Network Infrastructure Hosts Are At Least As Secure As Vcm - VMware VCM 5.3 - CONFIGURATION MANAGER SECURITY ENVIRONMENT REQUIREMENTS Configuration

Vcenter configuration manager security environment requirements
Table of Contents

Advertisement

A certificate in a 'trusted' store is in fact trusted
l
Certificate authorities issuing certificates in a trusted store are trusted
l
Certificate services managing certificates in a trusted certificate store and the associated renewals and cer-
l
tificate revocation lists are trusted
In particular, certificates that exist in the trusted store that were not issued in conjunction with VCM are still trusted by
VCM.
To view the contents of the trusted certificate stored on Microsoft platforms
(Certmgr.exe) or the Microsoft Management Console (MMC) Certificates snap-in.

3.5 Network infrastructure hosts are at least as secure as VCM

Since VCM relies on infrastructure services, machines on which these services are hosted must be at least as secure
as VCM. These machines should be protected by firewalls, anti-virus software, current security updates, and access
controls. Access to these machines should also be restricted to trusted personnel.
vCenter Configuration Manager Security Environment Requirements
1
, use the Certificate Manager Tool
TECHNICAL WHITE PAPER / 10

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the VCM 5.3 - CONFIGURATION MANAGER SECURITY ENVIRONMENT REQUIREMENTS and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Vcm 5.3

Table of Contents