Solved

vpshere compliance checker

Posted on 2012-04-12
10
444 Views
Last Modified: 2012-04-12
In your vmware expert opinions, the vpshere compliance checker seems to run about 30 checks per host. If you run the tool yourself:

a) in your opinion, are some of the issues more improtant than others? I know each company will have its own risk methodology, but as a general rule....

b) if you are willing, could you provide perhaps a top 10 list of which of the issues are higher risk, in your opinion, that would be very interesting to hear!

http://blogs.vmware.com/.a/6a00d8341c328153ef01538e505604970b-pi
http://www.wardvissers.nl/wp-upload/383d4168b518_146FE/image_3.png

It would help to group the non compliant issues into:
1) High risk - priority fixes
2) Medium risk - fix desirable - consider for future
3) Low risk - little benefit in fixing
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 5
10 Comments
 
LVL 121

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 37837307
a). we regard ALL the checks that vSphere Complaince Checker performs as the Baseline Benchmark, and ALL our important.

b) For us and our clients the following are High Risk

1. HCN02
2. HCN04
3. HCM03
4. CON01
5. VMX10
6. VMX02
7. NCN11
8. NCN10
9. HST01
10. VMX11
0
 
LVL 3

Author Comment

by:pma111
ID: 37837309
It will be also interestng to see if the ticks go against your top 10's, as theres surely a reason some will have been set whilst others not set.
0
 
LVL 121
ID: 37837324
In our opinion and our clients, those 10 are high risk, and very easy to fix.
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 3

Author Comment

by:pma111
ID: 37837344
Thanks for this. Do you strive for a fully compliant (all greens) vsphere report against your hosts/? Or do you still get a few red crosses?
0
 
LVL 121
ID: 37837403
To be compliant, ALL green.

Occassionally, a host may fail compliance, usually because of a support issue raised with VMware, which needs Tech Support Mode enabled for remote access.

But we do hope to maintain 100% compliance if possible.
0
 
LVL 3

Author Comment

by:pma111
ID: 37837406
One issue that did confuse me with that tool, for example you quote HCN04, our reports dont show HCN04. The numbering format doesnt seem to follow, i.e. it reports on HCN02, 05 and 06. But why not HCN01, HCN03, HCN04. Its almost like its missed off some checks for whatevber reason. Does it only run some checks against some versions of ESXi or something?
0
 
LVL 121
ID: 37837416
yes, ESX and ESXi, have different checks
0
 
LVL 3

Author Comment

by:pma111
ID: 37837425
So the report will just ignore ESX checks if its checking ESXi. So say check ABC1 was geared for ESX, if the scanners sees its scanning an ESXI host, it just ignores that check and leaves it out the report?
0
 
LVL 121
ID: 37837431
correct
0
 
LVL 3

Author Comment

by:pma111
ID: 37837451
Appreciate your help as ever! Cheers
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this step by step tutorial with screenshots, we will show you HOW TO: Enable SSH Remote Access on a VMware vSphere Hypervisor 6.5 (ESXi 6.5). This is important if you need to enable SSH remote access for additional troubleshooting of the ESXi hos…
In this article, I will show you HOW TO: Perform a Physical to Virtual (P2V) Conversion the easy way from a computer backup (image).
Teach the user how to convert virtaul disk file formats and how to rename virtual machine files on datastores. Open vSphere Web Client: Review VM disk settings: Migrate VM to new datastore with a thick provisioned (lazy zeroed) disk format: Rename a…
Teach the user how to configure vSphere clusters to support the VMware FT feature Open vSphere Web Client: Verify vSphere HA is enabled: Verify netowrking for vMotion and FT Logging is in place or create it: Turn On FT for a virtual machine: Verify …

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question