VMware VSHIELD MANAGER 4.1 - User Manual Page 1

Browse online or download User Manual for Servers VMware VSHIELD MANAGER 4.1 -. Sophos Anti-Virus for VMware vShield startup guide

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - VMware vShield

Sophos Anti-Virus forVMware vShieldstartup guide1.1Product version:March 2014Document date:

Page 2 - Contents

NotesVersionSoftwareavailable for your security VM.This guide tells you how to setup the share.5 Check for incompatible anti-virus productsYou cannot

Page 3 - 1 About this guide

6.1 Install Enterprise ConsoleIf you already have Enterprise Console installed, go to Create a Sophos Anti-Virus share (section6.2).You should install

Page 4

Note: Unless you specified otherwise, the Sophos Anti-Virus share is accessed by the user accountset up during installation of Enterprise Console. It

Page 5 - 3 Key steps in installation

7.1 Check that you have the passwords you needWhen you run the security VM installer, you need to enter certain passwords. You should makesure that yo

Page 6 - 4.1 VMware requirements

4. Ensure that the installer download is on a Windows computer that has access to vCenter andvShield Manager over the network. The installer does not

Page 7 - 4.1.3 Guest VMs

8. The wizard displays your hosts. Select the host or hosts on which you want to install the securityVM.Note: The installer will give security VMs na

Page 8 - 4.1.4 vShield

16.At the Installation complete page, you can see whether installation of any security VMs failed.If it did, check the log for details.Tip: If you wa

Page 9 - 4.2 Sophos requirements

Check whether you need to configure resourcesUsually you do not need to configure resources for the security VM. Note that: The installer reserves mem

Page 10 - 6 Install Sophos requirements

This section tells you how to: Check whether the agent is already installed (if you are not sure). Prepare to install the agent. Install the agent.8.1

Page 11

The Thin Agent is not included in a standard VM Tools installation, so you must do one of thefollowing: Install VM Tools with the Custom option and in

Page 12 - 7 Install Sophos security VMs

Contents1 About this guide...

Page 13 - 7.3 Download the installer

4. Now start the installation procedure. The command depends on whether you areupgrading/reinstalling VM Tools or installing it for the first time.Com

Page 14 - 7.4 Install the security VMs

Note: Guest VMs are shown as UNPROTECTED on the vShield tab in the vSphere Client console.This refers only to vShield App protection, not to Sophos p

Page 15

9.2 Check that on-access scanning is workingOn-access scanning is your main method of protection against threats.Whenever you copy, move,or open a fil

Page 16 - 192.0.2.0-SSVM192.0.2.0

9.3 Troubleshoot on-access scanningIf on-access scanning is not working:1. Ensure that the security VM is in a group whose anti-virus policy specifies

Page 17

You view protected guest VMs by using a feature included in the Sophos Anti-Virus installer.1. In the same directory to which you extracted the instal

Page 18 - 8.3 Install the agent

13 What happens if a security VM detects a threatIf a security VM detects a threat on one of the guest VMs, it sends an alert to Enterprise Console.Sp

Page 19

14.2 Clean up the guest VMYou can clean up the affected guest VM by different methods, depending on how the VM has beenaffected.Some viruses leave no

Page 20 - Tools Upgrade and click OK

14.3 Clear the alert from Enterprise ConsoleWhen you are sure that the affected guest VM is clean, clear the alert from Enterprise Console:1. In Enter

Page 21

17 Appendix: vCenter administrator accountYour vCenter administrator account must have the following permissions: Datastore > Allocate space Networ

Page 22

3. Select Edit Settings > Hardware > CPUs. Then specify the number of CPUs.The recommended number of CPUs depends on the number of guest VMs o

Page 23 - 10 Maintain the security VMs

1 About this guideThis guide is intended for administrators who want to protect a network of virtual machines (VMs)against viruses and other threats.T

Page 24

Since DOC software is open-source, free software, you are free to use, modify, copy, anddistribute–perpetually and irrevocably–the DOC software source

Page 25 - 14 Deal with a threat

Douglas C. Schmidt22References1. http://www.cs.wustl.edu/~schmidt/ACE.html2. http://www.cs.wustl.edu/~schmidt/TAO.html3. http://www.dre.vanderbilt.edu

