SlideShare a Scribd company logo
1 of 28
Download to read offline
VSPHERE 4.1 PERFORMANCE
          & SECURITY TIPS
      Mike Armstrong, VCP vSphere 4
Agenda
•   New features in vSphere 4.1
•   Security in a virtual environment
•   Secure virtual networking
•   Protecting the management environment
•   Protecting ESX/ESXi hosts
•   Protecting virtual machines
vSphere 4.1 New Features
– Network – Network I/O Control, Load Based Teaming, IPv6,
  Performance
– Storage – Storage I/O Control, vStorage APIs for Array Integration
  (VAAI), Performance Reporting, iSCSI Offload enhancements
– Memory Compression – A New Level of Hierarchy for Overcommit
– ESXi – New Deployment Methods, Tech Support Mode Enhancements
– Performance improvements in Availability and Resource Management -
  High Availability (HA), Fault Tolerance (FT), vMotion, Distributed
  Resource Scheduler (DRS), and Distributed Power Management
  Enhancements
– Management – vCenter Server & Platform Enhancements
HA and DRS Cluster Improvements
Increased cluster limitations
 • Cluster limits are now unified for HA and DRS clusters
 • Increased limits for VMs/host and VMs/cluster


 • Cluster limits for HA and DRS:
        • 32 hosts/cluster
        • 320 VMs/host (regardless of # of hosts/cluster)
        • 3000 VMs/cluster


 • Note that these limits also apply to post-failover scenarios. Please be sure
  that these limits will not be violated even after the maximum configured
  number of host failovers.
Enhanced vCenter Scalability
                        vSphere 4   vSphere 4.1   Ratio
VMs per host               320          320        1x
Hosts per cluster          32           32         1x
VMs per cluster           1280         3000        3x
Hosts per VC               300         1000        3x
Registered VMs per VC     4500         15000       3x+
Powered-On VMs per VC     3000         10000       3x
Concurrent VI Clients      30           120        4x
Hosts per DC               100          500        5x
VMs per DC                2500         5000        2x




                                                          5
New Active Directory Service
• Provides authentication for all local services
   – vSphere Client
   – Other access based on vSphere API
   – Tech Support Mode (local and remote)


• Has Active Directory groups functionality
   – Members of “ESX Admins” AD group have Administrative
     privilege
   – Administrative privilege includes:
      • Full Administrative role in vSphere Client and vSphere API clients
      • DCUI access
      • Tech Support Mode access (local and remote)
Security in a virtual environment
What makes it different from a physical environment?


– Ease and speed of server deployments
– Collapse of switches and servers into one device
– Virtual machine encapsulation into files
– Consolidation of server hardware
Security in a virtual environment
What makes it easier from a physical environment?

