Following virtual machine security best practices helps ensure the integrity of your vSphere deployment. What to read next General Virtual Machine ProtectionA virtual machine is, in most respects, the equivalent of a physical server. Employ the same security measures in virtual machines that you do for physical systems. Use Templates to Deploy Virtual MachinesWhen you manually install guest operating systems and applications on a virtual machine, you introduce a risk of misconfiguration. By using a template to capture a hardened base operating system image with no applications installed, you can ensure that all virtual machines are created with a known baseline level of security. Minimize Use of the Virtual Machine ConsoleThe virtual machine console provides the same function for a virtual machine that a monitor provides on a physical server. Users with access to the virtual machine console have access to virtual machine power management and removable device connectivity controls. Console access might therefore allow a malicious attack on a virtual machine. Prevent Virtual Machines from Taking Over ResourcesWhen one virtual machine consumes so much of the host resources that other virtual machines on the host cannot perform their intended functions, a Denial of Service (DoS) might occur. To prevent a virtual machine from causing a DoS, use host resource management features such as setting Shares and using resource pools. Deactivate Unnecessary Functions Inside Virtual MachinesAny service that runs in a virtual machine provides the potential for attack. By deactivating system components that are not necessary to support the application or service that is running on the system, you reduce the attack potential. Parent topic: Securing Virtual Machines