Table of Contents HOL-PRT-1464

Size: px
Start display at page:

Download "Table of Contents HOL-PRT-1464"

Transcription

1 Table of Contents Lab Overview - - Applying Data Center Security with Symantec & VMware NSX... 2 Lab Guidance... 3 About Symantec Data Center Security: Server... 4 Module 1 - Configure policies, Test Virtual Machine, and NSX Security Group (15 Min)... 5 Introduction... 6 Prepare Test Virtual Machine... 7 Deploy Virtual Machine Threat Protection Policy Create a NSX Security Group Summary Module 2 - Demonstrate Symantec's Virtual Machine Threat Protection and Quarantine Features (45 Min) Introduction Threat Detection and Quarantine Purging Rescanning and Whitelisting Summary Module 3 - Demonstrate Symantec's Virtual Machine Network Security Introspection (30 Min) Introduction Create New NSX Security Policy with Network Introspection Services...65 Simulate Inbound Network Threat in Log Only Mode Simulate Inbound Network Threat and Block It Summary Summary Review of DCS and NSX Conclusion Interested in our solution? Page 1

2 Lab Overview - HOL- PRT Applying Data Center Security with Symantec & VMware NSX Page 2

3 Lab Guidance With Software Defined Data Centers (SDDC), there is even more demand for application to be made available at the speed of business, leading to automation in orchestration and deployment. This has enabled IT organizations to be agile and lower their time to market. However, we continue to see security as a bottleneck. Symantec Data Center Security: Server removes this bottleneck by lowering the security tax by providing frictionless threatprotection with the best in class AV scan engine from Symantec. It leverages VMware NSX Service Composer to automate and orchestrate security policies mapped to security groups. It follows the best practices of VMware NSX to deliver agentless malware and network intrusion prevention (NIPS) for workloads on Software Defined Data Centers. The lab contains the following modules: Module 1 - Configure Policies, Test Virtual Machine and NSX Security Group (15 Min) Module 2 - Demonstrate Symantec's Virtual Machine Threat Protection and Quarantine Features (40 Min) Module 3 - Demonstrate Symantec's Virtual Machine Network Security Introspection (30 Min) You have 90 minutes to complete all the modules above. Lab Captains: Daniel Lopez, Amit Chakrabarty Page 3

4 About Symantec Data Center Security: Server Symantec Data Center Security protects and secures enterprise data center by a rich set of security controls for both physical and virtual server environment. Symantec Data Center Security: Server delivers agentless malware protection for VMware infrastructures via a security virtual appliance, and enables security policy orchestration and automated workflows for the software-defined data center (SDDC). Symantec Data Center Security: Server Advanced extends Symantec Data Center Security: Server by incorporating technologies previously known as Critical System Protection. Server Advanced provides granular, policy-based controls via a low impact in-guest agent to monitor and protect heterogeneous physical and virtual server environments. Page 4

5 Module 1 - Configure policies, Test Virtual Machine, and NSX Security Group (15 Min) Page 5

6 Introduction In this section you will do the prep work that is required for the future modules. As part of this you will: Prepare the Test Guest Virtual Machine with Eicar threat test files. Access Symantec Data Center: Server management console to create threat protection policies and publish them to VMware NSX. Use VMware NSX Service Composer to create security groups and add virtual machines to this group. Page 6

7 Prepare Test Virtual Machine To begin these steps, make sure you are in the Controlcenter VM. Access the Test Virtual Machine via RDP Double-click on the "TestGvm.RDP" shortcut on the Desktop. Unzip the Eicar text file Double-click on the eicar.zip on the Desktop. Notice that inside this zip file there is a text file called "eicar.txt". Eicar files are used to test threat protection engines. While real malware could do damage, this test file allows you to test anti-virus software without having to use a real virus file. Eicar files are indentified as verified virus file. For this module, the Eicar file will be used to test the threat protection features of Symantec Data Center Security:Server scan engine. This file will be copied to several locations in the next steps. Leave the window up. Page 7

8 Create first demo folder Open another Window Explorer window. Go to the C:\ drive and create a folder called "TP_Demo1". Add Eicar text file to first demo folder Drag and drop the eicar.txt inside the archive to the "TP_Demo1" folder. Create second demo folder Go back to the C:\ drive and create another folder called "TP_Demo2". Page 8

9 Add Eicar text file to second demo folder Drag and drop the eicar.txt inside the archive to the "TP_Demo2" folder. Clean up all of the remaining Eicar files There are several other locations where the Eicar test file(s) are located. Removing these files will allow for fewer false positives. Delete EICAR zip file from Desktop Right-click on the eicar.zip on the Desktop and select Delete. Close all folder and files To prevent the On-Access Scan on test files close all opened folders and files. Minimize the Test Virtual Machine RDP session The preparation for the Test Virtual Machine is now completed. Minimize the TestGvm RDP session. Page 9

10 Deploy Virtual Machine Threat Protection Policy To begin these steps return to the Controlcenter VM. Access the Symantec Data Center Security: Server Management Server Double-click on the "Symantec DCS.RDP" shortcut on the Desktop of the Controlcenter. Symantec Data Center Security: Server Management Console Click on the "Management Console" shortcut on the Desktop of the Symantec DCS RDP session. Page 10

11 Log into the Management Console Credentials to access the Management Console are: User name: symadmin Password: VMware1! Click on the "Log On" button Access the Virtual Machine Threat Protection policies Go to Policies > Virtual Machine Threat Protection. Page 11

12 Access the Symantec default policies workspace folder Click on Policies > Workspace > Symantec folder on the the left panel. Edit the existing Virtual Machine Threat Protection Policy Right-click on the "Virtual Machine Threat Protection Policy" and select "Edit". Page 12

