software should be installed in the server zone
Even if server zone hosts are dedicated to running VCM, extra software packages beyond those provided by VMware
or Microsoft are likely to be needed. Only trusted software should be installed, preferably software accompanied and
verified by a software publisher certificate. It is unsafe to use software of unaccountable origin on machines in the
VCM server and UI zones.
6.5 Perform routine backups, patches, and virus scanning
Routine host maintenance functions like backups, patches, and virus scanning should be performed on VCM hosts.
Since UI and server zone hosts can also be managed machines, VCM itself provides the means for performing these
functions.
Vedere la pagina 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 31 32

Commenti su questo manuale

Nessun commento