You are on page 1of 6

Deep Security 7.

5 Proof of Concept Requirements

V1.2

Page 1

Contents
Contents ........................................................................................................................................................ 2 VMware Product Requirements: ................................................................................................................... 3 VMware Product Requirements for Agentless Anti-Malware and Network Protection: .............................. 3 Guest Virtual Machine Requirements for Anti-Malware Protection: ........................................................... 3 Operating System: ......................................................................................................................................... 3 SCSI Driver: .................................................................................................................................................... 3 Guest Virtual Machine Requirements for Agentless Network Protection: ................................................... 3 VMware Product Requirements for Agentless Network Protection Only: ................................................... 3 VMware Product Requirements for Agent based Protection: ...................................................................... 3 Deep Security Product Requirements: .......................................................................................................... 4 Deep Security Manager 7.5 ........................................................................................................................... 4 Deep Security Virtual Appliance 7.5 .............................................................................................................. 4 Deep Security Filter Driver 7.0....................................................................................................................... 4 The Deep Security Agent ............................................................................................................................... 5 Supported operating systems: ...................................................................................................................... 5 Installation Packages ..................................................................................................................................... 5 License key..................................................................................................................................................... 5 IP addresses, Hostnames and Authentication Credentials............................................................................ 5

V1.2

Page 2

VMware Product Requirements:


VMware Product Requirements for Agentless Anti-Malware and Network Protection:
The following VMware products are required to support Agentless Anti-Malware and Network Protection of Virtual Machines: VMware vSphere 4.1 (ESX/ESXi 4.1) CPU: 64-bit, Intel-VT present and enabled in BIOS, AMD Supported vSwitch: standard vSwitch or 3rd party vSwitch VMware vCenter 4.1 VMware vShield Manager VMware vShield Endpoint 1.0 (including VMware Endpoint Thin Agents for each virtual machine)

Guest Virtual Machine Requirements for Anti-Malware Protection:


The VMware Endpoint Thin Agent supports. (note: the VMware Endpoint Thin Agent will be included in the VMware tools 4.1 U1, however currently it is a separate install). Operating System: o Windows 2003 o 2008/R2 o Windows XP (32-bit and 64-bit) o Windows 7 (32-bit and 64-bit) (For the latest list of supported guest platforms, see your VMware documentation.) SCSI Driver: o LSI Logic Parallel (Default on Windows 2003) o LSI Logic SAS (Default on Windows 2008, 7) o LSI Logic Para Virtual (new driver from VMware)

Guest Virtual Machine Requirements for Agentless Network Protection:


There are no virtual machine requirements for Agentless Network Protection.

VMware Product Requirements for Agentless Network Protection Only:


If only agentless Firewall and DPI is required the following VMware software is needed: VMware vSphere 4.0 or above (ESX/ESXi 4.0 or above) VMware vCenter 4.0 or above

VMware Product Requirements for Agent based Protection:


There are no specific VMware requirements for agent based protection as the agent is installed in the Virtual Image in the same manner as it would be installed on a real machine. For co-ordinated Security, where both Agent protected and Agentless protected images run on the same hypervisor, the VMware product requirements are the same as those for Agentless protection. (See Appendix A of the Deep Security 7.5 Installation guide for more details)

V1.2

Page 3

Deep Security Product Requirements:


Deep Security Virtual Appliance is a Security Virtual Machine which provides agentless protection for virtual machines running on the same hypervisor. The Deep Security Virtual Appliance uses the VMware Endpoint API to apply the Anti-Malware protection to the virtual machines, and uses the Deep Security Filter Driver to control network traffic in and out of the guest virtual machines. The Deep Security Agent, is security software which installs on real physical machines as well as in virtual machines. It provides the same network protection as the DSVA does for virtual images, plus additional security functionality not available from the VMwares introspective APIs. The Following Deep Security Components are needed:

Deep Security Manager 7.5


Operating System: o Microsoft Windows Server 2008 (32-bit or 64-bit) or o Microsoft Windows 2003 Server SP2 (32-bit or 64-bit) Memory: o 4GB Disk Space: o 1.5GB (5GB recommended) Database (Recommended but Optional): o Microsoft SQL Server 2008 SP1 or o Microsoft SQL Server 2005 SP2 or o Oracle 11g or o Oracle 10g Web Browser: Mozilla Firefox 3+ (cookies enabled), Internet Explorer 7+ (cookies enabled)

Deep Security Virtual Appliance 7.5


Memory: o 1GB Disk Space: o 20GB Operating System: o ESX/ESXi 4.0 and above

Deep Security Filter Driver 7.0


Operating System: o ESX/ESXi 4.0 and above

V1.2

Page 4

The Deep Security Agent Supported operating systems:


Windows 7 (32-bit and 64-bit) Windows 2008 (32-bit and 64-bit) Windows 2008 R2 (64-bit) Windows Vista (32-bit and 64-bit) Windows 2003 SP2 (32-bit and 64-bit) Windows XP (32-bit and 64-bit) Windows 2000 (32-bit) Solaris 8, 9 and 10, (64-bit Sparc) Solaris 10 (64-bit x86) Red Hat 4 (32-bit and 64-bit) Red Hat 5 (32-bit and 64-bit) SUSE 10 (32-bit and 64-bit) SUSE 11 (32-bit and 64-bit) AIX 5.3, 6.1 (The AIX Agents only support Integrity Monitoring and Log Inspection.) HP-UX 11i v2 (11.23), 11i v3 (11.31) (The HP-UX Agents only support Integrity Monitoring and Log Inspection.) Memory: o 128MB Disk Space: o 100MB (200MB recommended, primarily for logging)

Installation Packages
The install packages are available from the Trend Micro Download Center: http://downloadcenter.trendmicro.com.

License key
A license key will be required. This may be obtained from your Sales Representative.

IP addresses, Hostnames and Authentication Credentials


The Installation can be done either using hostnames or IP addresses. If you are using hostnames please ensure that the corresponding DNS records exist. The Deep Security Manager needs to have access to the vCenter Server, to install the Deep Security Filter Driver and Deep Security Virtual Appliance, to synchronize and listen to ongoing events, such as new images being added, or images being vmotioned. Deep Security also needs to have access to the vShield Manager in order to register the Deep Security Virtual Appliance as security virtual machine. As such the username and password of a vCenter Server and vShield Manager need to be provided to the Deep Security Manager. The Following are the IP addresses and hostname entries that are required for the Proof of Concept. Input DHCP for the IP Address if you are using DHCP.

V1.2

Page 5

Component vCenter Server vSphere Host 1 vSphere Host 2 vShield Manager Deep Security Manager Deep Security Virtual Appliance for Host 1 Deep Security Virtual Appliance for Host 2 Guest VM1 Guest VM2 Guest VM3 Guest VM4

IP Address

Hostname

Authentication Credentials Username: Password: Username: Password: Username: Password: Username: admin (default) Password: default (default) Username: MasterAdmin (default) Password: (set at time of install) Username: DSVA(default) Password: DSVA(default) Username: DSVA(default) Password: DSVA(default)

Other info required: DNS Server(s) IP: Gateway IP: Domain name:

V1.2

Page 6

You might also like