Search the Invisible Web: 20 Free Resources - PowerPoint PPT Presentation

About This Presentation
Title:

Search the Invisible Web: 20 Free Resources

Description:

Search the Invisible Web: 20 Free Resources – PowerPoint PPT presentation

Number of Views:18
Slides: 15
Provided by: pooja321
Category:

less

Transcript and Presenter's Notes

Title: Search the Invisible Web: 20 Free Resources


1
Search the invisible web 20 free resources
2
Introduction -
  • Desktop virtualization is a transformative
    platform technology that can deliver
    cost-effective, manageable network and desktop
    access to workers with diverse computing needs.
    However, with security threats becoming more
    sophisticated, more frequent, more targeted, and
    potentially more profitable to those who seek to
    inflict damage, IT administrators must increase
    their vigilance and find security solutions
    architected for the virtual desktop environment.
    Solutions such as log analysis, host-based
    intrusion-prevention system (HIPS) technology,
    firewalls, and antivirus software need to evolve
    and adapt to the needs of desktop virtualization.

3
Problems with Standard Antivirus Protection -
  • The typical top-down virus scanning model
    involves agents executing on every desktop
    performing antivirus scanning and signature file
    updates, with access to an auto-update server.
    During these operations, it is not uncommon for
    system resource usage to spike or become overly
    committed. Performance in the desktop environment
    is severely impacted by these antivirus storms.
    With horizon view, you can examine the system
    bottleneck during an antivirus storm, when virus
    scanners are running at the same time as users
    are accessing virtual desktops. Antivirus storms
    can cause 100 percent saturation in shared
    compute (CPU) and SAN/NAS (storage I/O)
    environments. In addition, the memory footprint
    is significant when antivirus software is
    installed on each virtual machine. Traditional
    antivirus agents are resource-intensive and not
    optimized for highly utilized, cloud-computing
    environments.

4
Top-down model -
5
Vmware vshield endpoint architecture in brief -
  • Instead of installing the antivirus and
    antimalware software on each virtual machine, you
    install it only on the single security virtual
    machine (appliance) assigned to the vsphere host.
    Each virtual machine to be protected requires
    only a small-footprint vshield endpoint driver,
    which is part of the vmware tools installation
    for the virtual machine. The install vmware tools
    on the guest virtual machine section of the
    vshield installation and upgrade guide. Vmware
    vshield endpoint is integrated with vsphere and
    protects virtual machines against viruses.
    Administrators can centrally manage vmware
    vshield endpoint through the included vshield
    manager console, which integrates with vmware
    vcenter server for unified security management
    in the virtual datacenter.

6
Vmware vshield endpoint architecture -
7
Required workaround for some legacy antivirus
software -
  • Vmware recommends using quickprep to generate
    unique sids for linked clone desktops because the
    personalization process is faster. However, with
    legacy antivirus software, a few complicating
    factors may require action in addition to using
    quickprep. Some antivirus software products need
    a unique local SID if they do not leverage vmware
    vshield endpoint. These products use the local
    SID to generate a globally unique identifier
    (GUID) for tracking during the scanning process.
  • If you decide to use the recompose approach, you
    must make sure that
  • the view composer component is installed on the
    virtual machine. The view agent needs to use view
    composer for the recompose.
  • The active directory controllers are reachable
    from all of the desktops.

8
Quickprep settings and a power-off script -
9
Background information on thinapp isolation modes
and the role of the sandbox -
  • The isolation mode of a thinapp package
    determines how much is written to the sandbox,
    and how much is written to the host desktop.
    Vmware thinapp sets up the default isolation mode
    for the virtual application by restricting some
    desktop directories from writes. During setup
    capture, you can set the isolation mode of
    directories that thinapp has not already set. You
    can choose from two directory isolation modes, as
    in the following picture.

10
Isolation window during thinapp setup capture -
11
Isolate the compromised computers -
  • Once the compromised computers have been
    identified, it is important that, whenever
    possible, they are taken off the network while
    being cleaned. One of the main classes of
    threatswormsspread by using various techniques
    to hop from one computer to another through the
    network. In this sense, an often-used term for
    threats virusescan be more illustrative.2 as a
    biological virus spreads from one host to another
    using a variety of vectors of infection, such as
    sneezing or mosquito bites, so too does a
    computer worm spread from one computer to another
    over the network. This is why it is so critical
    to remove a computer from the network once you
    discover it has been compromisedit is highly
    likely that the threat in question could infect
    another computer as you attempt to remove the
    threat from the computer.

12
Isolate the compromised computers -
13
Stop the viral process -
  • Antivirus scan - this is perhaps the easiest
    option. If you have symantec antivirus 10 or
    symantec endpoint protection installed on the
    computer, it should be able to stop any malicious
    processes while it scans the computer.
  • End the task - in some cases you can open the
    task manager and end the malicious process. Note
    that some threats may prevent you from doing
    this, in which case you will need to try one of
    the other options.
  • Safe mode - restarting the computer in safe mode
    will prevent the vast majority of threats from
    loading as the operating system loads. You can
    then proceed with manually removing the malicious
    files or running an antivirus scan. When you are
    finished removing the threat, ensure that you
    restart the computer back into normal mode.

14
Thank you for watching this site
Click here to install norton setup
http//norton.com-setup-key.support
Write a Comment
User Comments (0)
About PowerShow.com