Amazon cover image
Image from Amazon.com

VMware vSphere Security Cookbook.

By: Material type: TextTextPublication details: Packt Publishing, 2014.Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1322335907
  • 9781322335902
  • 9781782170358
  • 1782170359
Subject(s): Genre/Form: Additional physical formats: Print version:: VMware vSphere security cookbook : over 75 practical recipes to help you successfully secure your vSphere environment.DDC classification:
  • 004.678
LOC classification:
  • T55.4-60.8
Online resources:
Contents:
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Threat and Vulnerability Overview; Introduction; Risk overview; Hypervisor threats; Hypervisor vulnerabilities; Guest virtual machine threats; Guest virtual machine vulnerabilities; Network threats; Network vulnerabilities; Storage threats; Storage vulnerabilities; Physical threats; Physical vulnerabilities; Security concepts; Summary; Chapter 2: ESXi Host Security; Introduction; Hardening the host via Console; Hardening the host via vSphere Client.
Configuring host servicesConfiguring the host firewall; Chapter 3: Configuring Virtual Machine Security; Introduction; Configuring administrative access options; Securing the guest OS; Guest virtual machine hardening; Configuring virtual machine resource isolation; Configuring the standard image templates; Managing snapshots; Chapter 4: Configuring User Management; Introduction; Configuring vCenter Single Sign-On; Managing Single Sign-On users with vSphere Web Client; Configuring Active Directory integration; Managing Active Directory users and groups; Assigning permissions.
Assigning administrative rolesChapter 5: Configuring Network Security; Introduction; Configuring Standard vSwitch security; Configuring the port group security; Configuring VLANs; Creating DMZ networks; Providing Distributed vSwitch security options; Configuring PVLANs; Chapter 6: Configuring Storage Security; Introduction; Configuring network isolation; Configuring iSCSI security; Configuring Header and Data Digest; Chapter 7: Configuring vShield Manager; Introduction; Installing vShield Manager OVA; Configuring vShield Manager settings; Adding vShield licensing to vCenter.
Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes.
Managing the IPSec VPN service Managing SSL VPN-Plus; Configuring the load-balancing service; Chapter 10: Configuring vShield Endpoint; Introduction; Installing vShield Endpoint; Configuring vShield Endpoint; Chapter 11: Configuring vShield Data Security; Introduction; Installing vShield Data Security; Configuring the vShield Data Security policies; Managing vShield Data Security reports; Chapter 12: Configuring vSphere Certificates; Introduction; Configuring a Windows CA template; Requesting certificates from a Windows CA; Using SSL Certificate Automation Tool 5.5.
Summary: Annotation This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Print version record.

Annotation This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly.

Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Threat and Vulnerability Overview; Introduction; Risk overview; Hypervisor threats; Hypervisor vulnerabilities; Guest virtual machine threats; Guest virtual machine vulnerabilities; Network threats; Network vulnerabilities; Storage threats; Storage vulnerabilities; Physical threats; Physical vulnerabilities; Security concepts; Summary; Chapter 2: ESXi Host Security; Introduction; Hardening the host via Console; Hardening the host via vSphere Client.

Configuring host servicesConfiguring the host firewall; Chapter 3: Configuring Virtual Machine Security; Introduction; Configuring administrative access options; Securing the guest OS; Guest virtual machine hardening; Configuring virtual machine resource isolation; Configuring the standard image templates; Managing snapshots; Chapter 4: Configuring User Management; Introduction; Configuring vCenter Single Sign-On; Managing Single Sign-On users with vSphere Web Client; Configuring Active Directory integration; Managing Active Directory users and groups; Assigning permissions.

Assigning administrative rolesChapter 5: Configuring Network Security; Introduction; Configuring Standard vSwitch security; Configuring the port group security; Configuring VLANs; Creating DMZ networks; Providing Distributed vSwitch security options; Configuring PVLANs; Chapter 6: Configuring Storage Security; Introduction; Configuring network isolation; Configuring iSCSI security; Configuring Header and Data Digest; Chapter 7: Configuring vShield Manager; Introduction; Installing vShield Manager OVA; Configuring vShield Manager settings; Adding vShield licensing to vCenter.

Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes.

Managing the IPSec VPN service Managing SSL VPN-Plus; Configuring the load-balancing service; Chapter 10: Configuring vShield Endpoint; Introduction; Installing vShield Endpoint; Configuring vShield Endpoint; Chapter 11: Configuring vShield Data Security; Introduction; Installing vShield Data Security; Configuring the vShield Data Security policies; Managing vShield Data Security reports; Chapter 12: Configuring vSphere Certificates; Introduction; Configuring a Windows CA template; Requesting certificates from a Windows CA; Using SSL Certificate Automation Tool 5.5.

English.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library