13 Disable the Rescan policy option On the Policy's General Settings, uncheck the box next to "Rescan Quarantine files when On-Demand scans runs" option. This feature will be enabled in a later step. Page 13

14 Verify proper Network Security Settings Verify that the checkbox next to "Block connection when threats are found..." option is unchecked. Notice that this setting will allow the policy to only log threats. In a later module this feature will be enabled to test Symantec's Network Threat Protection Services. Save Policy Settings Click the "OK" button to save policy settings. Page 14

15 Submit policy changes 1. Type "1" as the new Revision number 2. Click on the "submit" button to finalize and submit policy changes Publish Policy Right-Click on the "Virtual Machine Threat Protection Policy" and select "Publish Policy". Page 15

16 Accept Threat Protection Policy overwrite warning A pop-up informing you that the new changes to the policy will overwrite the existing published policy will appear. Click the "Ok" button. The same policy will be used throughout the lab so overwriting the policy is part of the normal process. Accept Threat Protection policy published successfully pop-up After allowing the policy to be overwritten you will receive a pop-up informing you that the Threat Protection Policy was successfully published. Click on the "Ok" button to confirm. You will now see a green dot next to the "Virtual Machine Threat Protection Policy" reaffirming the action. Minimize the Symantec DCS RDP session The configuration changes and deployment of the Threat Protection Policy are now completed. Minimize the Symantec DCS RDP session. Page 16

17 Create a NSX Security Group In this section you will : Create a security group that will contain the Test virtual machine. This NSX security group will be used for the upcoming modules. To begin this step, make sure that you are in the Controlcenter VM. Acces Google Chrome Web Browser On the ControlCenter VM, click on the Mozilla Firefox web browser shortcut on the Desktop. Feel free to select another browser if desired. Access the vsphere Web Client homepage Click on the Firefox shortcut displayed above. Page 17

18 Login to the vsphere Web Client Home Page Use the following credentials... User name: root Password: VMware1! Do not use Windows session authentication. Access the Networking & Security panel (NSX) On the vsphere Web Client home page select the "Networking & Security" tab to access the VMware NSX appliance settings. Page 18

19 Access the Service Composer On the "Networking & Security" home page select the "Service Composer" tab. Access the Security Groups tab Click on the "Security Groups" tab. Create a new Security Group Click on the "New Security Group" icon. Page 19

20 Name the Security Group Name the security group "Symantec Protected Group". There is no need to add a description. Add Test Virtual Machine to new Security Group 1. Select the third option, "Select objects to include". 2. Scroll through the tabs until you find "Virtual Machine" and click on it. 3. Select the Test Virtual Machine (Win7-DCS-TestGvm) 4. Click the "Finish" button. Page 20

21 Summary In this module you learnt how to : Create policy with Symantec Data Center Security Create NSX security policy and NSX security groups Map policy with security groups You also learnt the powerful concept of micro-segmentation of VMware NSX by using security groups. This features enables you to orchestrate and automate management of security policies in large scale deployments. This is leveraged by Symantec to bring best of the breed products to market by integrating directly with VMware NSX. Page 21

22 Module 2 - Demonstrate Symantec's Virtual Machine Threat Protection and Quarantine Features (45 Min) Page 22

23 Introduction In this module you will learn how to: Create security policies using VMware NSX Service Composer Add an endpoint service for malware threat protection Use VMware NSX Service Composer to consume a policy created by Symantec Data Center Security:Server Map this policy to a security group that is used to protect a Guest Virtual Machine (GVM) Use Symantec Data Center Security:Server management console to verify the GVM that is monitored and protected Evaluate the flexibility of Data Center Security:Server by creating a targeted scans Review quarantined files and their event descriptions Page 23

24 Threat Detection and Quarantine To begin this module access the vsphere Web Client and go to the "Networking & Security" home page. Access the Service Composer On the "Networking & Security" home page select the "Service Composer" tab. Access the Security Policies tab Click on the "Security Policies" tab. Page 24

25 Create new Security Policy Click on the "Create Security Policy" icon. Name the Security Policy Name the Security Policy "DCS AV Security Policy". Leave all the defaults. Click on the "Next" button. Page 25

26 Add an Endpoint Service Click on the "Add endpoint service" icon. Page 26

27 Provide appropriate entries and selections for new Endpoint Service 1. Name: "DCS AV Policy" 2. Action: "Apply" 3. Service Type: "Anti Virus" 4. Service Name: "Symantec DataCenter Security for VMware NSX 5. Service Configuration: "Virtual Machine Threat Protection Policy" 6. State: "Enabled" 7. Enforce: "Yes" 8. Click the "OK" button Page 27

28 Complete the new Security Policy Click on the "Finish" Button to complete the policy. Page 28

29 Apply new Security Policy to existing Security Group Right-click on the new "DCS AV Security Policy" and select "Apply Policy". Page 29

30 Select the Security Group to which Security Policy will be apply to From the resulting pop-up check the security group "Symantec Protected Group" and click on the "OK" button. Page 30

31 Check Security Groups in the Symantec Data Center Security: Server Management Console 1. Go back to your Symantec DCS RDP session by maximizing the Window 2. Go to Assets > Virtual Machine Threat Protection > Guest VM View > Security Groups 3. Click "Refresh" 4. Once the refresh completes the "Symantec Protected Group" should appear in the list of Security Groups Page 31

32 Verify that Test Virtual Machine is protected Double-click on the "Symantec Protected Group" to check if the Test Virtual Machine is under the Protected Guest VMs. If the Test Virtual Machine is not in the "Protected Guest VMs" tab click on the Refresh button a few more times (NSX will eventually trickle a message to the Symantec Data Center Security: Server). Page 32

33 Activate a scan on the Test Virtual Machine Right-click on the Test Virtual Machine "Win7-DCS-TestGvm" and select "Scan Now". Page 33

