Issue link: http://hub-fr.insight.com/i/532074
70 switches and other data center infrastructure in the environment. Isolated management networks provide higher security while preventing VM traffic from inter- fering with management traffic. ✓ Configure Single Sign-On to sync with a trusted identity source such as Microsoft Active Directory. Grant per- missions to users and groups using the principle of least-privilege, giving only those roles and rights needed to do perform required work. ✓ Request and configure SSL certificates from a valid internal certificate authority or purchase certificates from a trusted security authority for vCenter™ and ESXi™ hosts to ensure confidentiality, data integrity and authenticity of ESXi and vCenter Server™ traffic. ✓ Perform hardening of your environment to meet your security and regulatory requirements. The vSphere Hardening Guide provides suggested configurations to enhance the security posture of your environment. Performance-tune for Latency- sensitive Workloads Virtualized environments can be configured to improve per- formance of applications that are highly sensitive to latency. To accommodate those workloads: ✓ Designate specific VMs as highly latency-sensitive, and use single root I/O virtualization (SR-IOV) or direct path I/O for latency-sensitive traffic on those VMs. ✓ Evaluate power management features on the hypervi- sor host, and make sure the settings aren't slowing things down.