5nine Cloud Security For Hyper-V

Transcription

5nine Cloud Security for Hyper-VFree EditionVersion 4.0February 201411

5nine Cloud Security 4.0 Free Edition Getting Started GuideTable of Contents5nine Cloud Security for Hyper-V Free Edition .5Summary .5System Requirements .5Permissions .5Features and Benefits .6Installation .7vFirewall Silent Installation .185nine Security Operations .19Adding and RemovingH.19Setting v-Firewall Rules .19Setting Virtual Firewall .27Antivirus .285nine Security Configuration File and PowerShell API.385nine Security and Compliance Scanner for Hyper-V.44Summary .44Installation .44Interface .47Operation .49Checking Scan Results.52VMs Firewalling .52Intrusion Detection .53Performance .54Antivirus Protection .55Overall Report .56 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server2

5nine Cloud Security 4.0 Free Edition Getting Started Guide 2014 5nine Software.All rights reserved. All trademarks are the property of their respective owners.No part of this publication may be reproduced, transmitted, transcribed, stored in a retrievalsystem, or translated into any language in any form by any means, without written permissionfrom 5nine Software Inc (5nine). The information contained in this document represents thecurrent view of 5nine on the issue discussed as of the date of publication and is subject tochange without notice. 5nine shall not be liable for technical or editorial errors or omissionscontained herein. 5nine makes no warranties, express or implied, in this document. 5nine mayhave patents, patent applications, trademark, copyright, or other intellectual property rightscovering the subject matter of this document. All other trademarks mentioned herein are theproperty of their respective owners. Except as expressly provided in any written licenseagreement from 5nine, the furnishing of this document does not give you any license to thesepatents, trademarks, copyrights, or other intellectual property. 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server3

5nine Cloud Security 4.0 Free Edition Getting Started GuideContacting 5nine SoftwareWe are always welcome your feedback on the product as well as your user experience. In caseyou would like to help us improve the product, please contact us at info@5nine.com.Customer SupportPlease contact techsupport@5nine.com if you have encountered any issue using 5nine CloudSecurity for Hyper-V Free Edition. 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server4

5nine Cloud Security 4.0 Free Edition Getting Started Guide5nine Cloud Security for Hyper-V Free EditionSummary5nine Cloud Security Free Edition is a Virtual Infrastructure monitoring tool with the ability todefine network traffic rules for Hyper-V Virtual Machines and harden your Virtual Infrastructurefrom a security perspective; both programmatically – using a PowerShell API and via theManagement Console. Security allows to review network traffic logs for each of the monitoredVirtual machines and generates related reports.5nine Cloud Security Free Edition is designed for the monitoring and control of the trafficbetween Hyper-V Virtual machines and between Virtual machines and external networks(Virtual Firewall). It also includes an Intrusion Detection System (IDS) as well as antivirus.5nine Cloud Security Free Edition is designed for evaluation purposes as it includes lessfunctionality when compared to the capabilities of the Datacenter Edition, which supports thefull functionality of Security. For instance IDS is not available in the Free Edition and the VirtualFirewall settings offer less flexibility.5nine Cloud Security Free Edition also includes 5nine Security and Compliance Scanner forHyper-V. The description for this functionality is given in the “ 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server5

5nine Cloud Security 4.0 Free Edition Getting Started Guide5nine Security and Compliance Scannerfor Hyper-V” section.System Requirements OS: Host: Windows Server 2012 or Windows 8 with enabled Hyper-V; Guest VM: any .NET 4.0; SQL 2008 Express edition on Management server/VM (in case DB logging is required); MS PowerShell; IIS.PermissionsFor both domain and workgroup configurations: TCP port 8788 should be opened on managed host. 5nine Cloud Security should be installed on each Hyper-V host monitored andprotected (in case several hosts are managed from one Management console). Same with the 5nine Security service for SC VMM 5nine Security plugins. WMI access 33(WS.10).aspx ) SQL database or file access (read/write).Allow to control Hyper-V(http://blogs.msdn.com/b/virtual pc to-control-hyper-v.aspx) User should be a local administrator. If the host is managed remotely from the centralized management console, thereshould also be an account with similar permissions used in Server Settings. The bestpractice recommendation is to use the same account for the service on the managedhost and in Server Settings in the management console.For workgroup/mixed domain environments: Account for workgroup environment should also have similar permissions for currentmanaged hosts. Managed and management servers should be marked as trusted hosts in the casewhere the workgroup environment is used on several domains environments. 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server6

