VMware VSHIELD MANAGER 4.1 - Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Server VMware VSHIELD MANAGER 4.1 - herunter. Sophos Anti-Virus for VMware vShield startup guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - VMware vShield

Sophos Anti-Virus forVMware vShieldstartup guide1.1Product version:March 2014Document date:

Seite 2 - Contents

NotesVersionSoftwareavailable for your security VM.This guide tells you how to setup the share.5 Check for incompatible anti-virus productsYou cannot

Seite 3 - 1 About this guide

6.1 Install Enterprise ConsoleIf you already have Enterprise Console installed, go to Create a Sophos Anti-Virus share (section6.2).You should install

Seite 4

Note: Unless you specified otherwise, the Sophos Anti-Virus share is accessed by the user accountset up during installation of Enterprise Console. It

Seite 5 - 3 Key steps in installation

7.1 Check that you have the passwords you needWhen you run the security VM installer, you need to enter certain passwords. You should makesure that yo

Seite 6 - 4.1 VMware requirements

4. Ensure that the installer download is on a Windows computer that has access to vCenter andvShield Manager over the network. The installer does not

Seite 7 - 4.1.3 Guest VMs

8. The wizard displays your hosts. Select the host or hosts on which you want to install the securityVM.Note: The installer will give security VMs na

Seite 8 - 4.1.4 vShield

16.At the Installation complete page, you can see whether installation of any security VMs failed.If it did, check the log for details.Tip: If you wa

Seite 9 - 4.2 Sophos requirements

Check whether you need to configure resourcesUsually you do not need to configure resources for the security VM. Note that: The installer reserves mem

Seite 10 - 6 Install Sophos requirements

This section tells you how to: Check whether the agent is already installed (if you are not sure). Prepare to install the agent. Install the agent.8.1

Seite 11

The Thin Agent is not included in a standard VM Tools installation, so you must do one of thefollowing: Install VM Tools with the Custom option and in

Seite 12 - 7 Install Sophos security VMs

Contents1 About this guide...

Seite 13 - 7.3 Download the installer

4. Now start the installation procedure. The command depends on whether you areupgrading/reinstalling VM Tools or installing it for the first time.Com

Seite 14 - 7.4 Install the security VMs

Note: Guest VMs are shown as UNPROTECTED on the vShield tab in the vSphere Client console.This refers only to vShield App protection, not to Sophos p

Seite 15

9.2 Check that on-access scanning is workingOn-access scanning is your main method of protection against threats.Whenever you copy, move,or open a fil

Seite 16 - 192.0.2.0-SSVM192.0.2.0

9.3 Troubleshoot on-access scanningIf on-access scanning is not working:1. Ensure that the security VM is in a group whose anti-virus policy specifies

Seite 17

You view protected guest VMs by using a feature included in the Sophos Anti-Virus installer.1. In the same directory to which you extracted the instal

Seite 18 - 8.3 Install the agent

13 What happens if a security VM detects a threatIf a security VM detects a threat on one of the guest VMs, it sends an alert to Enterprise Console.Sp

Seite 19

14.2 Clean up the guest VMYou can clean up the affected guest VM by different methods, depending on how the VM has beenaffected.Some viruses leave no

Seite 20 - Tools Upgrade and click OK

14.3 Clear the alert from Enterprise ConsoleWhen you are sure that the affected guest VM is clean, clear the alert from Enterprise Console:1. In Enter

Seite 21

17 Appendix: vCenter administrator accountYour vCenter administrator account must have the following permissions: Datastore > Allocate space Networ

Seite 22

3. Select Edit Settings > Hardware > CPUs. Then specify the number of CPUs.The recommended number of CPUs depends on the number of guest VMs o

Seite 23 - 10 Maintain the security VMs

1 About this guideThis guide is intended for administrators who want to protect a network of virtual machines (VMs)against viruses and other threats.T

Seite 24

Since DOC software is open-source, free software, you are free to use, modify, copy, anddistribute–perpetually and irrevocably–the DOC software source

Seite 25 - 14 Deal with a threat

Douglas C. Schmidt22References1. http://www.cs.wustl.edu/~schmidt/ACE.html2. http://www.cs.wustl.edu/~schmidt/TAO.html3. http://www.dre.vanderbilt.edu

