Solved

vpshere compliance checker

Posted on 2012-04-12
10
440 Views
Last Modified: 2012-04-12
In your vmware expert opinions, the vpshere compliance checker seems to run about 30 checks per host. If you run the tool yourself:

a) in your opinion, are some of the issues more improtant than others? I know each company will have its own risk methodology, but as a general rule....

b) if you are willing, could you provide perhaps a top 10 list of which of the issues are higher risk, in your opinion, that would be very interesting to hear!

http://blogs.vmware.com/.a/6a00d8341c328153ef01538e505604970b-pi
http://www.wardvissers.nl/wp-upload/383d4168b518_146FE/image_3.png

It would help to group the non compliant issues into:
1) High risk - priority fixes
2) Medium risk - fix desirable - consider for future
3) Low risk - little benefit in fixing
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 5
10 Comments
 
LVL 120

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 37837307
a). we regard ALL the checks that vSphere Complaince Checker performs as the Baseline Benchmark, and ALL our important.

b) For us and our clients the following are High Risk

1. HCN02
2. HCN04
3. HCM03
4. CON01
5. VMX10
6. VMX02
7. NCN11
8. NCN10
9. HST01
10. VMX11
0
 
LVL 3

Author Comment

by:pma111
ID: 37837309
It will be also interestng to see if the ticks go against your top 10's, as theres surely a reason some will have been set whilst others not set.
0
 
LVL 120
ID: 37837324
In our opinion and our clients, those 10 are high risk, and very easy to fix.
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 
LVL 3

Author Comment

by:pma111
ID: 37837344
Thanks for this. Do you strive for a fully compliant (all greens) vsphere report against your hosts/? Or do you still get a few red crosses?
0
 
LVL 120
ID: 37837403
To be compliant, ALL green.

Occassionally, a host may fail compliance, usually because of a support issue raised with VMware, which needs Tech Support Mode enabled for remote access.

But we do hope to maintain 100% compliance if possible.
0
 
LVL 3

Author Comment

by:pma111
ID: 37837406
One issue that did confuse me with that tool, for example you quote HCN04, our reports dont show HCN04. The numbering format doesnt seem to follow, i.e. it reports on HCN02, 05 and 06. But why not HCN01, HCN03, HCN04. Its almost like its missed off some checks for whatevber reason. Does it only run some checks against some versions of ESXi or something?
0
 
LVL 120
ID: 37837416
yes, ESX and ESXi, have different checks
0
 
LVL 3

Author Comment

by:pma111
ID: 37837425
So the report will just ignore ESX checks if its checking ESXi. So say check ABC1 was geared for ESX, if the scanners sees its scanning an ESXI host, it just ignores that check and leaves it out the report?
0
 
LVL 120
ID: 37837431
correct
0
 
LVL 3

Author Comment

by:pma111
ID: 37837451
Appreciate your help as ever! Cheers
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

HOW TO: Upload an ISO image to a VMware datastore for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere Host Client, and checking its MD5 checksum signature is correct.  It's a good idea to compare checksums, because many installat…
In this article, I will show you HOW TO: Perform a Physical to Virtual (P2V) Conversion the easy way from a computer backup (image).
This Micro Tutorial steps you through the configuration steps to configure your ESXi host Management Network settings and test the management network, ensure the host is recognized by the DNS Server, configure a new password, and the troubleshooting…
This video shows you how to use a vSphere client to connect to your ESX host as the root user. Demonstrates the basic connection of bypassing certification set up. Demonstrates how to access the traditional view to begin managing your virtual mac…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question