5nine Cloud Security 4.0 Free Edition Getting Started GuideFeatures and BenefitsSimple installation. 5nine Cloud Security Free Edition has one component that is required tobe installed – intuitive Management interface (DLL) that supports PowerShell API (describedbelow) to set and change traffic rules. Management API has a simple-to-use GUI applicationthat allows to set traffic rules between the virtual machines and external networks.Management interface can be installed either on a server or a Virtual machine, and allows theSystem Administrator to access rules, logs and reports:InstallationTo setup 5nine Cloud Security Free Edition (DLL and Management GUI application) –administrator needs to run setup.exe application from the downloaded 5nine Cloud SecurityFree Edition archive on the server that matches 5nine Cloud Security Free Edition section.”section.System RequirementsNo license is required for the Free Edition. 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server7

5nine Cloud Security 4.0 Free Edition Getting Started GuideThen the 5nine Cloud Security Free Edition Setup Wizard will be opened:Read the SQL server information (you have to make sure it is available on your host for 5nineCloud Security Free Edition successful installation) and click Next: 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server8

5nine Cloud Security 4.0 Free Edition Getting Started GuideChoose the path where 5nine Cloud Security Free Edition is to be installed and the users whowill be able to work with the product:You can check the physical space available on your drives and the space required for theinstallation by pressing the Disc Cost button on the window shown above:The 5nine Cloud Security Free Edition Information window will then appear: 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server9

5nine Cloud Security 4.0 Free Edition Getting Started GuideSelect MS SQL data source:vFirewall remote installation is one step of the installation process. Installing vFW on somemachine locally you can define servers on which you want to install vFW remotely. After thedata source selection page you will see the page where you can select – include remote setupstem to setup process or not.Warnings!1. When using the remote installation, make sure, that all the servers have the same usercredentials as the local server. Credentials will be requested during further installationprocess only once. It is currently impossible to enter different user credentials for theremote servers and installation will fail, if there is a credentials mismatch.2. Be sure, that the similar SQL data sources are used on all the servers. You will berequested to select the MS SQL data source only once (if the Existing MS SQL Serverinstance option has been selected) as described above, and you will not be able to selecta different one for the other servers. This will cause a serious problem. The installationwill be accomplished on all the servers, but the product may not function properly.If remote setup checkbox is cleared setup goes with a common scenario: 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server10

5nine Cloud Security 4.0 Free Edition Getting Started GuideSpecify if a remote installation step is required in the setup process:If the checkbox is checked you can select servers for the remote installation. Remoteinstallation server selection dialog goes after user credentials dialog. That dialog is similar tomonitored servers discovery dialog.For remote management Security uses WinRM service and it should be available. For caseslisted below trusted hosts should be configured:-Client and remote servers are in different domains and there is no trust between thetwo domains;Client or remote server is located in a domain and the other one is located in aworkgroup;Both client and remote server are located in a workgroup.Trusted hosts should be configured on both client and remote server sides. It can be done withthe command below:Set-Item wsman: localhost\client\trustedhosts -Value "{CompureName}"Or manuallyconfigured with gpedit.msc console:gpedit.msc console - Local Computer Policy/Computer Configuration/AdministrativeTemplates/Windows Components/Windows Remote Management (WinRM)/WinRM Client - Trusted HostsTo add all machines from workgroup to trusted hosts “{local}” name can be used. Typicalsymptom of such a problem is an error “WinRM cannot process the request” in a ManagementConsole log. This message may also appear when the system can’t resolve remote host’s path(it is wrong or DNS server is inaccessible for example) or wrong credentials are used.5nine Cloud Security Free Edition uses system security log events for logging denied packets.By default Windows Filtering Platform filtering audit is disabled to prevent the system logoverflow and avoid storing of unnecessary data. WFP filtering audit can be enabled withfollowing command:auditpol /set /subcategory:"Filtering Platform Packet Drop" /success:enable /failure:enable 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server11

