Overview
This document outlines the security actions defined in the relevant Security Technical Implementation Guide (STIGs) and Microsoft security baselines for a VMware Horizon on VxRail solution stack (for example, VMware Horizon, VxRail, the management environment, the server operating system, the client operating system and so on) and provides documentation that shows how to implement the STIGs and security baselines. In addition, it includes before and after security scores based on an approach such as Tenable Nessus vulnerability templates. The scores demonstrate the value of implementing these STIGs and security baselines to improve the security posture of your environment.
Document introduction
This guide describes the steps required to implement STIGs on the VMware Horizon Connection server and the VxRail Solution stack which includes the VxRail Manager virtual machine (VM), VMware ESXI, and VMware vCenter. It also describes the process for implementing Microsoft security baselines in relation to the Microsoft Windows components of the environment and any Microsoft client operating system components of the environment.
Document purpose
This guide describes the process to implement STIGs and security baselines for VMware Horizon on a VxRail Solution stack. It does not describe the following:
- Creating the VxRail stack.
- Any on-site configuration operations performed by Dell.
- The deployment of Horizon Instant Clone desktop pools except where it relates directly to this solution.
Audience
The audience for this document consists of authorized and appropriately skilled personnel who are responsible for improving VxRail security.
We value your feedback
Dell Technologies and the authors of this document welcome your feedback on the solution and the solution documentation. Contact the Dell Technologies Solutions team by email.
Authors: Dell Validated Designs for VDI team