vSphere Security Cookbook Front Cover

vSphere Security Cookbook

  • Length: 334 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2014-11-24
  • ISBN-10: 1782170340
  • ISBN-13: 9781782170341
  • Sales Rank: #4792184 (See Top 100 Books)
Description

Over 75 practical recipes to help you successfully secure your vSphere environment

About This Book

  • Secure your vSphere environment from the ground up, with step-by-step instructions covering all major vCenter components
  • Eliminate pesky certificate errors in a conventional and secure manner
  • Get acquainted with the new features of vSphere through a practical, recipe-based approach

Who This Book Is For

This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn’t get the opportunity to learn how to secure the environment properly.

In Detail

Within the IT field, security is often a low priority when it comes to building new environments. As security compliance continues to gain prominence, proper and secure product configuration becomes even more important. Applying security to a complex virtual environment can be a daunting and time-consuming endeavor. This book provides a perfect plan for step-by-step configuration of vSphere 5.5 and its associated components.

The book starts by showing you how to configure the core vSphere components of the ESXi host before covering guest virtual machine security, user management, and network and storage security. Moving ahead, you will learn specifically about the configuration of X.509 certificates utilizing the SSL Certificate Automation Tool. The book concludes by taking you through VXLAN virtual wire configuration.

Table of Contents

Chapter 1: Threat and Vulnerability Overview
Chapter 2: ESXi Host Security
Chapter 3: Configuring Virtual Machine Security
Chapter 4: Configuring User Management
Chapter 5: Configuring Network Security
Chapter 6: Configuring Storage Security
Chapter 7: Configuring vShield Manager
Chapter 8: Configuring vShield App
Chapter 9: Configuring vShield Edge
Chapter 10: Configuring vShield Endpoint
Chapter 11: Configuring vShield Data Security
Chapter 12: Configuring vSphere Certificates
Chapter 13: Configuring vShield VXLAN Virtual Wires

To access the link, solve the captcha.