You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/cloud/dedicated/esxi-hardening/guide.en-gb.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,25 +15,25 @@ The purpose of this guide is to help you optimise security for your ESXi system.
15
15
16
16
In particular, this guide explains how to:
17
17
18
-
-restrict access to your ESXi server to a specific IP address or network range
19
-
-disable services that increase your server's attack surface.
18
+
-Restrict access to your ESXi server to a specific IP address or network range.
19
+
-Disable services that increase your server's attack surface.
20
20
21
21
We will do this using the on-board features offered by VMware, as well as those offered by OVHcloud.
22
22
23
23
> [!warning]
24
24
>
25
-
> Recently, ESXi systems fell victim to a flaw that malicious groups exploited very quickly across public networks.
25
+
> Recently, ESXi systems fell victim to a security flaw that malicious groups exploited very quickly across public networks.
26
26
>
27
27
> You can find more information on this attack in [an additional FAQ](https://docs.ovh.com/gb/en/dedicated/esxi-faq/).
28
28
>
29
29
30
-
### Security best practices reminder:
30
+
### Security best practices reminder
31
31
32
32
- Update your ESXi systems regularly.
33
-
- Restrict access only to trusted IP addresses.
33
+
- Restrict access to trusted IP addresses only.
34
34
- Disable unused ports and services.
35
35
- Ensure access to your servers or network equipment is limited, controlled and protected with strong passwords.
36
-
- Back up your critical data in protected, isolated external disks and backup servers.
36
+
- Back up your critical data to protected, isolated external disks and backup servers.
37
37
38
38
**Optional**:
39
39
@@ -42,9 +42,9 @@ We will do this using the on-board features offered by VMware, as well as those
42
42
43
43
## Requirements
44
44
45
-
-access to the [OVHcloud Control Panel](https://www.ovh.com/auth/?action=gotomanager&from=https://www.ovh.co.uk/&ovhSubsidiary=GB){.external}
46
-
-a dedicated server with the ESXi solution deployed
47
-
-an offer compatible with our [Network Firewall](https://docs.ovh.com/gb/en/dedicated/firewall-network/) feature, if you would like to use it for filtering
45
+
-Access to the [OVHcloud Control Panel](https://www.ovh.com/auth/?action=gotomanager&from=https://www.ovh.co.uk/&ovhSubsidiary=GB){.external}
46
+
-A dedicated server with the ESXi solution deployed
47
+
-An offer compatible with our [Network Firewall](https://docs.ovh.com/gb/en/dedicated/firewall-network/) feature, if you would like to use it for filtering
48
48
49
49
## Instructions
50
50
@@ -65,7 +65,7 @@ Reminder of its definition and operating principle:
65
65
> To do this, you will need to [reboot](https://docs.ovh.com/gb/en/dedicated/getting-started-dedicated-server/#restarting-your-dedicated-server_1) your ESXi server via the OVHcloud Control Panel.
66
66
>
67
67
68
-
You can view access log history in the following files from an SSH shell:
68
+
You can view the access log history in the following files via SSH:
69
69
70
70
-`/var/run/log/vobd.log` contains the logs that can be used for monitoring and troubleshooting:
71
71
@@ -120,7 +120,7 @@ It is recommended that you filter legitimate access in this way:
120
120
> We strongly advise disabling **SSH** and **SLP** services.
121
121
> If you still use the SSH service, restrict its use and access as much as possible.
122
122
> This also applies to **shell** access.
123
-
> Prioritize only what is strictly necessary for each of your needs.
123
+
> Prioritise only what is strictly necessary for each of your needs.
124
124
125
125
#### Manipulation via the graphical interface
126
126
@@ -197,8 +197,8 @@ esxcli system account list
197
197
198
198
> Explanations for changing/adapting access rules:
199
199
>
200
-
> - The `vSphereClient` service: this service corresponds to the web administration interface on port 443 (HTTPS).
201
-
> - The `sshServer` service: this service corresponds to SSH access on port 22.
200
+
> - The `vSphereClient` service: This service corresponds to the web administration interface on port 443 (HTTPS).
201
+
> - The `sshServer` service: This service corresponds to SSH access on port 22.
0 commit comments