– Virtual switches do not learn from the network, makes them invulnerable to
  attacks like MAC spoofing, random frame, and other types of attacks.
– Virtual switches are also not vulnerable to spanning tree attacks because they
  do not need to support spanning tree protocol since they can’t be connected
  together and can’t create loops
– Virtual machines do not have direct access to hardware, not susceptible to
  buffer overflow type attacks
– Virtual machines are by design isolated from one another
– Restoring a compromised virtual machine is faster since you can quickly revert
  to a previous state of the virtual machine, use templates or restore from a full
  VM backup
– Availability of virtual security appliances
– API’s and products specifically designed to secure a virtual environment,
  vShield
Secure virtual networking
Physical network configurations
– Create separate VLANs for all management traffic, vMotion, IP Storage,
  and host management
– Limit VLAN’s allowed on the trunk ports to host servers
– Configure physical ports connected to host servers using VMware best
  practices, no STP, Auto Negotiate, PortFast enabled ,multiple ports for
  teaming and failover
Virtual network configurations
– Change virtual switch and port group default settings for MAC address
  changes and Forged Transmits to Reject
– Change the default number of ports on a virtual switch
– Implement Private VLAN’s to further isolate virtual machines, (need to
  be supported and configured on the physical switches as well)
Secure virtual networking contd.
Changing default settings for MAC address changes and Forged Transmits
Secure virtual networking contd.
Changing the default number of ports on a virtual switch
Secure virtual networking contd.
Private VLAN on Virtual Distributed Switch settings
Secure virtual networking contd.
Private VLAN configuration on Virtual Distributed Switch settings
Secure virtual networking contd.
Create Private VLAN on Virtual Distributed Switch
Secure virtual networking contd.
Create Private VLAN selection on Virtual Distributed Switch
Protecting the management
environment
User Access Controls
– Use vCenter server to centralize access rather than creating users or
  groups on individual hosts
– Add vCenter, ESX/EXSi hosts to Active Directory, create security groups for
  specific management and user purposes
– Use vCenter roles to assign granular permissions to groups, clone roles to
  create custom roles and permissions
– Apply the principle of least privilege when assigning and creating roles
– Create folders to assign roles to objects that require similar access
Gather vCenter roles and assignments using PowerCLI
– Get-vipermission –entity (get-inventory) | export-csv “c:permissions.csv”
Protecting the management
environment contd.
Install vSphere Management Assistant (vMA)
– Virtual machine that is prepackaged with vSphere cli to provide an
  authenticated platform to run commands and scripts
– vMA can be configured as a centralized logging system
Use the VMware PowerCLI for bulk administration and
reporting
– A Windows PowerShell snapin with over 300 cmdlets
Create a Dedicated Management Cluster
– Set permissions at the Cluster level for only VM Admins
Protecting the management
environment contd.
vCenter Server Hardening
– Replace self–signed SSL certificates on vCenter and ESX/ESXi hosts with a
  commercial SSL cert or local CA certificate
– Keep server properly patched, Windows Updates
– Use the Windows firewall or a 3rd party firewall
– Restrict login to the system to vSphere Admins
– Install vCenter using a service account, or remove the local Administrator
  account after installation
– Add vCenter server to a dedicated management network
– Disable vCenter Web Access
– Deploy the vSphere client using VMware ThinApp
Protecting ESXi/ESX hosts
ESXi hosts
– Enable Tech Support Mode(Local and Remote) only when necessary
– Enable lockdown mode with the DCUI service turned on
– Enable lockdown mode and turn off the DCUI service (total lockdown)
– Disable the managed object browser
– Create a separate service account for Common Information Model (CIM)
  applications
– Remove the web welcome screen, see
  http://communities.vmware.com/docs/DOC-11864
– Use host profiles to reduce misconfigurations and check compliance (also
  for ESX hosts)
ESXi Tech Support Mode




             Can enable in vCenter or DCUI
ESXi Tech Support Mode Timeout




• Timeout automatically disables Tech Support Mode (local and remote)
• Running sessions are not terminated
• All commands issued in Tech Support Mode are sent to syslog
ESXi Lockdown Mode
Forces all operations to be performed through
vCenter Server
  – Lockdown Mode (disallows all access except root on DCUI)
  – Tech Support Mode (local and remote)
  – If all configured, then no local activity is possible (except
    reinstall)
Protecting ESXi/ESX hosts contd.
ESX hosts
– Upgrade to ESXi, ESX 4.1 will be the last supported version of ESX!
– Configure firewall rules based on security needs and requirements, allow only
  default ports (902,4 43, 80, 22)
– Modify password policies on the host for history, aging and complexity. Can
  modify the pam_cracklib.so plugin to modify password policies, see KB
  1012033 for info
– Limit access to su commands to users in the wheel group, edit /etc/pam.d/su
  and remove # from line auth required /lib/security/$ISA/pam_wheel.so
  use_uid
– Restrict access to commands with SUDO utility
– Disallow root account login at the console, create a nonprivileged user then
  run cat /dev/null > /etc/securetty to modify
– Disable vSphere web access service, see KB1007617
Protecting Virtual Machines
Secure the virtual machine operating system
– Enable antivirus, antispyware, firewall and IDS appliances, consider using
  vShield for antivirus, firewall and IDS appliances
– Keep current on updates and patches, including templates and powered
  off VM’s
– Disable unused services and applications in the operating systems
– Disconnect unused devices, CD, floppy, serial and parallel ports and USB
  controller
– Use shares and reservations to ensure critical virtual machines have the
  resources they need
Protecting Virtual Machines contd.
Set additional security parameters in the virtual machine
configuration file (VMX), or in the vSphere client
Protecting Virtual Machines contd.
List of common security configuration parameters
– Prevent virtual disk shrink:
  “isolation.tools.diskWiper.disable = True”
– Prevent connection of devices:
  “isolation.deviceconnectable.disable = True” and
  “isolation.device.edit.disable = True”
– Limit the number of console connections:
  “RemoteDisplay.maxConnections = Value 1”
– Limit virtual machine log file size and number:
  “log.rotatesize = Value 1000” and “log.keepOld = Value 10”
– Limit messages from the VM to the VMX file:
  “tools.setInfo.sizeLimit = 104856”
– Disable remote operations within the guest(VIX API):
  “guest.command.enable = False”
– Disable sending host performance information to the guest:
  “tools.guestlib.enable HostInfo = False”
Resources
• vSphere 4.1 Hardening Guide
  http://www.vmware.com/files/pdf/techpaper/VMW-TWP-vSPHR-
  SECRTY-HRDNG-USLET-101-WEB-1.pdf

