Skip to content

Commit 3bc3402

Browse files
EN proof
1 parent 6fc3a19 commit 3bc3402

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

pages/cloud/dedicated/esxi-hardening/guide.en-gb.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -15,25 +15,25 @@ The purpose of this guide is to help you optimise security for your ESXi system.
1515

1616
In particular, this guide explains how to:
1717

18-
- restrict access to your ESXi server to a specific IP address or network range
19-
- disable services that increase your server's attack surface.
18+
- Restrict access to your ESXi server to a specific IP address or network range.
19+
- Disable services that increase your server's attack surface.
2020

2121
We will do this using the on-board features offered by VMware, as well as those offered by OVHcloud.
2222

2323
> [!warning]
2424
>
25-
> Recently, ESXi systems fell victim to a flaw that malicious groups exploited very quickly across public networks.
25+
> Recently, ESXi systems fell victim to a security flaw that malicious groups exploited very quickly across public networks.
2626
>
2727
> You can find more information on this attack in [an additional FAQ](https://docs.ovh.com/gb/en/dedicated/esxi-faq/).
2828
>
2929
30-
### Security best practices reminder:
30+
### Security best practices reminder
3131

3232
- Update your ESXi systems regularly.
33-
- Restrict access only to trusted IP addresses.
33+
- Restrict access to trusted IP addresses only.
3434
- Disable unused ports and services.
3535
- Ensure access to your servers or network equipment is limited, controlled and protected with strong passwords.
36-
- Back up your critical data in protected, isolated external disks and backup servers.
36+
- Back up your critical data to protected, isolated external disks and backup servers.
3737

3838
**Optional**:
3939

@@ -42,9 +42,9 @@ We will do this using the on-board features offered by VMware, as well as those
4242

4343
## Requirements
4444

45-
- access to the [OVHcloud Control Panel](https://www.ovh.com/auth/?action=gotomanager&from=https://www.ovh.co.uk/&ovhSubsidiary=GB){.external}
46-
- a dedicated server with the ESXi solution deployed
47-
- an offer compatible with our [Network Firewall](https://docs.ovh.com/gb/en/dedicated/firewall-network/) feature, if you would like to use it for filtering
45+
- Access to the [OVHcloud Control Panel](https://www.ovh.com/auth/?action=gotomanager&from=https://www.ovh.co.uk/&ovhSubsidiary=GB){.external}
46+
- A dedicated server with the ESXi solution deployed
47+
- An offer compatible with our [Network Firewall](https://docs.ovh.com/gb/en/dedicated/firewall-network/) feature, if you would like to use it for filtering
4848

4949
## Instructions
5050

@@ -65,7 +65,7 @@ Reminder of its definition and operating principle:
6565
> To do this, you will need to [reboot](https://docs.ovh.com/gb/en/dedicated/getting-started-dedicated-server/#restarting-your-dedicated-server_1) your ESXi server via the OVHcloud Control Panel.
6666
>
6767
68-
You can view access log history in the following files from an SSH shell:
68+
You can view the access log history in the following files via SSH:
6969

7070
- `/var/run/log/vobd.log` contains the logs that can be used for monitoring and troubleshooting:
7171

@@ -120,7 +120,7 @@ It is recommended that you filter legitimate access in this way:
120120
> We strongly advise disabling **SSH** and **SLP** services.
121121
> If you still use the SSH service, restrict its use and access as much as possible.
122122
> This also applies to **shell** access.
123-
> Prioritize only what is strictly necessary for each of your needs.
123+
> Prioritise only what is strictly necessary for each of your needs.
124124
125125
#### Manipulation via the graphical interface
126126

@@ -197,8 +197,8 @@ esxcli system account list
197197

198198
> Explanations for changing/adapting access rules:
199199
>
200-
> - The `vSphereClient` service: this service corresponds to the web administration interface on port 443 (HTTPS).
201-
> - The `sshServer` service: this service corresponds to SSH access on port 22.
200+
> - The `vSphereClient` service: This service corresponds to the web administration interface on port 443 (HTTPS).
201+
> - The `sshServer` service: This service corresponds to SSH access on port 22.
202202
203203
Example with the vSphereClient service:
204204

@@ -299,4 +299,4 @@ cat /path-to-my-key/key-ecdsa.pub | ssh root@esxi-host-ip 'cat >> /etc/ssh/keys-
299299

300300
You can find even more details on security best practices in [this VMware suggested guide](https://core.vmware.com/security-configuration-guide).
301301

302-
Join our community of users on <https://community.ovh.com/en/>.
302+
Join our community of users on <https://community.ovh.com/en/>.

0 commit comments

Comments
 (0)