VMware VCENTER CONFIGURATION MANAGER 5.3 - SOFTWARE CONTENT REPOSITORY TOOL GUIDE Manual do Utilizador Página 20

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 35
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 19
vCenter Configuration Manager Security Environment Requirements
TECHNICAL WHITE PAPER / 20
9.0 SQL Server Preparation
9.1 Follow Microsoft SQL Server configuration best practices
Microsoft provides both guidelines and an auditing tool that ensure the secure installation and operation of SQL Server.
These are available for SQL Server 2000
11
, 2005
12
, and 2008
13
.
Also, a secure installation of VCM pays particular attention to the Security Best Practices
14
items regarding patching,
physical security, service packs, and firewalls.
9.2 Protect SQL Server from connections originating outside the server zone
Connections to VCM's SQL Server database from outside the server zone must be prevented. Even authorized VCM
users should not connect directly to the database from remote locations. A firewall is one means of accomplishing
this.10 The general technique is to block TCP port 1433 and UDP port 1434.
9.3 Forbid direct SQL Server login by VCM users
Even from within the server zone, regular VCM users must not directly connect to the VCM database using tools like
the Query Analyzer. Such connections bypass the administrative safeguards afforded by the VCM UI.
Vista de página 19
1 2 ... 15 16 17 18 19 20 21 22 23 24 25 ... 34 35

Comentários a estes Manuais

Sem comentários