• VMware Manage & Design for Security Class
  http://mylearn.vmware.com/mgrreg/courses.cfm?ui=www_edu&
  a=one&id_subject=19217

• List of VMsafe third-party solutions
  http://www.vmware.com/technical-
  resources/security/vmsafe/security_technology.html

• ThinApp and security
   http://vmjunkie.wordpress.com/2009/01/05/why-thinapp-is-
   revolutionary-from-a-security-perspective/
QUESTIONS?

More Related Content

What's hot

VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentationvirtualsouthwest
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5Vepsun Technologies
 
VSAN – Architettura e Design
VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e DesignVMUG IT
 
VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017Novosco
 
Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015Duncan Epping
 
Oracle VM 3 hard partitioning
Oracle VM 3 hard partitioningOracle VM 3 hard partitioning
Oracle VM 3 hard partitioningGary Waldrom
 
VMware HA deep Dive
VMware HA deep DiveVMware HA deep Dive
VMware HA deep DiveEric Sloof
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
 
Rht v sphere-security
Rht v sphere-securityRht v sphere-security
Rht v sphere-securitymikeponderosa
 
VMworld 2014: Virtual SAN Architecture Deep Dive
VMworld 2014: Virtual SAN Architecture Deep DiveVMworld 2014: Virtual SAN Architecture Deep Dive
VMworld 2014: Virtual SAN Architecture Deep DiveVMworld
 
VMware virtual SAN 6 overview
VMware virtual SAN 6 overviewVMware virtual SAN 6 overview
VMware virtual SAN 6 overviewsolarisyougood
 
VMware Advance Troubleshooting Workshop - Day 6
VMware Advance Troubleshooting Workshop - Day 6VMware Advance Troubleshooting Workshop - Day 6
VMware Advance Troubleshooting Workshop - Day 6Vepsun Technologies
 
VMware ESXi 6.0 Installation Process
VMware ESXi 6.0 Installation ProcessVMware ESXi 6.0 Installation Process
VMware ESXi 6.0 Installation ProcessNetProtocol Xpert
 
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущееxen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущееDenis Gundarev
 
VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4Vepsun Technologies
 
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualVMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualSanjeev Kumar
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2Vepsun Technologies
 
VMware vSphere Networking deep dive
VMware vSphere Networking deep diveVMware vSphere Networking deep dive
VMware vSphere Networking deep diveSanjeev Kumar
 

What's hot (19)

VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentation
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5
 
VSAN – Architettura e Design
VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e Design
 
VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017
 
Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015
 
Oracle VM 3 hard partitioning
Oracle VM 3 hard partitioningOracle VM 3 hard partitioning
Oracle VM 3 hard partitioning
 
VMware HA deep Dive
VMware HA deep DiveVMware HA deep Dive
VMware HA deep Dive
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
Rht v sphere-security
Rht v sphere-securityRht v sphere-security
Rht v sphere-security
 
VMworld 2014: Virtual SAN Architecture Deep Dive
VMworld 2014: Virtual SAN Architecture Deep DiveVMworld 2014: Virtual SAN Architecture Deep Dive
VMworld 2014: Virtual SAN Architecture Deep Dive
 
VMware virtual SAN 6 overview
VMware virtual SAN 6 overviewVMware virtual SAN 6 overview
VMware virtual SAN 6 overview
 
VMware Advance Troubleshooting Workshop - Day 6
VMware Advance Troubleshooting Workshop - Day 6VMware Advance Troubleshooting Workshop - Day 6
VMware Advance Troubleshooting Workshop - Day 6
 
