To ensure that your virtual environment is protected from external attacks, you must observe certain rules.

Always install Log Insight in a trusted network.

Always save Log Insight support bundles in a secure location.

IT decision makers, architects, administrators, and others who must familiarize themselves with the security components of Log Insight must read the VMware vCenter Log Insight Security Guide.

The Security Guide contains concise references to the security features of Log Insight. Topics include the product external interfaces, ports, authentication mechanisms, and options for configuration and management of security features.

For information about securing your virtual environment, see the VMware vSphere Security Guide and the Security Center on the VMware Web site.