VMware VSHIELD MANAGER 4.1 - Instrukcja Użytkownika Strona 1

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Serwery VMware VSHIELD MANAGER 4.1 -. Sophos Anti-Virus for VMware vShield startup guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - VMware vShield

Sophos Anti-Virus forVMware vShieldstartup guide1.1Product version:March 2014Document date:

Strona 2 - Contents

NotesVersionSoftwareavailable for your security VM.This guide tells you how to setup the share.5 Check for incompatible anti-virus productsYou cannot

Strona 3 - 1 About this guide

6.1 Install Enterprise ConsoleIf you already have Enterprise Console installed, go to Create a Sophos Anti-Virus share (section6.2).You should install

Strona 4

Note: Unless you specified otherwise, the Sophos Anti-Virus share is accessed by the user accountset up during installation of Enterprise Console. It

Strona 5 - 3 Key steps in installation

7.1 Check that you have the passwords you needWhen you run the security VM installer, you need to enter certain passwords. You should makesure that yo

Strona 6 - 4.1 VMware requirements

4. Ensure that the installer download is on a Windows computer that has access to vCenter andvShield Manager over the network. The installer does not

Strona 7 - 4.1.3 Guest VMs

8. The wizard displays your hosts. Select the host or hosts on which you want to install the securityVM.Note: The installer will give security VMs na

Strona 8 - 4.1.4 vShield

16.At the Installation complete page, you can see whether installation of any security VMs failed.If it did, check the log for details.Tip: If you wa

Strona 9 - 4.2 Sophos requirements

Check whether you need to configure resourcesUsually you do not need to configure resources for the security VM. Note that: The installer reserves mem

Strona 10 - 6 Install Sophos requirements

This section tells you how to: Check whether the agent is already installed (if you are not sure). Prepare to install the agent. Install the agent.8.1

Strona 11

The Thin Agent is not included in a standard VM Tools installation, so you must do one of thefollowing: Install VM Tools with the Custom option and in

Strona 12 - 7 Install Sophos security VMs

Contents1 About this guide...

Strona 13 - 7.3 Download the installer

4. Now start the installation procedure. The command depends on whether you areupgrading/reinstalling VM Tools or installing it for the first time.Com

Strona 14 - 7.4 Install the security VMs

Note: Guest VMs are shown as UNPROTECTED on the vShield tab in the vSphere Client console.This refers only to vShield App protection, not to Sophos p

Strona 15

9.2 Check that on-access scanning is workingOn-access scanning is your main method of protection against threats.Whenever you copy, move,or open a fil

Strona 16 - 192.0.2.0-SSVM192.0.2.0

9.3 Troubleshoot on-access scanningIf on-access scanning is not working:1. Ensure that the security VM is in a group whose anti-virus policy specifies

Strona 17

You view protected guest VMs by using a feature included in the Sophos Anti-Virus installer.1. In the same directory to which you extracted the instal

Strona 18 - 8.3 Install the agent

13 What happens if a security VM detects a threatIf a security VM detects a threat on one of the guest VMs, it sends an alert to Enterprise Console.Sp

Strona 19

14.2 Clean up the guest VMYou can clean up the affected guest VM by different methods, depending on how the VM has beenaffected.Some viruses leave no

Strona 20 - Tools Upgrade and click OK

14.3 Clear the alert from Enterprise ConsoleWhen you are sure that the affected guest VM is clean, clear the alert from Enterprise Console:1. In Enter

Strona 21

17 Appendix: vCenter administrator accountYour vCenter administrator account must have the following permissions: Datastore > Allocate space Networ

Strona 22

3. Select Edit Settings > Hardware > CPUs. Then specify the number of CPUs.The recommended number of CPUs depends on the number of guest VMs o

Strona 23 - 10 Maintain the security VMs

1 About this guideThis guide is intended for administrators who want to protect a network of virtual machines (VMs)against viruses and other threats.T

Strona 24

Since DOC software is open-source, free software, you are free to use, modify, copy, anddistribute–perpetually and irrevocably–the DOC software source

Strona 25 - 14 Deal with a threat

Douglas C. Schmidt22References1. http://www.cs.wustl.edu/~schmidt/ACE.html2. http://www.cs.wustl.edu/~schmidt/TAO.html3. http://www.dre.vanderbilt.edu