VMware ESXi 6.0 Installation Process
VMware ESXi 6.0 Installation ProcessVMware ESXi 6.0 Installation Process
VMware ESXi 6.0 Installation Process
 
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущееxen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
 
VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualVMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2
 
VMware vSphere Networking deep dive
VMware vSphere Networking deep diveVMware vSphere Networking deep dive
VMware vSphere Networking deep dive
 

Viewers also liked

Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...Banking at Ho Chi Minh city
 
Proof of concept guide for ibm tivoli storage manager version 5.3 sg246762
Proof of concept guide for ibm tivoli storage manager version 5.3 sg246762Proof of concept guide for ibm tivoli storage manager version 5.3 sg246762
Proof of concept guide for ibm tivoli storage manager version 5.3 sg246762Banking at Ho Chi Minh city
 
Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679Banking at Ho Chi Minh city
 
Visual studio 2008 overview
Visual studio 2008 overviewVisual studio 2008 overview
Visual studio 2008 overviewsagaroceanic11
 
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos:  Methodology for Managing Performance in a Shared Storage A...Avoiding Chaos:  Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...brettallison
 
Overview of v cloud case studies
Overview of v cloud case studiesOverview of v cloud case studies
Overview of v cloud case studiessolarisyougood
 
Presentation oracle on power power advantages and license optimization
Presentation   oracle on power power advantages and license optimizationPresentation   oracle on power power advantages and license optimization
Presentation oracle on power power advantages and license optimizationsolarisyougood
 
Sparc t4 systems customer presentation
Sparc t4 systems customer presentationSparc t4 systems customer presentation
Sparc t4 systems customer presentationsolarisyougood
 
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...VibrantGroup
 
2.ibm flex system manager overview
2.ibm flex system manager overview2.ibm flex system manager overview
2.ibm flex system manager overviewsolarisyougood
 
HP-UX Dynamic Root Disk vs Solaris Live Upgrade vs AIX Multibos by Dusan Balj...
HP-UX Dynamic Root Disk vs Solaris Live Upgrade vs AIX Multibos by Dusan Balj...HP-UX Dynamic Root Disk vs Solaris Live Upgrade vs AIX Multibos by Dusan Balj...
HP-UX Dynamic Root Disk vs Solaris Live Upgrade vs AIX Multibos by Dusan Balj...Circling Cycle
 
Leveraging Open Source to Manage SAN Performance
Leveraging Open Source to Manage SAN PerformanceLeveraging Open Source to Manage SAN Performance
Leveraging Open Source to Manage SAN Performancebrettallison
 
V mware v center orchestrator 5.5 knowledge transfer kit
V mware v center orchestrator 5.5 knowledge transfer kitV mware v center orchestrator 5.5 knowledge transfer kit
V mware v center orchestrator 5.5 knowledge transfer kitsolarisyougood
 
CTI Group- Blue power technology storwize technical training for customer - p...
CTI Group- Blue power technology storwize technical training for customer - p...CTI Group- Blue power technology storwize technical training for customer - p...
CTI Group- Blue power technology storwize technical training for customer - p...Tri Susilo
 
Customer overview oracle solaris cluster, enterprise edition
Customer overview oracle solaris cluster, enterprise editionCustomer overview oracle solaris cluster, enterprise edition
Customer overview oracle solaris cluster, enterprise editionsolarisyougood
 

Viewers also liked (18)

Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...Ibm tivoli storage manager   bare machine recovery for aix with sysback - red...
Ibm tivoli storage manager bare machine recovery for aix with sysback - red...
 
Proof of concept guide for ibm tivoli storage manager version 5.3 sg246762
Proof of concept guide for ibm tivoli storage manager version 5.3 sg246762Proof of concept guide for ibm tivoli storage manager version 5.3 sg246762
Proof of concept guide for ibm tivoli storage manager version 5.3 sg246762
 
Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679Ibm tivoli storage manager in a clustered environment sg246679
Ibm tivoli storage manager in a clustered environment sg246679
 
Visual studio 2008 overview
Visual studio 2008 overviewVisual studio 2008 overview
Visual studio 2008 overview
 
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos:  Methodology for Managing Performance in a Shared Storage A...Avoiding Chaos:  Methodology for Managing Performance in a Shared Storage A...
Avoiding Chaos: Methodology for Managing Performance in a Shared Storage A...
 
