Summary

This table summarizes the steps taken to ensure that servers are extremely resistant to security breaches.

Action Implementation
User Authentication Leveraging features within VMware vSphere and Microsoft, Zerto limits users who can access the Virtual Replication Appliance through authentication.
Communications to VMware vSphere Using standard APIs, Zerto is able to securely communicate with the VMware components.
Network Services The Virtual Replication Appliance limits the number of running services. By default, it runs only the Zerto protocols and SSH.
Port Configuration Zerto has been configured to use the minimum number of ports to ensure the security of the environment. See the ports usage table, above.
Network Encryption Communications between VMware vSphere components and across the network is encrypted.
Roles, Permissions, and Privileges Zerto activities are assigned to an administrator within your organization to ensure that the right person is able to execute Zerto.
Log Settings Zerto produces various logs. Event logs and alerts are viewable from the vSphere Client console