Cargando…

VMware vSphere Security Cookbook : Over 75 practical recipes to help you successfully secure your vSphere environment /

This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Greer, Mike (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2014.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Threat and Vulnerability Overview; Introduction; Risk overview; Hypervisor threats; Hypervisor vulnerabilities; Guest virtual machine threats; Guest virtual machine vulnerabilities; Network threats; Network vulnerabilities; Storage threats; Storage vulnerabilities; Physical threats; Physical vulnerabilities; Security concepts; Summary; Chapter 2: ESXi Host Security; Introduction; Hardening the host via Console; Hardening the host via vSphere Client
  • Configuring host servicesConfiguring the host firewall; Chapter 3: Configuring Virtual Machine Security; Introduction; Configuring administrative access options; Securing the guest OS; Guest virtual machine hardening; Configuring virtual machine resource isolation; Configuring the standard image templates; Managing snapshots; Chapter 4: Configuring User Management; Introduction; Configuring vCenter Single Sign-On; Managing Single Sign-On users with vSphere Web Client; Configuring Active Directory integration; Managing Active Directory users and groups; Assigning permissions
  • Assigning administrative rolesChapter 5: Configuring Network Security; Introduction; Configuring Standard vSwitch security; Configuring the port group security; Configuring VLANs; Creating DMZ networks; Providing Distributed vSwitch security options; Configuring PVLANs; Chapter 6: Configuring Storage Security; Introduction; Configuring network isolation; Configuring iSCSI security; Configuring Header and Data Digest; Chapter 7: Configuring vShield Manager; Introduction; Installing vShield Manager OVA; Configuring vShield Manager settings; Adding vShield licensing to vCenter
  • Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes
  • Managing the IPSec VPN service Managing SSL VPN-Plus; Configuring the load-balancing service; Chapter 10: Configuring vShield Endpoint; Introduction; Installing vShield Endpoint; Configuring vShield Endpoint; Chapter 11: Configuring vShield Data Security; Introduction; Installing vShield Data Security; Configuring the vShield Data Security policies; Managing vShield Data Security reports; Chapter 12: Configuring vSphere Certificates; Introduction; Configuring a Windows CA template; Requesting certificates from a Windows CA; Using SSL Certificate Automation Tool 5.5