VMware vSphere Security

Learn the basics of vSphere security all the way to advanced features and configurations in this course. Live labs and configuration, real-world examples, and best-practice design scenarios help to reinforce the concepts learned in each module.
Course info
Rating
(35)
Level
Intermediate
Updated
Jan 14, 2014
Duration
4h 47m
Table of contents
Introduction
Security Basics
Virtual Switch Security
Virtual Machine Security
ESXi Security
vCenter Server Security
vCenter Single Sign On
Management Security and Best Practices
Log Management with VMware Log Insight
Compliance Management and vSphere Hardening with vCM
Wrap-up
Description
Course info
Rating
(35)
Level
Intermediate
Updated
Jan 14, 2014
Duration
4h 47m
Description

This course is designed to teach the basics of security in a vSphere environment as well as give hands-on experience installing and configuring the different features and settings that are introduced. By the end of this course, from a security perspective, topics such as authentication, SSL certificates, vCenter single sign-on, and component hardening will be covered. Common scenarios and component configurations will also be covered in order to teach the methods for setting up vSphere security in different situations.

About the author
About the author

Brian has been an IT professional for over 10 years in various customer-facing consultancy and technical administration roles. He specializes in VMware virtualization, networking, and storage technologies. He currently works as a vSpecialist for EMC serving as a technical advisor on virtualization and storage products.

More from the author
VMware vSphere Data Protection
Intermediate
3h 39m
May 30, 2014
Section Introduction Transcripts
Section Introduction Transcripts

Introduction
Welcome to Pluralsight. You're watching vSphere Security. This is the introduction module. So before we start out on the course, just a quick bio a little bit about myself. So my name's Brian Tobia. I've been an IT professional for about 10 years now, specifically focused on virtualization, networking, storage, and security. Some of the certifications that I hold. Held my VCAP5, DCA and DCD, my VCP4 and 5, CCNA, and most importantly for this course, the CISSP, which is an industry standard security certification that really gives a good background about a lot of domains that you want to consider when you're talking about security and implementing that, whether it's a physical or a virtual environment. I was also awarded the VMware vExpert Award in 2012 and 2013 for contributions to the community. And for a job, I currently am a vSpecialist at EMC, so I focus on everything VMware, focused on EMC products, and EMC customers, and solutions.

Security Basics
Welcome to Pluralsight. You're watching Security Basics. In this module, we'll cover PKI, or Private Key Infrastructure, and SSL certificates. We'll talk about their usage within the VMware infrastructure and also why they're important. We'll then look at SPAN Ports, or Port Mirroring. It's a capability on both physical devices and also on the VMware side through the distributed switch to mirror traffic for security purposes, or network troubleshooting, so we'll look at that, and we'll also go into lab on that. We'll also do some traffic analysis. So once we've actually duplicated that traffic, or mirrored it to another destination, we'll look at how to actually look at that traffic, do some investigation on it, and what you might do with it. And lastly, we'll look at the different authentication options that you have available within VMware. So, for different vSphere components, we'll take a look at authentication options, and why it's important to secure those. So let's get started.

Virtual Switch Security
Welcome to Pluralsight. You're watching Virtual Switch Security. In this module, we'll cover Promiscuous mode. We'll talk about what it is and how you can implement it and use it on virtual switches. We'll look at Mac address changes, and if you want to allow or deny those on virtual switches based on security policy. We'll also look at forged transmits and what those are. Then we'll take a look at standard switch verses distributive switch. The different security options you have, and different ways of securing them based on what you're using. We'll also look at port blocking on virtual switches. And finally, we'll look at Spanning Tree Protocol, or STP. So let's get started.

