To ensure that your virtual environment is protected from external attacks, you must observe certain rules.
Always install vRealize Log Insight in a trusted network.
Always save vRealize Log Insight support bundles in a secure location.
IT decision makers, architects, administrators, and others who must familiarize themselves with the security components of vRealize Log Insight must read the security topics in Administering vRealize Log Insight.
These topics provide concise references to the security features of vRealize Log Insight. Topics include the product external interfaces, ports, authentication mechanisms, and options for configuration and management of security features.
For information about securing your virtual environment, see the VMware vSphere Security Guide and the Security Center on the VMware Web site.