Following vCenter Server security best practices helps you ensure the integrity of your vSphere environment. What to read next Best Practices for vCenter Server Access ControlStrictly control access to different vCenter Server components to increase security for the system. Protecting the vCenter Server Windows HostProtect the Windows host where vCenter Server is running against vulnerabilities and attacks by ensuring that the host environment is as secure as possible. Limiting vCenter Server Network ConnectivityFor improved security, avoid putting the vCenter Server system on any network other than a management network, and ensure that vSphere management traffic is on a restricted network. By limiting network connectivity, you limit certain types of attack. vCenter Server Appliance Security Best PracticesFollow all best practices for securing a vCenter Server system to secure your vCenter Server Appliance. Additional steps help you make your appliance more secure. vCenter Password Requirements and Lockout Behavior To manage your vSphere environment, you must be aware of the vCenter Single Sign-On password policy, of vCenter Server passwords, and of lockout behavior. Parent topic: Securing vCenter Server Systems