To ensure that your virtual environment is protected from external attacks, you must observe certain rules.
- Always install VMware Aria Operations for Logs in a trusted network.
- Always save VMware Aria Operations for Logs support bundles in a secure location.
IT decision makers, architects, administrators, and others who must familiarize themselves with the security components of VMware Aria Operations for Logs must read the security topics in Administering VMware Aria Operations for Logs.
These topics provide concise references to the security features of VMware Aria Operations for Logs. Topics include the product external interfaces, ports, authentication mechanisms, and options for configuration and management of security features.
For information about securing your virtual environment, see the VMware vSphere Security Guide and the Security Center on the VMware Web site.