34 Select scan type option In the resulting pop-up, select "Scan Targeted Paths". Page 34

35 Add File Path Click on the "Add" button and enter the file path "C:\TP_Demo1\eicar.txt". Click on the "OK" button. Start Scan Click on the "Scan Now" to trigger the threat protection scan. Click "Ok" on the Success pop-up. Page 35

36 Verify path on Test Virtual Machine to see if EICAR test was detected Return to the TestGvm RDP session (Test Virtual Machine), go to C:\TP_Demo1 and verify the eicar.txt file is missing. Page 36

37 Find the quarantined file Go to "C:\VirtualAgent\Quarantine" and verify a file exists. This is the quarantined Eicar test file. Note: Several other files could be present in this folder. Make sure you check the modified date of the file(s) present. The name of the file in this quarantine folder will also differ. Verify data inside quarantine file is obfuscated Open this file in notepad. Verify the data is obfuscated (i.e. Eicar string is not readable). Page 37

38 Verify that "Endpoint malware threat detected" event exists in the Symantec Data Center Security: Server Management Console 1. Minimize the current TestGvm RDP session and return back to the Symantec DCS RDP session 2. Go to Monitors > Events tab and then choose Virtual Machine Threat Protection Events from the Monitor Types 3. Refresh and verify an "Endpoint malware threat detected" event exists. Page 38

39 Check "Endpoint malware threat detected" event details Double-click on the "Endpoint malware threat detected" event. Verify you see the infected file is "C:\TP_Demo1\eicar.txt". Page 39

40 Purging In the previous section an Eicar.txt file was quarantined. In this section, you will see how Data Center Security: Server can be configured to purge quarantined files after a specific time. Confirm purge quarantine files time interval Per the "Virtual Machine Threat Protection Policy", the quarantine file feature was enabled and the default for purging quarantine files was left to purge files older than 30 days. In the next set of steps the Test Virtual Machine's time and date will be modified to make sure that the quarantined file (C:\TP_Demo1\eicar.txt) is successfully purged from the system after the set time interval. Page 40

41 Note the date on the Test Virtual Machine Open the date/time pop-up on the bottom right of the screen. Note the date (i.e. July 16, 2014). Advance date on Test Virtual Machine 30 days forward 1. Click on the start menu and type "PowerShell" 2. Right-click on the "Windows PowerShell" result and select "Run as administrator" 3. Run the following command in PowerShell: Set-Date -Date (Get-Date).AddDays(30) Page 41

42 Verify files are purged from the Quarantine folder Note that the date moved forward 30 days (i.e. August 15, 2014). Within 2 minutes, the files in the quarantine folder will be purged/deleted per the configuration on the "Virtual Machine Threat Protection Policy". If the file doesn't disappear right-click anywhere in the window and select on "Refresh". Page 42

43 Reset time on the Test Virtual Machine Run the following command in PowerShell: Set-Date -Date (Get-Date).AddDays(-30) Confirm that machine is back to original date (i.e. July 16, 2014). Page 43

44 Rescanning and Whitelisting The rescan option in the Threat Protection Policy s Quarantine settings rescans the quarantined files when On-Demand Scans are run. Quarantined files are released/ restored to the original locations if they are no longer classified as threats. This classification is based on new definitions or if they are exclusively whitelisted in the Scan Settings of the Security Virtual Appliance configuration base policy (SVA_Config_Base_Policy). In this section you will Rescanning after Whitelisting the Eicar test file. Activate a second scan on the Test Virtual Machine 1. Go back to your Symantec DCS RDP session by maximizing the Window 2. Go to Assets > Virtual Machine Threat Protection > Guest VM View > Security Groups > Symantec Protected Group 3. Right-click on the Test Virtual Machine "Win7-DCS-TestGvm" and select "Scan Now" Page 44

45 Select scan type option In the resulting pop-up, select "Scan Targeted Paths". Page 45

46 Add File Path 1. Click on the "Add" button 2. Enter the path "C:\TP_Demo2\eicar.txt" 3. Click on the "OK" button. Start Scan Click on the "Scan Now" to trigger the threat protection scan. Click "Ok" on the success pop-up. Page 46

47 Verify path on Test Virtual Machine to see if Eicar test was detected Return to the TestGvm RDP session (Test Virtual Machine), go to C:\TP_Demo2 and verify the eicar.txt file is missing. Page 47

48 Verify Eicar test file is in quarantine folder Go to "C:\VirtualAgent\Quarantine" and verify the the eicar.txt quarantined file exists. Once you confirm a quarantine file exist go ahead and close all Windows Explorer Window(s). Page 48

49 Edit Virtual Machine Threat Protection Policy 1. Return to your Symantec DCS RDP session 2. Go to Policies > Virtual Machine Threat Protection > Workspace > Symantec folder 3. Right-click on the "Virtual Machine Threat Protection Policy" and select "Edit" Page 49

50 Enable Rescan in the Virtual Machine Threat Protection Policy Check the Rescan quarantined files... option and click the "Ok" button. Page 50

51 Edit policy revision number In the resulting "submit changes" pop-up, edit Revision number from 2 to 1. (This avoids steps to reconfigure Security Policy on the vsphere Web Client) Publish Virtual Machine Threat Protection Policy Right-Click on the "Virtual Machine Threat Protection Policy" and select "Publish Policy". Click OK when asked to over-write existing policy. A second pop-up will appear stating that the policy won't take effect until you apply to a Security Group. Click OK to finalize action. Page 51

52 Find latest "Endpoint malware threat detected" event 1. Go to Monitors > Events > Monitor Types > Virtual Machine Threat Protection Events 2. Notice the latest "Endpoint malware threat detected" event. Double-click on the event to see event details Page 52