Strona 26 - 14.2 Clean up the guest VM

3. Altered source versions must be plainly marked as such, and must not be misrepresented asbeing the original software.4. The name of the author may

Strona 27 - 16 Uninstall security VMs

Redistribution and use in source and binary forms, with or without modification, are permittedprovided that the following conditions are met:1. Redist

Strona 28

Permission is granted to anyone to use this software for any purpose, including commercialapplications, and to alter it and redistribute it freely, su

Strona 29 - 20 Legal notices

THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,PROCUREMENT O

Strona 30

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditionsand the following disclaimer in the documentation

Strona 31

and/or sell copies of the Software, and to permit persons to whom the Software is furnished to doso, subject to the following conditions:The above cop

Strona 32

documentation, and that the name of Sam Rushing not be used in advertising or publicity pertainingto distribution of the software without specific, wr

Strona 33 - Info-ZIP

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESSOR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OFMERCHANTABI

Strona 34

2 About Sophos Anti-Virus for VMware vShieldSophos Anti-Virus for VMware vShield is a security virtual machine (VM).You set it up as follows: You inst

Strona 35

and/or sell copies of the Software, and to permit persons to whom the Software is furnished to doso, subject to the following conditions: The above co

Strona 36

[However, none of that term is relevant at this point in time. All of these restrictively licencedsoftware components which he talks about have been r

Strona 37 - Medusa web server

OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTYHAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.2)The 32-bit CRC compensation

Strona 38

CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAYOUT OF THE

Strona 39

Per Allansson Nils Nordman Simon WilkinsonPortable OpenSSH additionally includes code from the following copyright holders, also underthe 2-term

Strona 40 - Network Time Protocol

NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THISSOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.8)Portable OpenSSH conta

Strona 41

IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THEPO

Strona 42

OpenSSL Cryptography and SSL/TLS ToolkitThe OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL Licenseand the origina

Strona 43

Original SSLeay licenseCopyright © 1995–1998 Eric Young ([email protected]) All rights reserved.This package is an SSL implementation written by Eric

Strona 44

The license and distribution terms for any publically available version or derivative of this codecannot be changed. i.e. this code cannot simply be c

Strona 45

How does scanning work?When a guest VM tries to access a file: A vShield Endpoint Thin Agent running on the VM notifies the Sophos security VM. The se

Strona 46

1. The origin of this software must not be misrepresented; you must not claim that you wrotethe original software. If you use this software in a produ

Strona 47

Software Foundation; All Rights Reserved” are retained in Python alone or in any derivativeversion prepared by Licensee.3. In the event Licensee prepa

Strona 48

3. The name of the author may not be used to endorse or promote products derived from thissoftware without specific prior written permission.THIS SOFT

Strona 49

THEREOF, EVEN IF THE AUTHORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGE.THE AUTHORS AND DISTRIBUTORS SPECIFICALLY DISCLAIM ANY WARRANTIES,INCL

Strona 50

If you make changes to Vim yourself, you must clearly describe in the distribution howto contact you. When the maintainer asks you (in any way) for a

Strona 51

way to do this is by e-mail or by uploading the files to a server and e-mailing the URL. If thenumber of changes is small (e.g., a modified Makefile)

Strona 52

3. Neither the name of the University of California, Lawrence Berkeley National Laboratory, U.S.Dept. of Energy nor the names of its contributors may

Strona 53 - TinyXML XML parser

Check for incompatible anti-virus products. Install the Sophos requirements. Install the Sophos security VM. Install the vShield Endpoint Thin Agent

Strona 54

2 Gb RAM.NotesBy default, 2 CPUs are allocated. If you have many guest VMs to protect, you can configure moreCPUs after you install the security VM.

Strona 55

Operating systemGuest VMs should run one of the following operating systems: Windows 8 (32- and 64-bit) Windows Server 2012 Windows 7 (32- and 64-bit)

Strona 56

NotesVersionSoftwareSupports Windows operatingsystems only.This is part of VMware Toolsand can be automaticallyupgraded.Must be installed on each gues

Komentarze do niniejszej Instrukcji

Brak uwag