Security Considerations for VM server

Posted on 2014-11-26
Medium Priority
Last Modified: 2016-02-05
How can we keep vm server secure from hacking
Question by:techgyan
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 123

Accepted Solution

Andrew Hancock (VMware vExpert / EE MVE^2) earned 1000 total points
ID: 40466610
Enable a Firewall, reduce the number of Administrator Accounts, Use complex passwords.

The same Security applies to virtual machines as physical machines.
LVL 25

Assisted Solution

madunix earned 1000 total points
ID: 40467565
Do the following checkup:

Patches and Updates
Auditing and Logging
Server Configuration
Backup and Restore
Firewall Protection
Default Password Policy
Disabling Unnecessary Service

Make sure only one primary function per server should be implemented to prevent functions that require different security level from co-existing on the same server. (For example: web servers, database servers, and Exchange should be implemented on separate servers.), i.e. If virtualized technologies are used; only one primary function should be implemented per virtual machine component or device.

Logging should be enabled to log all activities and logs should be monitored regularly.

Author Comment

ID: 40977933
I've requested that this question be deleted for the following reason:

i got solution.thanks
10 Questions to Ask when Buying Backup Software

Choosing the right backup solution for your organization can be a daunting task. To make the selection process easier, ask solution providers these 10 key questions.

LVL 123
ID: 40977934
Yes, supplied by Experts. Please Award points, rather than just deleting the question.

Author Comment

ID: 41424868
I've requested that this question be deleted for the following reason:

issue resloved
LVL 123
ID: 41424869
Yes, it will be if you select a solution!

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If we need to check who deleted a Virtual Machine from our vCenter. Looking this task in logs can be painful and spend lot of time, so the best way to check this is in the vCenter DB. Just connect to vCenter DB(default DB should be VCDB and using…
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Teach the user how to configure vSphere Replication and how to protect and recover VMs Open vSphere Web Client: Verify vsphere Replication is enabled: Enable vSphere Replication for a virtual machine: Verify replicated VM is created: Recover replica…
This Micro Tutorial walks you through using a remote console to access a server and install ESXi 5.1. This example is showing remote access and installation using a Dell server. The hypervisor is the very first component of your virtual infrastructu…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question