53 Copy the Eicar test file hash 1. Copy the file hash value by double-clicking on it to highlight it and using keyboard shortcut CTRL + c 2. Close the event detail window Page 53

54 Edit Security Virtual Appliance Configuration Base Policy 1. Go back to Policies > Virtual Threat Machine Protection > Workspace > Symantec folder 2. Right-click on the "SVA_Config_Base_Policy" and select "Edit" Page 54

55 Whitelist the Eicar test file 1. Go to the "Scan Settings" tab 2. Click on "Edit[+]" to see the list of whitelisted files 3. Click on the "Add" button 4. In "SHA-256 Digest" field, paste the file has copied using the keyboard shortcut CTRL + v 5. In the "Description" field, type "EICAR Test Demo File" 6. Click "OK" to enter the new entry into the list 7. Click on the "OK" button on the policy to save the change 8. Click on the "Submit" button to submit changes (Note: no need to modify Revision number here) Page 55

56 Page 56

57 Publish Security Virtual Appliance Configuration Base Policy Right-click on the "SVA_Config_Based_Policy" and select "Publish". Click OK on the success pop-up. Page 57

58 Activate a third scan on the Test Virtual Machine 1. Go to back to Assets > Virtual Machine Threat Protection > Guest VM View > Security Groups > Symantec Protected Group 2. Click on the "Refresh" Button 3. Right-click on the Test Virtual Machine "Win7-DCS-TestGvm" and select "Scan Now" Page 58

59 Select scan type option In the resulting pop-up, select "Scan Targeted Paths". Page 59

60 Add File Path 1. Click on the "Add" button 2. Enter the path "C:\TP_Demo2\eicar.txt" 3. Click on the "OK" button. Start Scan Click on the "Scan Now" to trigger the threat protection scan. Click "Ok" on the success pop-up. Page 60

61 Verified Whitelisted file was restored 1. Go back to the TestGvm (Test Virtual Machine) RDP session 2. Make sure that the eicar.txt test file in C:\TP_Demo2 was restored 3. The Quarantine folder in C:\VirtuaAgent\Quarantine should be empty Page 61

62 Summary In this module you learned how to: Create security policies on NSX Service Composer and map it to a malware threat protection policy provided Symantec's Security Virtual Appliance (SVA) Apply threat protection policy to a NSX Security Group Verify the assets under Security Groups are monitored by Symantec policy on Symantec Data Center Security: Server management console Run a scan on target Guest Virtual Machine on demand Test threat protection by simulating a virus infection (using Eicar threat test file) Page 62

63 Module 3 - Demonstrate Symantec's Virtual Machine Network Security Introspection (30 Min) Page 63

64 Introduction This module discusses: How to create a network introspection policy on VMware NSX Mapping network introspection policy policy to Symantec Data Center Security policy Apply this policy to a Security Group which has Guest Virtual Machines that needs to be protected. Simulate and initiated a network threat by conducting a SQL injection attack. Prove how the threat can just be log or logged and blocked at the same time. Page 64

65 Create New NSX Security Policy with Network Introspection Services To begin this module access the vsphere Web Client and go to the "Network and Security" home page. Access the Service Composer On the "Network and Security" home page select the "Service Composer" tab. Access the Security Policies tab Click on the "Security Policies" tab. Page 65

66 Create new Security Policy Click on the "Create Security Policy" icon. Name the new Security Policy Name the Security Policy "DCS Network Threat Protection". Page 66

67 Add a new Network Introspection Service option 1. Click on the 4th option on the left side panel named "Network Introspection Services" 2. Click on the green plus (+) icon to add a new Network Introspection Service Page 67

68 Provide appropriate entries and selections for new Network Introspection Service 1. Name: "DCS Network Threat" 2. Service Name: "Symantec DataCenter Security Service for VMware NSX" 3. Profile: "Virtual Machine Threat Protection Policy profile" 4. Source: Click on "Change...", on the source pop-up select "Any" 5. Destination: Leave as "Policy's Security Groups" 6. Click the "OK" button The "Source" and "Destination" selection will apply to Incoming traffic from "Any" to the security group where this policy gets applied. Leave the remaining default settings. Page 68

69 Page 69

70 Finalize changes to the existing Security Policy Click on the "Finish" Button to save and finalize the new "DCS Network Threat" security policy. Page 70

71 Apply new Security Policy to existing Security Group Right-click on the new "DCS Network Threat Protection" and select "Apply Policy". Page 71

72 Select the Security Group to which Security Policy will be apply to From the resulting pop-up check the security group "Symantec Protected Group" and click on the "OK" button. Page 72

73 Simulate Inbound Network Threat in Log Only Mode In this section you will perform the simulation of a network threat, specifically a SQL Injection, to an SQL web front end. The test virtual Machine (TestGvm) is hosting an implementation of PHP for Windows running on an Internet Information Services (IIS) server. The victim website hosted in the Test Virtual machine contains a table with dummy personal identifiable information (PII). A URL with a crafted SQL injection query will be used to test whether the attack is allowed or denied. In this step, the SQL injection simulation will be succesful since the Virtual Machine Threat Detection Policy is set to log only mode. Refresher of Network Security Settings in Virtual Machine Threat Protection policy In an earlier step it was verified that the "Block connection when threats are found (Threats will only be logged when left unchecked)" option was unchecked. There is no need to modify the "Virtual Machine Threat Protection Policy" for this step since the policy is already modified to only log when the threat is found. Type the URL with a crafted SQL injection query and explore results From the Controlcenter access the Mozilla Firefox web browser Click on the "SQL Injection Test" bookmark in the bookmarks bar or type the URL directly: Page 73

