1 / 14

Search the Invisible Web: 20 Free Resources

Search the Invisible Web: 20 Free Resources

pooja321
Télécharger la présentation

Search the Invisible Web: 20 Free Resources

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Search the invisible web 20 free resources

  2. Introduction - Desktop virtualization is a transformative platform technology that can deliver cost-effective, manageable network and desktop access to workers with diverse computing needs. However, with security threats becoming more sophisticated, more frequent, more targeted, and potentially more profitable to those who seek to inflict damage, IT administrators must increase their vigilance and find security solutions architected for the virtual desktop environment. Solutions such as log analysis, host-based intrusion-prevention system (HIPS) technology, firewalls, and antivirus software need to evolve and adapt to the needs of desktop virtualization.

  3. Problems with Standard Antivirus Protection - The typical top-down virus scanning model involves agents executing on every desktop performing antivirus scanning and signature file updates, with access to an auto-update server. During these operations, it is not uncommon for system resource usage to spike or become overly committed. Performance in the desktop environment is severely impacted by these “antivirus storms.” With horizon view, you can examine the system bottleneck during an antivirus storm, when virus scanners are running at the same time as users are accessing virtual desktops. Antivirus storms can cause 100 percent saturation in shared compute (CPU) and SAN/NAS (storage I/O) environments. In addition, the memory footprint is significant when antivirus software is installed on each virtual machine. Traditional antivirus agents are resource-intensive and not optimized for highly utilized, cloud-computing environments.

  4. Top-down model -

  5. Vmware vshield endpoint architecture in brief - Instead of installing the antivirus and antimalware software on each virtual machine, you install it only on the single security virtual machine (appliance) assigned to the vsphere host. Each virtual machine to be protected requires only a small-footprint vshield endpoint driver, which is part of the vmware tools installation for the virtual machine. The install vmware tools on the guest virtual machine section of the vshield installation and upgrade guide. Vmware vshield endpoint is integrated with vsphere and protects virtual machines against viruses. Administrators can centrally manage vmware vshield endpoint through the included vshield manager console, which integrates with vmware vcenter™ server for unified security management in the virtual datacenter.

  6. Vmware vshield endpoint architecture -

  7. Required workaround for some legacy antivirus software - Vmware recommends using quickprep to generate unique sids for linked clone desktops because the personalization process is faster. However, with legacy antivirus software, a few complicating factors may require action in addition to using quickprep. Some antivirus software products need a unique local SID if they do not leverage vmware vshield endpoint. These products use the local SID to generate a globally unique identifier (GUID) for tracking during the scanning process. If you decide to use the recompose approach, you must make sure that: • the view composer component is installed on the virtual machine. The view agent needs to use view composer for the recompose. • The active directory controllers are reachable from all of the desktops.

  8. Quickprep settings and a power-off script -

  9. Background information on thinapp isolation modes and the role of the sandbox - The isolation mode of a thinapp package determines how much is written to the sandbox, and how much is written to the host desktop. Vmware thinapp sets up the default isolation mode for the virtual application by restricting some desktop directories from writes. During setup capture, you can set the isolation mode of directories that thinapp has not already set. You can choose from two directory isolation modes, as in the following picture.

  10. Isolation window during thinapp setup capture -

  11. Isolate the compromised computers - Once the compromised computers have been identified, it is important that, whenever possible, they are taken off the network while being cleaned. One of the main classes of threats—worms—spread by using various techniques to “hop” from one computer to another through the network. In this sense, an often-used term for threats —viruses—can be more illustrative.2 as a biological virus spreads from one host to another using a variety of vectors of infection, such as sneezing or mosquito bites, so too does a computer worm spread from one computer to another over the network. This is why it is so critical to remove a computer from the network once you discover it has been compromised—it is highly likely that the threat in question could infect another computer as you attempt to remove the threat from the computer.

  12. Isolate the compromised computers -

  13. Stop the viral process - Antivirus scan - this is perhaps the easiest option. If you have symantec antivirus 10 or symantec endpoint protection installed on the computer, it should be able to stop any malicious processes while it scans the computer. End the task - in some cases you can open the task manager and end the malicious process. Note that some threats may prevent you from doing this, in which case you will need to try one of the other options. Safe mode - restarting the computer in safe mode will prevent the vast majority of threats from loading as the operating system loads. You can then proceed with manually removing the malicious files or running an antivirus scan. When you are finished removing the threat, ensure that you restart the computer back into normal mode.

  14. Thank you for watching this site Click here to install norton setup http://norton.com-setup-key.support

More Related