Solved

Security Considerations for VM server

Posted on 2014-11-26
9
105 Views
Last Modified: 2016-02-05
How can we keep vm server secure from hacking
0
Comment
Question by:techgyan
  • 3
  • 2
9 Comments
 
LVL 118

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE) earned 250 total points
ID: 40466610
Enable a Firewall, reduce the number of Administrator Accounts, Use complex passwords.

The same Security applies to virtual machines as physical machines.
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 250 total points
ID: 40467565
Do the following checkup:

Patches and Updates
Accounts
Auditing and Logging
Server Configuration
Backup and Restore
Firewall Protection
Default Password Policy
Disabling Unnecessary Service

Make sure only one primary function per server should be implemented to prevent functions that require different security level from co-existing on the same server. (For example: web servers, database servers, and Exchange should be implemented on separate servers.), i.e. If virtualized technologies are used; only one primary function should be implemented per virtual machine component or device.

Logging should be enabled to log all activities and logs should be monitored regularly.
0
 

Author Comment

by:techgyan
ID: 40977933
I've requested that this question be deleted for the following reason:

i got solution.thanks
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 
LVL 118
ID: 40977934
Yes, supplied by Experts. Please Award points, rather than just deleting the question.
0
 

Author Comment

by:techgyan
ID: 41424868
I've requested that this question be deleted for the following reason:

issue resloved
0
 
LVL 118
ID: 41424869
Yes, it will be if you select a solution!
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Last article we focus in how to VMware: How to create and use VMs TAGs – Part 1 so before follow this article and perform the next tasks, you should read the first article how to create the TAG before using them in Veeam Backup Jobs.
In this step by step tutorial with screenshots, we will show you HOW TO: Enable SSH Remote Access on a VMware vSphere Hypervisor 6.5 (ESXi 6.5). This is important if you need to enable SSH remote access for additional troubleshooting of the ESXi hos…
Teach the user how to configure vSphere clusters to support the VMware FT feature Open vSphere Web Client: Verify vSphere HA is enabled: Verify netowrking for vMotion and FT Logging is in place or create it: Turn On FT for a virtual machine: Verify …
This video shows you how easy it is to boot from ISO images for virtual machines with the ISO images stored on a local datastore on the ESXi host.

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now