更新时间:2021-08-05 17:16:40
封面
版权页
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files eBooks discount offers and more
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Chapter 1. Threat and Vulnerability Overview
Introduction
Risk overview
Hypervisor threats
Hypervisor vulnerabilities
Guest virtual machine threats
Guest virtual machine vulnerabilities
Network threats
Network vulnerabilities
Storage threats
Storage vulnerabilities
Physical threats
Physical vulnerabilities
Security concepts
Summary
Chapter 2. ESXi Host Security
Hardening the host via Console
Hardening the host via vSphere Client
Configuring host services
Configuring the host firewall
Chapter 3. Configuring Virtual Machine Security
Configuring administrative access options
Securing the guest OS
Guest virtual machine hardening
Configuring virtual machine resource isolation
Configuring the standard image templates
Managing snapshots
Chapter 4. Configuring User Management
Configuring vCenter Single Sign-On
Managing Single Sign-On users with vSphere Web Client
Configuring Active Directory integration
Managing Active Directory users and groups
Assigning permissions
Assigning administrative roles
Chapter 5. Configuring Network Security
Configuring Standard vSwitch security
Configuring the port group security
Configuring VLANs
Creating DMZ networks
Providing Distributed vSwitch security options
Configuring PVLANs
Chapter 6. Configuring Storage Security
Configuring network isolation
Configuring iSCSI security
Configuring Header and Data Digest
Chapter 7. Configuring vShield Manager
Installing vShield Manager OVA
Configuring vShield Manager settings
Adding vShield licensing to vCenter
Configuring SSL Security for Web Manager
Configuring Single Sign-On
Configuring user accounts and roles
Configuring services and service groups
Chapter 8. Configuring vShield App
Installing vShield App
Configuring vShield App using the Web Console
Configuring vShield App Flow Monitoring
Configuring vShield App Firewall
Configuring vShield App SpoofGuard
Chapter 9. Configuring vShield Edge
Installing vShield Edge
Managing appliances
Managing interfaces
Managing certificates and revocation lists
Managing firewall rules
Managing NAT rules and static routes
Managing the IPSec VPN service
Managing SSL VPN-Plus
Configuring the load-balancing service
Chapter 10. Configuring vShield Endpoint
Installing vShield Endpoint
Configuring vShield Endpoint using an antivirus
Chapter 11. Configuring vShield Data Security
Installing vShield Data Security
Configuring the vShield Data Security policies
Managing vShield Data Security reports