Overview of v cloud case studies
Overview of v cloud case studiesOverview of v cloud case studies
Overview of v cloud case studies
 
Presentation oracle on power power advantages and license optimization
Presentation   oracle on power power advantages and license optimizationPresentation   oracle on power power advantages and license optimization
Presentation oracle on power power advantages and license optimization
 
AIX 5L Differences Guide Version 5.3 Edition
AIX 5L Differences Guide Version 5.3 EditionAIX 5L Differences Guide Version 5.3 Edition
AIX 5L Differences Guide Version 5.3 Edition
 
Sparc t4 systems customer presentation
Sparc t4 systems customer presentationSparc t4 systems customer presentation
Sparc t4 systems customer presentation
 
Accelerate Return on Data
Accelerate Return on DataAccelerate Return on Data
Accelerate Return on Data
 
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
 
IBMRedbook
IBMRedbookIBMRedbook
IBMRedbook
 
2.ibm flex system manager overview
2.ibm flex system manager overview2.ibm flex system manager overview
2.ibm flex system manager overview
 
HP-UX Dynamic Root Disk vs Solaris Live Upgrade vs AIX Multibos by Dusan Balj...
HP-UX Dynamic Root Disk vs Solaris Live Upgrade vs AIX Multibos by Dusan Balj...HP-UX Dynamic Root Disk vs Solaris Live Upgrade vs AIX Multibos by Dusan Balj...
HP-UX Dynamic Root Disk vs Solaris Live Upgrade vs AIX Multibos by Dusan Balj...
 
Leveraging Open Source to Manage SAN Performance
Leveraging Open Source to Manage SAN PerformanceLeveraging Open Source to Manage SAN Performance
Leveraging Open Source to Manage SAN Performance
 
V mware v center orchestrator 5.5 knowledge transfer kit
V mware v center orchestrator 5.5 knowledge transfer kitV mware v center orchestrator 5.5 knowledge transfer kit
V mware v center orchestrator 5.5 knowledge transfer kit
 
CTI Group- Blue power technology storwize technical training for customer - p...
CTI Group- Blue power technology storwize technical training for customer - p...CTI Group- Blue power technology storwize technical training for customer - p...
CTI Group- Blue power technology storwize technical training for customer - p...
 
Customer overview oracle solaris cluster, enterprise edition
Customer overview oracle solaris cluster, enterprise editionCustomer overview oracle solaris cluster, enterprise edition
Customer overview oracle solaris cluster, enterprise edition
 

Similar to RHT Design for Security

Microsoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMicrosoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMd Yousup Faruqu
 
Server Virtualization using Hyper-V
Server Virtualization using Hyper-VServer Virtualization using Hyper-V
Server Virtualization using Hyper-VMd Yousup Faruqu
 
Partner Presentation vSphere6-VSAN-vCloud-vRealize
Partner Presentation vSphere6-VSAN-vCloud-vRealizePartner Presentation vSphere6-VSAN-vCloud-vRealize
Partner Presentation vSphere6-VSAN-vCloud-vRealizeErik Bussink
 
Pengertian Virtualisasi.pptx
Pengertian Virtualisasi.pptxPengertian Virtualisasi.pptx
Pengertian Virtualisasi.pptxfredysitorus0706
 
Presentation v mware v-cloud director technical overview
Presentation   v mware v-cloud director technical overviewPresentation   v mware v-cloud director technical overview
Presentation v mware v-cloud director technical overviewsolarisyourep
 
VMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch OverzichtVMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch OverzichtArjan Hendriks
 
V sphere 5.1 what's new presentation, customer
V sphere 5.1   what's new presentation, customerV sphere 5.1   what's new presentation, customer
V sphere 5.1 what's new presentation, customersolarisyourep
 
Presentation v mworld 2011
Presentation   v mworld 2011Presentation   v mworld 2011
Presentation v mworld 2011solarisyourep
 
Vsphere 4-partner-training180
Vsphere 4-partner-training180Vsphere 4-partner-training180
Vsphere 4-partner-training180Suresh Kumar
 
Veeam - Digital Transformation event 29 feb - EuroSys
Veeam - Digital Transformation event 29 feb - EuroSysVeeam - Digital Transformation event 29 feb - EuroSys
Veeam - Digital Transformation event 29 feb - EuroSysMarketing Team
 