Seite 26 - 14.2 Clean up the guest VM

3. Altered source versions must be plainly marked as such, and must not be misrepresented asbeing the original software.4. The name of the author may

Seite 27 - 16 Uninstall security VMs

Redistribution and use in source and binary forms, with or without modification, are permittedprovided that the following conditions are met:1. Redist

Seite 28

Permission is granted to anyone to use this software for any purpose, including commercialapplications, and to alter it and redistribute it freely, su

Seite 29 - 20 Legal notices

THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,PROCUREMENT O

Seite 30

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditionsand the following disclaimer in the documentation

Seite 31

and/or sell copies of the Software, and to permit persons to whom the Software is furnished to doso, subject to the following conditions:The above cop

Seite 32

documentation, and that the name of Sam Rushing not be used in advertising or publicity pertainingto distribution of the software without specific, wr

Seite 33 - Info-ZIP

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESSOR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OFMERCHANTABI

Seite 34

2 About Sophos Anti-Virus for VMware vShieldSophos Anti-Virus for VMware vShield is a security virtual machine (VM).You set it up as follows: You inst

Seite 35

and/or sell copies of the Software, and to permit persons to whom the Software is furnished to doso, subject to the following conditions: The above co

Seite 36

[However, none of that term is relevant at this point in time. All of these restrictively licencedsoftware components which he talks about have been r

Seite 37 - Medusa web server

OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTYHAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.2)The 32-bit CRC compensation

Seite 38

CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAYOUT OF THE

Seite 39

Per Allansson Nils Nordman Simon WilkinsonPortable OpenSSH additionally includes code from the following copyright holders, also underthe 2-term

Seite 40 - Network Time Protocol

NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THISSOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.8)Portable OpenSSH conta

Seite 41

IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THEPO

Seite 42

OpenSSL Cryptography and SSL/TLS ToolkitThe OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL Licenseand the origina

Seite 43

Original SSLeay licenseCopyright © 1995–1998 Eric Young ([email protected]) All rights reserved.This package is an SSL implementation written by Eric

Seite 44

The license and distribution terms for any publically available version or derivative of this codecannot be changed. i.e. this code cannot simply be c

Seite 45

How does scanning work?When a guest VM tries to access a file: A vShield Endpoint Thin Agent running on the VM notifies the Sophos security VM. The se

Seite 46

1. The origin of this software must not be misrepresented; you must not claim that you wrotethe original software. If you use this software in a produ

Seite 47

Software Foundation; All Rights Reserved” are retained in Python alone or in any derivativeversion prepared by Licensee.3. In the event Licensee prepa

Seite 48

3. The name of the author may not be used to endorse or promote products derived from thissoftware without specific prior written permission.THIS SOFT

Seite 49

THEREOF, EVEN IF THE AUTHORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGE.THE AUTHORS AND DISTRIBUTORS SPECIFICALLY DISCLAIM ANY WARRANTIES,INCL

Seite 50

If you make changes to Vim yourself, you must clearly describe in the distribution howto contact you. When the maintainer asks you (in any way) for a

Seite 51

way to do this is by e-mail or by uploading the files to a server and e-mailing the URL. If thenumber of changes is small (e.g., a modified Makefile)

Seite 52

3. Neither the name of the University of California, Lawrence Berkeley National Laboratory, U.S.Dept. of Energy nor the names of its contributors may

Seite 53 - TinyXML XML parser

Check for incompatible anti-virus products. Install the Sophos requirements. Install the Sophos security VM. Install the vShield Endpoint Thin Agent

Seite 54

2 Gb RAM.NotesBy default, 2 CPUs are allocated. If you have many guest VMs to protect, you can configure moreCPUs after you install the security VM.

Seite 55

Operating systemGuest VMs should run one of the following operating systems: Windows 8 (32- and 64-bit) Windows Server 2012 Windows 7 (32- and 64-bit)

Seite 56

NotesVersionSoftwareSupports Windows operatingsystems only.This is part of VMware Toolsand can be automaticallyupgraded.Must be installed on each gues

Kommentare zu diesen Handbüchern

Keine Kommentare