ESXi Security
Welcome to Pluralsight. You're watching ESXi Security. In this module, we'll cover the ESXi Firewall. We'll talk about what capabilities it has, some of the default rules, and ways to use it to help on the security side for your hosts. We'll also look at authentication options and the different user and role settings that ESXi provides for better user authentication and authorization. We'll also talk about Lockdown mode, which is a way of securing administrative access to ESXi hosts. We'll also look at host profiles and how you can use them to help ensure standardized settings across hosts, and also, get better security that way starting with that known good state, kind of like we talked about with VM Templates, but now on the host side. We'll look at SSL Certificates, specifically on the ESXi host context. And then finally, we'll talk a little bit about how you can help secure the storage layer or access to shared storage from your hypervisors or ESXi hosts. So let's get started.

vCenter Server Security
Welcome to Pluralsight. You're watching vCenter Server Security. In this module, we'll cover Roles and Permissions within vCenter Server. We'll look at the way you can map Active Directory groups, or create new roles to assign permissions to different groups or individual users. We'll also talk about the common theme of SSL certificates, how you replace them on vCenter Server, and how you can use them to help with security. Along that line, we'll talk about the vCenter Server Certificate Automation tool. In the past, it's been kind of a long and laborious proves to replace SSL certificates, and this tool aims to help with that. We'll also talk about some ways to secure the vCenter Server Windows OS. So if you have that installed on a Windows server, we'll look at that. And then we'll also talk about securing the vCenter Server Appliance. So let's get started.

vCenter Single Sign On
Welcome to Pluralsight. You're watching vCenter Single Sign On. In this module, we'll cover an overview of vCenter Single Sign On and some general considerations you want to keep in mind, look at the installation and configuration processes for vCenter Single Sign On, and then we'll also look at using identity sources and mapping to different authentication methods, and I'll show you how to configure authentication such as Active Directory within Single Sign On. So let's get started.

Management Security and Best Practices
Welcome to Pluralsight. You're watching Management Security and Best Practices. In this module, we'll cover configuring and securing the vSphere Management Assistant, or the vMA. We'll also look at securing remote access methods, specifically SSH and HTTPS for secure connections. We'll talk about the vSphere hardening guideline, what it is, and how you can use it to help ensure a hardened security profile across your entire vSphere environment. Next, we'll talk about secure logging of host files to a centralized repository, which is really important when we're talking about security and also troubleshooting use cases. Next, we'll look at securing logging in vMotion traffic and the important things to remember because those are unencrypted protocols. So we'll look at different ways that you can help secure that. We'll also talk about Auto Deploy and the security considerations around that. And finally, we'll look at NTP configuration and why it's important to have consistent time sources across all your devices. So let's get going.

Log Management with VMware Log Insight
Welcome to Pluralsight. You're watching Log Management With VMware Log Insight. In this module, we'll cover deploying Log Insight. We'll look at how you deploy the virtual appliance and get up the initial configuration for the Log Insight product. We'll also cover what Log Insight is and the different capabilities and features it offers. Next, we'll look at how you set up a log collection to actually send the logs from your ESXi host, vCenter Server, over to Log Insight. Next, we'll talk about content packs and how those provide application-specific information and reports. We'll also look at dashboards and reporting options that the tool gives you. And lastly, we'll go into log analysis. We'll show you how you can dive into the logs it's collecting and how you use the tool for both security and operational use cases. So let's get started.

Compliance Management and vSphere Hardening with vCM
Welcome to Pluralsight. You're watching Compliance Management and vSphere Hardening with the vCenter Server Configuration Manager. In this module, we'll cover deploying vCenter Configuration Manager. We'll look at how to install the different configuration methods, and how you also hook it in to your other hosts. Then we'll talk about assessing host information. So once you've connected to your host and your vCenter Server, we'll talk about how you assess the configuration values on those hosts. Next, we'll look at the out-of-the-box regulatory compliance toolkits. This is one of the big features of vCenter Configuration Manager. Is it mapping to some of the compliance suites such as HIPAA, PCI, SOX, it has a lot of that content out of the box, and we'll look at that. Then we'll talk about vCM integration, or vCenter Configuration Manager integration, with the vSphere hardening guide requirements. Now, we talked about those in a previous module, but vCM takes that to the next level by mapping those in. And then we'll look at integration with vCenter Operations Manager for performance and SLA tracking against those compliance requirements that I just talked about. So let's get started.