Virtual Infrastructure Integrator Overview Presentation
Virtual Infrastructure Integrator Overview PresentationVirtual Infrastructure Integrator Overview Presentation
Virtual Infrastructure Integrator Overview PresentationHitachi Vantara
 
Log Analytics by VMware Log Insight
Log Analytics by VMware Log InsightLog Analytics by VMware Log Insight
Log Analytics by VMware Log InsightKiss Tibor
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentationshabi_hassan
 
Presentation v mware cloud infrastructure - success in virtualization
Presentation   v mware cloud infrastructure - success in virtualizationPresentation   v mware cloud infrastructure - success in virtualization
Presentation v mware cloud infrastructure - success in virtualizationsolarisyourep
 
Vmw edition-comparison
Vmw edition-comparisonVmw edition-comparison
Vmw edition-comparisonAirulMutaqin1
 

Similar to RHT Design for Security (20)

Microsoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMicrosoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private Cloud
 
Server Virtualization using Hyper-V
Server Virtualization using Hyper-VServer Virtualization using Hyper-V
Server Virtualization using Hyper-V
 
Partner Presentation vSphere6-VSAN-vCloud-vRealize
Partner Presentation vSphere6-VSAN-vCloud-vRealizePartner Presentation vSphere6-VSAN-vCloud-vRealize
Partner Presentation vSphere6-VSAN-vCloud-vRealize
 
Pengertian Virtualisasi.pptx
Pengertian Virtualisasi.pptxPengertian Virtualisasi.pptx
Pengertian Virtualisasi.pptx
 
Presentation v mware v-cloud director technical overview
Presentation   v mware v-cloud director technical overviewPresentation   v mware v-cloud director technical overview
Presentation v mware v-cloud director technical overview
 
vSphere
vSpherevSphere
vSphere
 
VMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch OverzichtVMware vCloud Director Technisch Overzicht
VMware vCloud Director Technisch Overzicht
 
Virtualization & tipping point
Virtualization & tipping pointVirtualization & tipping point
Virtualization & tipping point
 
V sphere 5.1 what's new presentation, customer
V sphere 5.1   what's new presentation, customerV sphere 5.1   what's new presentation, customer
V sphere 5.1 what's new presentation, customer
 
Presentation v mworld 2011
Presentation   v mworld 2011Presentation   v mworld 2011
Presentation v mworld 2011
 
Vsphere 4-partner-training180
Vsphere 4-partner-training180Vsphere 4-partner-training180
Vsphere 4-partner-training180
 
Veeam - Digital Transformation event 29 feb - EuroSys
Veeam - Digital Transformation event 29 feb - EuroSysVeeam - Digital Transformation event 29 feb - EuroSys
Veeam - Digital Transformation event 29 feb - EuroSys
 
VMware
VMwareVMware
VMware
 
Virtual Infrastructure Integrator Overview Presentation
Virtual Infrastructure Integrator Overview PresentationVirtual Infrastructure Integrator Overview Presentation
Virtual Infrastructure Integrator Overview Presentation
 
Log Analytics by VMware Log Insight
Log Analytics by VMware Log InsightLog Analytics by VMware Log Insight
Log Analytics by VMware Log Insight
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentation
 
Presentation v mware cloud infrastructure - success in virtualization
Presentation   v mware cloud infrastructure - success in virtualizationPresentation   v mware cloud infrastructure - success in virtualization
Presentation v mware cloud infrastructure - success in virtualization
 
Rht upgrade v5-v2
Rht upgrade v5-v2Rht upgrade v5-v2
Rht upgrade v5-v2
 
Vmw edition-comparison
Vmw edition-comparisonVmw edition-comparison
Vmw edition-comparison
 

