VMware VSHIELD APP 1.0 - API Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Komponenten von Sicherheitsgeräten VMware VSHIELD APP 1.0 - API herunter. Chapter 23- VMware vShield End-point Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 35
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Page | 1
For the complete book please
visit:
www.eucbook.com
Seitenansicht 0
1 2 3 4 5 6 ... 34 35

Inhaltsverzeichnis

Seite 1 - Page

Page | 1 For the complete book please visit: www.eucbook.com

Seite 2 - Introduction

Page | 10 Configure IP Settings Once the appliance has booted you can configure its network settings fit for your environment. After the boot proce

Seite 3

Page | 11 the router/default gateway – or better still confirm you can ping the appliance from your management PC. Register with vCenter; Reset Pass

Seite 4

Page | 12 4. Click Save, will cause vShield to communicate to vCenter – and you should be confronted with an SSL Thumbprint dialog box, if you are

Seite 5

Page | 13 Note: Here the “Service VM” is the vShield Manager appliance itself. 6. Once configured for vCenter – the web-interface should be able

Seite 6

Page | 14 8. By default vShield will run for 60-days in an evaluation mode with some scalability limits imposed (limited to protection 100 VMs). A

Seite 7

Page | 15 vShield is licensed to protect a certain number of VMs, and most of the third-party vendors have followed suit – although some do still li

Seite 8

Page | 16 that will come, and go and then come back again. Do not be alarmed. All is well. And as this happens – you will see events taking plac

Seite 9

Page | 17 You should also see that the vShield has created the vmservice-vswitch in the Standard vSwitches view… This configuration of vShield op

Seite 10 - Configure IP Settings

Page | 18 Import Bitdefender Control Center Virtual Appliance WARNING: Currently Internet Explorer mishandles .OVA files. The .OVA format i

Seite 11 - License

Page | 19 3. After configuring options 1 and 2 as befits your network, select option 4, and install the database. Once complete select option 4 ag

Seite 12

Page | 2 Chapter 23: VMware vShield End-point Introduction There are many security technologies available in the market, and not to be ou

Seite 13

Page | 20 have been installed correctly. Under menu item 4 “Install/Modify Roles”, the sub menu 2 option allows you to “Show locally installed roles”

Seite 14

Page | 21 1. Before you begin creating accounts you might find it useful to enable Bitdefender built-in Active Directory support. This can be found

Seite 15

Page | 22 5. Next we need delegate a user account to have control over our VMs, Computers in AD and Mobile Devices. This involves adding an accoun

Seite 16

Page | 23 6. Notice here how the “targets” are in red because they contain no groups that would control this accounts scope of access. You need to

Seite 17 - Virtualized Environments

Page | 24 and for “Computers” we see a view of the Active Directory environment:

Seite 18 - WARNING:

Page | 25 Once you have selected your service and their respective targets you can add the account into the appliance. In my case I was able to logo

Seite 19

Page | 26 Deploy Bitdefender Security Server to each ESX host Now we have the management console of Bitdefender configured we can set

Seite 20

Page | 27 3. This should pull up the “Security Server Installation Page” – which allows you to control how the service is deployed. There’s quite

Seite 21

Page | 28 Note: Remember there is no bulk option for deploying the Security Server to every ESX host in the cluster. Also although you can control th

Seite 22

Page | 29 At the end of this deployment phase you should have one Control Center (used to deploy the Security Server and manage the solutions) and w

Seite 23

Page | 3 the inventory of vCenter • vShield App with Data Security As above but adds inspection of sensitive data based on violations reported by t

Seite 24 - Page

Page | 30 Install the Bitdefender “BDTools” (aka Silent Agent) In the context of virtual desktops we feel the most efficient way to inst

Seite 25

Page | 31 1. Select Network in the main menu, and switch to the Virtual Machines view 2. Navigate to the view that shows the virtual desktops.

Seite 26

Page | 32 Note: Once you click save the deployment will begin and you can monitor the progress under the Network and Tasks menu: Once the installa

Seite 27

Page | 33 Testing vShield and Bitdefender The BDTools installs as .MSI and adds the “B” icon in the taskbar tray. When launched it op

Seite 28

Page | 34 Conclusions As you can see vShield is very easy to setup and configure – and by relocating the functions of AV out of the guest operating

Seite 29

Page | 35 an unprotected state. In the case of Bitdefender the Silent Agent will report the VM is not protected. and this will trigger a custom

Seite 30

Page | 4 Manager assists in installing the “vShield Guest Driver” and VMware Tools includes the “vShield Endpoint Driver” on each VM. One of the job

Seite 31

Page | 5 This new structure allows vShield to run with more than one partner on the same ESX host. This is inline with VMware’s cloud and multi-tenn

Seite 32

Page | 6 times end-user like the reassurance of being able to see their security status, as they would with a conventional AV client that has

Seite 33

Page | 7 Additionally, the vShield Endpoint system requires a driver that’s now installed as part of VMware Tools, if you use complete it wil

Seite 34 - Conclusions

Page | 8 Note: fltmc shows that the vsepflt.sys drive has been loaded into the guest operating system. Importing the vShield OVA File The setup of v

Seite 35

Page | 9 6. Next select a cluster and/or a resource pool for the appliance to reside 7. Next select a datastore to hold the appliances virtual

Kommentare zu diesen Handbüchern

Keine Kommentare