74 Notice how the URL is structured and the results you get in the web browser. The PII data is now exposed. Page 74

75 Verify that "Guest network threat detected" event exist in the Symantec Data Center Security: Server Management Console 1. Return back to the Symantec DCS RDP session 2. Go to Monitors> Events tab > Monitor Types > Virtual Machine Threat Protection Events 3. Refresh and verify a Guest network threat detected event exists. Page 75

76 Check "Guest network threat detected" event details The remediation status is Guest network threat logged since the Virtual Machine Threat Protection Policy is configured to only log when the threat is found. Some of the information logged in the event include: threat name, source and destination IP address and port of the network traffic, among others. Page 76

77 Simulate Inbound Network Threat and Block It In this step the network threat (SQL injection) will be activated one more time. This time the SQL injection simulation will fail as we will make changes on the Virtual Machine Threat Protection Policy to prevent the attack from occurring. Access the Virtual Machine Threat Protection policies Go to Policies > Virtual Machine Threat Protection. Access the Symantec default policies workspace folder Click on Policies > Workspace > Symantec folder on the the left panel. Page 77

78 Edit the Virtual Machine Threat Protection Policy Right-click on the "Virtual Machine Threat Protection Policy" and select "Edit". Page 78

79 Modify Network Security Settings to enable the blockage of threats 1. Check the box next to "Block connection when threats are found..." option. 2. Click on the "Ok" button Submit policy changes 1. Type "1" as the new Revision number 2. Click on the "submit" button to finalize and submit policy changes. Page 79

80 Publish Policy Right-Click on the "Virtual Machine Threat Protection Policy" and select "Publish Policy". Accept Threat Protection policy overwrite warning A pop-up informing you that the new changes to the policy will overwrite the existing publish policy will appear. Click the "Ok" button. Page 80

81 Accept Threat Protection Policy published successfully pop-up After allowing the policy to be overwritten you will receive a pop-up informing you that the Threat Protection was successfully published. Click on the "Ok" button to confirm. You will now see a green dot next to the "Virtual Machine Threat Protection Policy" reaffirming the action. Type the URL with a crafted SQL injection query and explore results From the Controlcenter access the Firefox web browser Click on the "SQL Injection Test" bookmark in the bookmarks bar or type the URL directly: Notice how the URL is now blocked. The Virtual Machine Threat Protection Policy is now actively blocking network threats. Page 81

82 Verify that "Guest network threat detected" event exist in the Symantec Data Center Security: Server Management Console 1. Return back to the Symantec DCS RDP session 2. Go to Monitors> Events tab > Monitor Types > Virtual Machine Threat Protection Events 3. Refresh and verify a Guest network threat detected event exists. Page 82

83 Check "Guest network threat detected" event details The remediation status this time is Guest network threat blocked since the Virtual Machine Threat Protection Policy is configured to block the connection when threat is found. Page 83

84 Summary Micro-segmentation feature of VMware NSX gives access to the L2 level traffic flowing through Guest Virtual Machine. In this module you learned, how these data packets can be inspected to detect and block possible network based threats like SQL Injection. We call this feature Guest Network Threat Protection (GNTP). This module covered: How to create a network introspection policy on VMware NSX Map this policy to Symantec Data Center Security policy Apply this policy to a Security Group which has Guest Virtual Machines that needs to be protected. Simulated and initiated a network threat by conducting a SQL injection attack. Proved how the threat can just be log or logged and blocked at the same time. Page 84

85 Summary Review of DCS and NSX Page 85

86 Conclusion This concludes - "Applying Data Center Security with Symantec & VMware NSX". We hope you have enjoyed taking this lab. Symantec Data Center Security:Server delivers advanced secruity services on VMware NSX by integrating into the hypervisor. This integration makes management and consumption of security policies part of integrated NSX workflow. As a result of this native integration, Symantec security appliance will work seamlessly across other NSX integration like vcac from VMware. For mor information and or if are interested to learn more about Symantec Data Center, please contact - amit_chakrabarty@symantec.com. Symantec Data Center Security: Server delivers agentless malware threat protection and network intrusion prevention services for VMware infrastructures via a security virtual appliance, and enables security policy orchestration and automated workflows for the software-defined data center (SDDC). Symantec Data Center Security: Server Advanced extends Symantec Data Center Security: Server by incorporating agented-based technologies previously known as Critical System Protection. Server Advanced provides granular, policy-based controls via a low impact in-guest agent to monitor and protect heterogeneous physical and virtual server environments. Page 86

87 Interested in our solution? Scan the QRcode with your smartphone or tablet for more information Interested in Symantec Data Center Security: Server/Server Advanced?.. For more information about our solution please scan the QRcode with your smartphone or tablet or enter the URL Page 87

88 Conclusion Thank you for participating in the VMware Hands-on Labs. Be sure to visit to continue your lab experience online. Lab SKU: Version: Page 88

Table of Contents HOL-MBL-1661

Table of Contents HOL-MBL-1661 Table of Contents Lab Overview -... 2 Lab Guidance... 3 Module 1 - Just-In-Time Application Deployment (30 minutes)... 4 Module 1 Introduction... 5 Just-In-Time Applications using App Volumes... 6 Module

More information

Table of Contents HOL-SDC-1415

Table of Contents HOL-SDC-1415 Table of Contents Lab Overview - - IT Outcomes Security Controls Native to Infrastructure. 2 Lab Guidance... 3 Module 1 - Policy-Based Compliance... 5 Introduction... 6 Manage vcenter Server Virtual Machines...

More information

Table of Contents HOL-1757-MBL-6

Table of Contents HOL-1757-MBL-6 Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...