Recently uploaded

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

RHT Design for Security

  • 1. VSPHERE 4.1 PERFORMANCE & SECURITY TIPS Mike Armstrong, VCP vSphere 4
  • 2. Agenda • New features in vSphere 4.1 • Security in a virtual environment • Secure virtual networking • Protecting the management environment • Protecting ESX/ESXi hosts • Protecting virtual machines
  • 3. vSphere 4.1 New Features – Network – Network I/O Control, Load Based Teaming, IPv6, Performance – Storage – Storage I/O Control, vStorage APIs for Array Integration (VAAI), Performance Reporting, iSCSI Offload enhancements – Memory Compression – A New Level of Hierarchy for Overcommit – ESXi – New Deployment Methods, Tech Support Mode Enhancements – Performance improvements in Availability and Resource Management - High Availability (HA), Fault Tolerance (FT), vMotion, Distributed Resource Scheduler (DRS), and Distributed Power Management Enhancements – Management – vCenter Server & Platform Enhancements
  • 4. HA and DRS Cluster Improvements Increased cluster limitations • Cluster limits are now unified for HA and DRS clusters • Increased limits for VMs/host and VMs/cluster • Cluster limits for HA and DRS: • 32 hosts/cluster • 320 VMs/host (regardless of # of hosts/cluster) • 3000 VMs/cluster • Note that these limits also apply to post-failover scenarios. Please be sure that these limits will not be violated even after the maximum configured number of host failovers.
  • 5. Enhanced vCenter Scalability vSphere 4 vSphere 4.1 Ratio VMs per host 320 320 1x Hosts per cluster 32 32 1x VMs per cluster 1280 3000 3x Hosts per VC 300 1000 3x Registered VMs per VC 4500 15000 3x+ Powered-On VMs per VC 3000 10000 3x Concurrent VI Clients 30 120 4x Hosts per DC 100 500 5x VMs per DC 2500 5000 2x 5
  • 6. New Active Directory Service • Provides authentication for all local services – vSphere Client – Other access based on vSphere API – Tech Support Mode (local and remote) • Has Active Directory groups functionality – Members of “ESX Admins” AD group have Administrative privilege – Administrative privilege includes: • Full Administrative role in vSphere Client and vSphere API clients • DCUI access • Tech Support Mode access (local and remote)
  • 7. Security in a virtual environment What makes it different from a physical environment? – Ease and speed of server deployments – Collapse of switches and servers into one device – Virtual machine encapsulation into files – Consolidation of server hardware
  • 8. Security in a virtual environment What makes it easier from a physical environment? – Virtual switches do not learn from the network, makes them invulnerable to attacks like MAC spoofing, random frame, and other types of attacks. – Virtual switches are also not vulnerable to spanning tree attacks because they do not need to support spanning tree protocol since they can’t be connected together and can’t create loops – Virtual machines do not have direct access to hardware, not susceptible to buffer overflow type attacks – Virtual machines are by design isolated from one another – Restoring a compromised virtual machine is faster since you can quickly revert to a previous state of the virtual machine, use templates or restore from a full VM backup – Availability of virtual security appliances – API’s and products specifically designed to secure a virtual environment, vShield
  • 9. Secure virtual networking Physical network configurations – Create separate VLANs for all management traffic, vMotion, IP Storage, and host management – Limit VLAN’s allowed on the trunk ports to host servers – Configure physical ports connected to host servers using VMware best practices, no STP, Auto Negotiate, PortFast enabled ,multiple ports for teaming and failover Virtual network configurations – Change virtual switch and port group default settings for MAC address changes and Forged Transmits to Reject – Change the default number of ports on a virtual switch – Implement Private VLAN’s to further isolate virtual machines, (need to be supported and configured on the physical switches as well)
  • 10. Secure virtual networking contd. Changing default settings for MAC address changes and Forged Transmits
  • 11. Secure virtual networking contd. Changing the default number of ports on a virtual switch
  • 12. Secure virtual networking contd. Private VLAN on Virtual Distributed Switch settings
  • 13. Secure virtual networking contd. Private VLAN configuration on Virtual Distributed Switch settings
  • 14. Secure virtual networking contd. Create Private VLAN on Virtual Distributed Switch
  • 15. Secure virtual networking contd. Create Private VLAN selection on Virtual Distributed Switch
  • 16. Protecting the management environment User Access Controls – Use vCenter server to centralize access rather than creating users or groups on individual hosts – Add vCenter, ESX/EXSi hosts to Active Directory, create security groups for specific management and user purposes – Use vCenter roles to assign granular permissions to groups, clone roles to create custom roles and permissions – Apply the principle of least privilege when assigning and creating roles – Create folders to assign roles to objects that require similar access Gather vCenter roles and assignments using PowerCLI – Get-vipermission –entity (get-inventory) | export-csv “c:permissions.csv”