Page 26 - 14.2 Clean up the guest VM

3. Altered source versions must be plainly marked as such, and must not be misrepresented asbeing the original software.4. The name of the author may

Page 27 - 16 Uninstall security VMs

Redistribution and use in source and binary forms, with or without modification, are permittedprovided that the following conditions are met:1. Redist

Page 28

Permission is granted to anyone to use this software for any purpose, including commercialapplications, and to alter it and redistribute it freely, su

Page 29 - 20 Legal notices

THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,PROCUREMENT O

Page 30

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditionsand the following disclaimer in the documentation

Page 31

and/or sell copies of the Software, and to permit persons to whom the Software is furnished to doso, subject to the following conditions:The above cop

Page 32

documentation, and that the name of Sam Rushing not be used in advertising or publicity pertainingto distribution of the software without specific, wr

Page 33 - Info-ZIP

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESSOR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OFMERCHANTABI

Page 34

2 About Sophos Anti-Virus for VMware vShieldSophos Anti-Virus for VMware vShield is a security virtual machine (VM).You set it up as follows: You inst

Page 35

and/or sell copies of the Software, and to permit persons to whom the Software is furnished to doso, subject to the following conditions: The above co

Page 36

[However, none of that term is relevant at this point in time. All of these restrictively licencedsoftware components which he talks about have been r

Page 37 - Medusa web server

OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTYHAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.2)The 32-bit CRC compensation

Page 38

CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICTLIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAYOUT OF THE

Page 39

Per Allansson Nils Nordman Simon WilkinsonPortable OpenSSH additionally includes code from the following copyright holders, also underthe 2-term

Page 40 - Network Time Protocol

NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THISSOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.8)Portable OpenSSH conta

Page 41

IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THEPO

Page 42

OpenSSL Cryptography and SSL/TLS ToolkitThe OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL Licenseand the origina

Page 43

Original SSLeay licenseCopyright © 1995–1998 Eric Young ([email protected]) All rights reserved.This package is an SSL implementation written by Eric

Page 44

The license and distribution terms for any publically available version or derivative of this codecannot be changed. i.e. this code cannot simply be c

Page 45

How does scanning work?When a guest VM tries to access a file: A vShield Endpoint Thin Agent running on the VM notifies the Sophos security VM. The se

Page 46

1. The origin of this software must not be misrepresented; you must not claim that you wrotethe original software. If you use this software in a produ

Page 47

Software Foundation; All Rights Reserved” are retained in Python alone or in any derivativeversion prepared by Licensee.3. In the event Licensee prepa

Page 48

3. The name of the author may not be used to endorse or promote products derived from thissoftware without specific prior written permission.THIS SOFT

Page 49

THEREOF, EVEN IF THE AUTHORS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGE.THE AUTHORS AND DISTRIBUTORS SPECIFICALLY DISCLAIM ANY WARRANTIES,INCL

Page 50

If you make changes to Vim yourself, you must clearly describe in the distribution howto contact you. When the maintainer asks you (in any way) for a

Page 51

way to do this is by e-mail or by uploading the files to a server and e-mailing the URL. If thenumber of changes is small (e.g., a modified Makefile)

Page 52

3. Neither the name of the University of California, Lawrence Berkeley National Laboratory, U.S.Dept. of Energy nor the names of its contributors may

Page 53 - TinyXML XML parser

Check for incompatible anti-virus products. Install the Sophos requirements. Install the Sophos security VM. Install the vShield Endpoint Thin Agent

Page 54

2 Gb RAM.NotesBy default, 2 CPUs are allocated. If you have many guest VMs to protect, you can configure moreCPUs after you install the security VM.

Page 55

Operating systemGuest VMs should run one of the following operating systems: Windows 8 (32- and 64-bit) Windows Server 2012 Windows 7 (32- and 64-bit)

Page 56

NotesVersionSoftwareSupports Windows operatingsystems only.This is part of VMware Toolsand can be automaticallyupgraded.Must be installed on each gues

Comments to this Manuals

No comments