More information

VMware AirWatch: Directory and Certificate Authority

VMware AirWatch: Directory and Certificate Authority Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates

More information

Datacenter Security: Protection Beyond OS LifeCycle

Datacenter Security: Protection Beyond OS LifeCycle Section Datacenter Security: Protection Beyond OS LifeCycle 1 Not so fun Facts from the Symantec ISTR 2017 Report Zero-Day Vulnerability, annual total Legitimate tools, annual total 6,000 5 5,000 4,000

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

Table of Contents HOL NET

Table of Contents HOL NET Table of Contents - VMware AppDefense - Secure Datacenter Endpoints...2 Lab Guidance... 3 Module 1- Overview of VMware AppDefense (15 Minutes)... 9 AppDefense Platform Overview... 10 Conclusion... 14 Module

More information

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide AppDefense Appendix Cb Defense Integration Configuration Guide Table of Contents Overview 3 Requirements 3 Provision API Key for Cb Defense Integration 3 Figure 1 Integration Type 4 Figure 2 API Key Provisioning

More information

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Table of Contents Lab Overview - HOL-1857-03-UEM - Workspace ONE UEM with App & Access Management... 2 Lab Guidance... 3 Module 1 - Workspace

More information

Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide

Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide Symantec Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP3 Overview Guide

More information

MOVE AntiVirus page-level reference

MOVE AntiVirus page-level reference McAfee MOVE AntiVirus 4.7.0 Interface Reference Guide (McAfee epolicy Orchestrator) MOVE AntiVirus page-level reference General page (Configuration tab) Allows you to configure your McAfee epo details,

More information

UP L13: Leveraging the full protection of SEP 12.1.x

UP L13: Leveraging the full protection of SEP 12.1.x UP L13: Leveraging the full protection of SEP 12.1.x Hands on lab Description In this hands on lab you will learn about the different protection technologies bundled in SEP 12.1.x and see how they complement

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Table of Contents HOL-PRT-1467

Table of Contents HOL-PRT-1467 Table of Contents Lab Overview - - Virtual Volumes with Dell EqualLogic... 2 Lab Guidance... 3 Pre-flight Instructions... 5 Module 1 - Working with Dell EqualLogic and VVOLs (60 Mins)... 11 Creating a

More information

Product Guide Revision A. Intel Security Controller 1.2

Product Guide Revision A. Intel Security Controller 1.2 Product Guide Revision A Intel Security Controller 1.2 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

McAfee Cloud Workload Security Product Guide

McAfee Cloud Workload Security Product Guide Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

IC121-End-to-End Virtual Security Hands-On Lab

IC121-End-to-End Virtual Security Hands-On Lab IC121-End-to-End Virtual Security Hands-On Lab Description Many of us fear zero day exploits especially if they could impact our dynamic virtual systems. Learn how you can leverage CCS VSM to quickly lock

More information

Table of Contents HOL-1757-MBL-5

Table of Contents HOL-1757-MBL-5 Table of Contents Lab Overview - - VMware AirWatch: Mobile App Management and App Development... 2 Lab Guidance... 3 Module 1 - Introduction to AppConfig (30 minutes)... 8 Login to the AirWatch Console...

More information

AppDefense Getting Started. VMware AppDefense

AppDefense Getting Started. VMware AppDefense AppDefense Getting Started VMware AppDefense You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit

More information

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156

THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156 THREAT PROTECTION FOR VIRTUAL SYSTEMS #ILTACON #ILTA156 JIM P. NIXON Application Support Manager Seyfarth Shaw LLP jnixon@seyfarth.com IN THE PAST, TRADITIONAL SOLUTIONS DIDN T THINK ABOUT VIRTUAL WORKLOADS

More information

Table of Contents HOL-HBD-1301

Table of Contents HOL-HBD-1301 Table of Contents Lab Overview... 2 - vcloud Hybrid Service Jump Start for vsphere Admins...3 Module 1 - vcloud Hybrid Service: Architecture and Consumption Principles...5 vcloud Hybrid Service... 6 vcloud

More information

VMware AirWatch - Unified Endpoint Management for Windows 10

VMware AirWatch - Unified Endpoint Management for Windows 10 VMware AirWatch - Unified Endpoint Management for Windows 10 Table of Contents Lab Overview - HOL-1857-02-UEM - Workspace ONE UEM - Managment for Windows 10 2 Lab Guidance... 3 Module 1 - Windows 10 Software

More information

Table of Contents HOL-1703-SDC-4

Table of Contents HOL-1703-SDC-4 Table of Contents Lab Overview - - VMware NSX: Installation and Configuration...2 Lab Guidance... 3 Module 1 - NSX Manager Installation and Configuration (15 Minutes)... 6 Introduction... 7 Hands-on Labs

More information

SnapProtect Live Browse with Granular Recovery on VMware. May 2017 SL10336 Version 1.1.0

SnapProtect Live Browse with Granular Recovery on VMware. May 2017 SL10336 Version 1.1.0 SnapProtect Live Browse with Granular Recovery on VMware May 2017 SL10336 Version 1.1.0 1 Introduction This lab will guide you through some of the typical SnapProtect v11 operations (also known as CommVault

More information

Migrating vrealize Automation 6.2 to 7.2

Migrating vrealize Automation 6.2 to 7.2 Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Table of Contents HOL CMP

Table of Contents HOL CMP Table of Contents Lab Overview - - vrealize Orchestrator - Advanced... 2 Lab Guidance... 3 Module 1 - Creating Advanced vrealize Orchestrator Workflows (45 min)...9 Introduction... 10 Prompting User Input

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

SonicWall Capture Client 1.0. Operations

SonicWall Capture Client 1.0. Operations SonicWall Capture Client 1.0 Operations Contents Part 1. Introduction About Capture Client................................................................5 Description...........................................................................