  • 17. Protecting the management environment contd. Install vSphere Management Assistant (vMA) – Virtual machine that is prepackaged with vSphere cli to provide an authenticated platform to run commands and scripts – vMA can be configured as a centralized logging system Use the VMware PowerCLI for bulk administration and reporting – A Windows PowerShell snapin with over 300 cmdlets Create a Dedicated Management Cluster – Set permissions at the Cluster level for only VM Admins
  • 18. Protecting the management environment contd. vCenter Server Hardening – Replace self–signed SSL certificates on vCenter and ESX/ESXi hosts with a commercial SSL cert or local CA certificate – Keep server properly patched, Windows Updates – Use the Windows firewall or a 3rd party firewall – Restrict login to the system to vSphere Admins – Install vCenter using a service account, or remove the local Administrator account after installation – Add vCenter server to a dedicated management network – Disable vCenter Web Access – Deploy the vSphere client using VMware ThinApp
  • 19. Protecting ESXi/ESX hosts ESXi hosts – Enable Tech Support Mode(Local and Remote) only when necessary – Enable lockdown mode with the DCUI service turned on – Enable lockdown mode and turn off the DCUI service (total lockdown) – Disable the managed object browser – Create a separate service account for Common Information Model (CIM) applications – Remove the web welcome screen, see http://communities.vmware.com/docs/DOC-11864 – Use host profiles to reduce misconfigurations and check compliance (also for ESX hosts)
  • 20. ESXi Tech Support Mode Can enable in vCenter or DCUI
  • 21. ESXi Tech Support Mode Timeout • Timeout automatically disables Tech Support Mode (local and remote) • Running sessions are not terminated • All commands issued in Tech Support Mode are sent to syslog
  • 22. ESXi Lockdown Mode Forces all operations to be performed through vCenter Server – Lockdown Mode (disallows all access except root on DCUI) – Tech Support Mode (local and remote) – If all configured, then no local activity is possible (except reinstall)
  • 23. Protecting ESXi/ESX hosts contd. ESX hosts – Upgrade to ESXi, ESX 4.1 will be the last supported version of ESX! – Configure firewall rules based on security needs and requirements, allow only default ports (902,4 43, 80, 22) – Modify password policies on the host for history, aging and complexity. Can modify the pam_cracklib.so plugin to modify password policies, see KB 1012033 for info – Limit access to su commands to users in the wheel group, edit /etc/pam.d/su and remove # from line auth required /lib/security/$ISA/pam_wheel.so use_uid – Restrict access to commands with SUDO utility – Disallow root account login at the console, create a nonprivileged user then run cat /dev/null > /etc/securetty to modify – Disable vSphere web access service, see KB1007617
  • 24. Protecting Virtual Machines Secure the virtual machine operating system – Enable antivirus, antispyware, firewall and IDS appliances, consider using vShield for antivirus, firewall and IDS appliances – Keep current on updates and patches, including templates and powered off VM’s – Disable unused services and applications in the operating systems – Disconnect unused devices, CD, floppy, serial and parallel ports and USB controller – Use shares and reservations to ensure critical virtual machines have the resources they need
  • 25. Protecting Virtual Machines contd. Set additional security parameters in the virtual machine configuration file (VMX), or in the vSphere client
  • 26. Protecting Virtual Machines contd. List of common security configuration parameters – Prevent virtual disk shrink: “isolation.tools.diskWiper.disable = True” – Prevent connection of devices: “isolation.deviceconnectable.disable = True” and “isolation.device.edit.disable = True” – Limit the number of console connections: “RemoteDisplay.maxConnections = Value 1” – Limit virtual machine log file size and number: “log.rotatesize = Value 1000” and “log.keepOld = Value 10” – Limit messages from the VM to the VMX file: “tools.setInfo.sizeLimit = 104856” – Disable remote operations within the guest(VIX API): “guest.command.enable = False” – Disable sending host performance information to the guest: “tools.guestlib.enable HostInfo = False”
  • 27. Resources • vSphere 4.1 Hardening Guide http://www.vmware.com/files/pdf/techpaper/VMW-TWP-vSPHR- SECRTY-HRDNG-USLET-101-WEB-1.pdf • VMware Manage & Design for Security Class http://mylearn.vmware.com/mgrreg/courses.cfm?ui=www_edu& a=one&id_subject=19217 • List of VMsafe third-party solutions http://www.vmware.com/technical- resources/security/vmsafe/security_technology.html • ThinApp and security http://vmjunkie.wordpress.com/2009/01/05/why-thinapp-is- revolutionary-from-a-security-perspective/