VMware VCENTER CONFIGURATION MANAGER 5.3 - SOFTWARE CONTENT REPOSITORY TOOL GUIDE User Manual Page 30

  • Download
  • Add to my manuals
  • Print
  • Page
    / 35
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 29
TECHNICAL WHITE PAPER / 30
This risk must be mitigated in one of these ways:
1. Use OS provisioning only across a secure network; once a machine is provisioned, it can be transferred to an
insecure network and used like any other managed machine.
2. Do not join machines to domains during provisioning operations.
3. Change secret passwords to ephemeral passwords prior to transmission by the OS Provisioning Server and
change them again immediately after provisioning operations are complete.
4. Change any secret passwords transmitted during OS provisioning shortly after the process is complete.
Change the passwords everywhere they were used, even on machines not involved with provisioning
operations.
vCenter Configuration Manager Security Environment Requirements
Page view 29
1 2 ... 25 26 27 28 29 30 31 32 33 34 35

Comments to this Manuals

No comments