Data Originating From A Managed Machine Is No More Trustworthy Than The Machine; Server Zone Machine Dedicated To Vcm - VMware VCM 5.3 - CONFIGURATION MANAGER SECURITY ENVIRONMENT REQUIREMENTS Configuration

Vcenter configuration manager security environment requirements
Table of Contents

Advertisement

Run operating systems that meet the CAPP
l
Be patched to the latest security level
l
Run anti-virus software
l
4.3 Data originating from a managed machine is no more trustworthy than the
machine
Managed machines have no prerequisite security requirements. Instead, the security of each machine determines the
degree to which data originating from that machine can be trusted. VCM users must be aware that data collected from
an unsecured machine connected to the Internet is less reliable than data collected from an infrastructure host walled
off in a corporate VPN.

4.4 Server zone machine dedicated to VCM

VCM relies on the server operating system to protect the confidentiality, integrity, and availability of server zone data
from other services or users running on the VCM server hosts. When server zone machines are used for purposes
other than VCM, then you risk granting unintended access to VCM data if those services (or users) have machine
administrator rights.
vCenter Configuration Manager Security Environment Requirements
TECHNICAL WHITE PAPER / 12

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vcm 5.3

Table of Contents