More information

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline Collector 2.0

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline Collector 2.0 VMware Skyline Collector Installation and Configuration Guide VMware Skyline Collector 2.0 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If

More information

Cloud Workload Discovery 4.5.1

Cloud Workload Discovery 4.5.1 Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Configuration Example March 2018 2018 Juniper Networks, Inc. Juniper Networks, Inc. 1133

More information

Kaspersky Security for Virtualization Frequently Asked Questions

Kaspersky Security for Virtualization Frequently Asked Questions Kaspersky Security for Virtualization Frequently Asked Questions 1. What is Kaspersky Security for Virtualization, and how does it work with vshield technology? Kaspersky Security for Virtualization for

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Antivirus Solution Guide for Clustered Data ONTAP: Symantec

Antivirus Solution Guide for Clustered Data ONTAP: Symantec Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Symantec Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4304 Abstract An antivirus solution is key for enterprises

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.5.53 Manager-NS-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) 2010 October 25 29, 2010 Kuala Lumpur Convention Centre Securing Virtual Environments Raimund Genes CTO Trend Micro The Changing Datacenter

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Migrating vrealize Automation 6.2 to 7.1

Migrating vrealize Automation 6.2 to 7.1 Migrating vrealize Automation 6.2 to 7.1 vrealize Automation 7.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Revision A. Intel Security Controller Product Guide

Revision A. Intel Security Controller Product Guide Revision A Intel Security Controller Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Table of Contents HOL CMP

Table of Contents HOL CMP Table of Contents Lab Overview - - Monitor and Troubleshoot Your Infrastructure and Applications with vrealize Operations and vrealize Log Insight... 2 Lab Guidance... 3 Module 1 - Troubleshoot Infrastructure

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.7.59 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolves issues Installation instructions Known

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.3.39 Manager-M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1 Antivirus Solution Guide NetApp Clustered Data ONTAP 8.2.1 Contents Abstract... 4 Audience... 4 Purpose and Scope... 4 Introduction... 4 Antivirus Solution Architecture... 5 Components of the Vscan/AV

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 Revision B McAfee Network Security Platform 9.2 (9.2.7.9-9.2.7.10 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

The Evolution of Data Center Security, Risk and Compliance

The Evolution of Data Center Security, Risk and Compliance #SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and

More information

vsphere 6 Webcast Web Client

vsphere 6 Webcast Web Client vsphere 6 Webcast Web Client Overview of features Dennis Lu July 14, 2015 2015 VMware Inc. All rights reserved. Agenda Notes Wikibook Performance improvements Lots of UI Features and Tweaks 2 Quick Notes

More information

VMware vsphere: Install, Configure, and Manage v6.5 Pod. Installation and Configuration Guide

VMware vsphere: Install, Configure, and Manage v6.5 Pod. Installation and Configuration Guide VMware vsphere: Install, Configure, and Manage v6.5 Pod Installation and Configuration Guide Document Version: 2017-12-27 Installation of VMware vsphere: ICM v6.5 virtual pods as described in this guide

More information

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide Mission Control for the Microsoft Cloud 5nine Cloud Security Web Portal Version 12.o Getting Started Guide 2018 5nine Software Inc. All rights reserved. All trademarks are the property of their respective

More information

AT&T Voice DNA Receptionist User Guide

AT&T Voice DNA Receptionist User Guide AT&T Voice DNA Receptionist User Guide Page 2 of 28 Table of Contents About Receptionist... 3 Start Receptionist... 4 Use Receptionist the First Time... 4 Use Receptionist After the First Time... 7 The

More information

Forescout. Configuration Guide. Version 2.4

Forescout. Configuration Guide. Version 2.4 Forescout Version 2.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

REVISED 1 AUGUST REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes and later

REVISED 1 AUGUST REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes and later REVISED 1 AUGUST 2018 REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes 2.13.1 and later Table of Contents Introduction Audience What You Will Learn Navigating This Document for App Volumes Use

More information

ForeScout CounterACT. Configuration Guide. Version 1.1

ForeScout CounterACT. Configuration Guide. Version 1.1 ForeScout CounterACT Hybrid Cloud Module: VMware NSX Plugin Version 1.1 Table of Contents About VMware NSX Integration... 3 Use Cases... 3 Additional VMware Documentation... 3 About this Plugin... 3 Dependency

More information

We start by providing you with an overview of the key feature of the IBM BPM Process Portal.

We start by providing you with an overview of the key feature of the IBM BPM Process Portal. Lab 1 Process Portal 1.1 Overview This lab exercise will make you familiar with the key capabilities of the ready-to-use Process Portal included with IBM Business Process Manager (BPM). You will experience

More information

REVISED 1 AUGUST QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes and later

REVISED 1 AUGUST QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes and later REVISED 1 AUGUST 2018 QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes 2.13.1 and later Table of Contents Introduction Audience What You Will Learn Navigating This Document for App Volumes

More information

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline 1.4

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline 1.4 VMware Skyline Collector Installation and Configuration Guide VMware Skyline 1.4 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved. Avanan for G Suite Technical Overview Contents Intro 1 How Avanan Works 2 Email Security for Gmail 3 Data Security for Google Drive 4 Policy Automation 5 Workflows and Notifications 6 Authentication 7

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Table of Contents HOL SDC

Table of Contents HOL SDC Table of Contents Lab Overview - - Site Recovery Manager: Data Center Migration and Disaster Recovery... 3 Overview of Site Recovery Manager... 4 Lab Overview... 5 Lab Guidance... 7 Module 1 - Lightning

More information

Table of Contents HOL SLN

Table of Contents HOL SLN Table of Contents Lab overview - - VMware Cloud Foundation 3.0 Getting Started... 2 Lab Overview and Guidance... 3 Module 1 - Workload Domain Exploration (30 mins)... 9 Workload Domain Overview... 10 Module

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Table of Contents HOL-1701-CHG-5

Table of Contents HOL-1701-CHG-5 Table of Contents Lab Overview: vrealize Operations Application Monitoring: Challenge Lab... 2 Lab Overview... 3 Lab Guidance... 5 Module 1 - Configuring a Custom Application (15 minutes)... 10 Introduction...

