Ensure you meet the security requirements in your environment with the recommendations provided. What to read next vRealize Operations Security PostureThe security posture of vRealize Operations assumes a complete secure environment based on system and network configuration, organizational security policies, and best practices. It is important that you perform the hardening activities according to your organization's security policies and best practices. Secure Deployment of vRealize OperationsYou must verify the integrity of the installation media before you install the product to ensure authenticity of the downloaded files. Secure Configuration of vRealize OperationsAs a security best practice, you must secure the vRealize Operations console and manage Secure Shell (SSH), administrative accounts, and console access. Ensure that your system is deployed with secure transmission channels. Network Security and Secure CommunicationAs a security best practice, review and edit the network communication settings of your VMware virtual appliances and host machines. You must also configure the minimum incoming and outgoing ports for vRealize Operations. Auditing and Logging on your vRealize Operations SystemAs a security best practice, set up auditing and logging on your vRealize Operations system. Parent topic: Planning