Follow all best practices for securing a vCenter Server system to secure your vCenter Server Appliance. Additional steps help you make your environment more secure.

Configure NTP

Ensure that all systems use the same relative time source (including the relevant localization offset), and that the relative time source can be correlated to an agreed-upon time standard (such as Coordinated Universal Time-UTC). Synchronized systems are essential for certificate validity. NTP also makes it easier to track an intruder in log files. Incorrect time settings can make it difficult to inspect and correlate log files to detect attacks, and can make auditing inaccurate. See Synchronize the Time in the vCenter Server Appliance with an NTP Server.

Restrict vCenter Server Appliance network access

Restrict access to only those essential components required to communicate with the vCenter Server Appliance. Blocking access from unnecessary systems reduces the potential for general attacks on the operating system. Restricting access to only those essential components minimizes risk.