More information

1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu. FireFox

1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu. FireFox CIS 231 Windows 7 Install Lab #2 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME At the your connection is not private message, click Advanced

More information

vcloud Director User's Guide 04 OCT 2018 vcloud Director 9.5

vcloud Director User's Guide 04 OCT 2018 vcloud Director 9.5 vcloud Director User's Guide 04 OCT 2018 vcloud Director 9.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management You can find the most up-to-date technical documentation

More information

Contents Overview... 2 Part I Connecting to the VPN via Windows OS Accessing the Site with the View Client Installing...

Contents Overview... 2 Part I Connecting to the VPN via Windows OS Accessing the Site with the View Client Installing... CSEC 640 Lab Access Contents Overview... 2 Part I Connecting to the VPN via Windows OS... 2 Accessing the Site with the View Client... 2 Installing... 3 Launching Your Client... 4 Part II Windows Access

More information

Using the VMware vrealize Orchestrator Client

Using the VMware vrealize Orchestrator Client Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.3.4 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation

More information

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee

More information

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

KASPERSKY ENDPOINT SECURITY FOR BUSINESS KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd

More information

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices Hands-On Lab Description Most corporations today have some form of patch process in place. In this session, you will learn

More information

Table of Contents HOL-SDC-1412

Table of Contents HOL-SDC-1412 Table of Contents Lab Overview... 2 - IT Outcomes Data Center Virtualization and Standardization... 3 Module 1 - Lab Overview (15 Min)... 5 Physical Topology... 6 Application Topology... 8 Access the 3-Tier

More information

Table of Contents HOL-1710-SDC-6

Table of Contents HOL-1710-SDC-6 Table of Contents Lab Overview - - What's New: vsphere with Operations Management.. 2 Lab Guidance... 3 Module 1 - What's New in vsphere (90 minutes)... 9 vcenter Server Appliance (VSCA)... 10 vcenter

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.44-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

VMware Horizon View 5.2 Reviewer s Guide REVIEWER S GUIDE

VMware Horizon View 5.2 Reviewer s Guide REVIEWER S GUIDE VMware Horizon View 5.2 Reviewer s Guide REVIEWER S GUIDE Table of Contents Introduction... 5 What Is VMware Horizon View?... 5 Simplify.... 5 Manage and Secure.... 5 Empower... 5 Architecture and Components

More information

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

WatchGuard Dimension v1.1 Update 1 Release Notes

WatchGuard Dimension v1.1 Update 1 Release Notes WatchGuard Dimension v1.1 Update 1 Release Notes Build Number 442674 Revision Date March 25, 2014 WatchGuard Dimension is the next-generation cloud-ready visibility solution for our Unified Threat Management

More information

Implementing and Supporting Windows Intune

Implementing and Supporting Windows Intune Implementing and Supporting Windows Intune Lab 4: Managing System Services Lab Manual Information in this document, including URL and other Internet Web site references, is subject to change without notice.

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.86-8.3.7.56 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.3.3 Manager-NTBA Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Table of Contents HOL SLN

Table of Contents HOL SLN Table of Contents Lab Overview - - Automate IT: Making Private Cloud Easy...2 Lab Guidance... 3 Module 1 - Better Together: vrealize Automation and NSX App Centric Networking & Security (45 Minutes)...

More information

Cisco Virtual Application Container Services 2.0 Lab v1

Cisco Virtual Application Container Services 2.0 Lab v1 Cisco Virtual Application Container Services 2.0 Lab v1 Last Updated: 02-SEP-2015 About This Solution Cisco Virtual Application Container Services (VACS) enables simplified deployment of Secure Application

More information

Using the Horizon vrealize Orchestrator Plug-In

Using the Horizon vrealize Orchestrator Plug-In Using the Horizon vrealize Orchestrator Plug-In VMware Horizon 6 version 6.2.3, VMware Horizon 7 versions 7.0.3 and later Modified on 4 JAN 2018 VMware Horizon 7 7.4 You can find the most up-to-date technical

More information

Sophos Anti-Virus for VMware vshield: On-Premise Edition startup guide. Product version: 2.1

Sophos Anti-Virus for VMware vshield: On-Premise Edition startup guide. Product version: 2.1 Sophos Anti-Virus for VMware vshield: On-Premise Edition startup guide Product version: 2.1 Document date: August 2016 Contents 1 About this guide...4 2 About Sophos Anti-Virus...5 3 Key steps in installation...7

More information

Table of Contents HOL-SDC-1317

Table of Contents HOL-SDC-1317 Table of Contents Lab Overview - Components... 2 Business Critical Applications - About this Lab... 3 Infrastructure Components - VMware vcenter... 5 Infrastructure Components - VMware ESXi hosts... 6

More information

VMware vrealize Operations for Horizon Installation. VMware vrealize Operations for Horizon 6.5

VMware vrealize Operations for Horizon Installation. VMware vrealize Operations for Horizon 6.5 VMware vrealize Operations for Horizon Installation VMware vrealize Operations for Horizon 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 8.20 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.49-9.1.3.6 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision C Contents About the release New features Enhancements Resolved issues Installation

More information

Securing the Software-Defined Data Center

Securing the Software-Defined Data Center Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 McAfee Network Security Platform 9.2 (9.2.7.22-9.2.7.20 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

Veriato Recon / 360. Version 9.0.3

Veriato Recon / 360. Version 9.0.3 Veriato Recon / 360 Version 9.0.3 1/3/2018 Upgrade Guide January 3, 2018 Table of Contents Before You Begin... 1 What's New... 1 How the System Works... 1 Upgrade Support... 6 Update Antivirus Exclusions...

More information