You perform procedures on the vCenter Server instance by using the vSphere Client. Procedure Security Best Practices for Securing vSANYou must follow multiple best practices at all times when you operate your vSAN storage. Configure a Proxy Server for vSAN from the vSphere ClientYou perform the procedure on the respective vCenter Server to configure a proxy server for the download of the public Hardware Compatibility List. Configure vSAN Data-At-Rest Encryption from the vSphere ClientYou activate vSAN Data-At-Rest encryption on the vSAN cluster. You can choose Native Key Provider to enable vSAN Encryption or you must set up an external Key Management Server (KMS) and establish a trusted connection between vCenter Server and the KMS.