Summary
This table summarizes the steps taken to ensure that servers are extremely resistant to security breaches.
| Action | Implementation | 
|---|---|
| User Authentication | Leveraging features within VMware vSphere and Microsoft, Zerto limits users who can access the Virtual Replication Appliance through authentication. | 
| Communications to VMware vSphere | Using standard APIs, Zerto is able to securely communicate with the VMware components. | 
| Network Services | The Virtual Replication Appliance limits the number of running services. By default, it runs only the Zerto protocols and SSH. | 
| Port Configuration | Zerto has been configured to use the minimum number of ports to ensure the security of the environment. See the ports usage table, above. | 
| Network Encryption | Communications between VMware vSphere components and across the network is encrypted. | 
| Roles, Permissions, and Privileges | Zerto activities are assigned to an administrator within your organization to ensure that the right person is able to execute Zerto. | 
| Log Settings | Zerto produces various logs. Event logs and alerts are viewable from the vSphere Client console |