5nine Cloud Security 4.0 Free Edition Getting Started GuideWFP filtering can be enabled from 5nine Cloud Security Free Edition setup. “Enable WindowsFiltering Platform audit” checkbox exists on a “Installation settings” page. If that checkbox ischecked the command listed above would be executed during the installation process:You can manually disable WFP with following command:auditpol /set /subcategory:"Filtering Platform Packet Drop" /success:disable /failure:disableIt will be better to disable WFP filtering audit if it is not used or after 5nine Cloud Security FreeEdition uninstallation.Confirm installation: 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server12

5nine Cloud Security 4.0 Free Edition Getting Started GuideConfirm the 3f3b34c.msi installation and choose the necessary settings if asked (it depends onyour server’s OS security settings):Set the SQL Server instance that will be used and connect to it by entering user name andpassword. There could be either SQL Server Authentication or Windows Authentication usedwhile gaining access to your database. To find out which authentication is used and get theuser name and password contact your database administrator. The installer would skip thisstep if MS SQL Server Compact was previously selected as a data source.You can test the database connection by pressing the Test connection button. In the case ofsuccessful connection the following type of message will appear: 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server13

5nine Cloud Security 4.0 Free Edition Getting Started GuideSet account for Security Management service as required:If you earlier chose the option Include Remote installation step in setup process asdescribed above, you would be advised to choose the remote host(s) for the 5nine CloudSecurity Free Edition installation:You may also add servers to the list individually by pressing the Add button and entering theserver name manually in the dialog window above or let 5nine Cloud Security Free Editionsearch and add servers automatically by pressing the AD Discovery button,or search for servers by IP range/subnet mask, which can be set in the window below called outby pressing the IP Discovery button: 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server14

5nine Cloud Security 4.0 Free Edition Getting Started GuideInstall the product on the previously selected servers in the next dialog:There will be table with servers and installation status. Possible statuses include:-Idle. Idle for installation start. Waiting for the start button to be pressed.Processing. Remote installation in progress.Complete. Remote installation completed.Failed. Remote installation failed. Additional information about the error will be in thedescription column.Remote installation will be processed in parallel for each selected server. MSI file and selectedlicense file will be copied to drive C: on remote machine (user should have permissions to writefile on target machine). After the files are copied, installation will be started in silent mode withparameters selected for local installation. After installation is completed the temporary files willbe removed and the remote machine will be rebooted.For using the remote installation feature a user should pass msi file name unchanged –vFWsetup.msi.After all installations are completed (successfully or failed) a user can close the dialog and goforward with the installation. After the remote installation step the next installation step is themonitored servers’ selection step. The local machine is included into the list by default. Alsoservers from previous installation configuration (if it was saved) will also be included into thelist.Then press the Start button to start the remote installation, watch the process and results andpress the Close button when the remote installation process is complete: 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server15

5nine Cloud Security 4.0 Free Edition Getting Started GuideAdd servers for monitoring (press the Add button in the window below to add the servers):Select the servers from the list (separate window Select Hyper-V Servers shown below will beopened) and then set the credentials in the dialog window. Contact your network administratorto get the credentials.You can select one of two ways of authentication:1) Use default credentials. Current user credentials will be used.2) Use custom credentials. You can define credentials that will be used to managevFirewall on the target server.Those credentials will be used only for authentication to retrieve virtual machines list andmanage vFirewall with Powershell API. It will not affect user account used by vFirewall serviceon target machine. 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server16

5nine Cloud Security 4.0 Free Edition Getting Started GuideYou may change properties of the already added server at any time by pressing the Editbutton in the Servers for monitoring window shown above.You can also change server credentials and a default monitoring state in the Server Propertiesdialog further (please, refer to “Changing Host Settings” subsection of “5nine SecurityOperations” section).You may also add servers to the list individually by pressing the Add button and entering theserver’s name manually in the dialog window below: 2009-2014 5nine Software, Inc. All rights reserved.Security & Management Solutions for Hyper-V and Windows Server17

5nine Cloud Security 4.0 Free Edition Getting Started GuideOr let 5nine Cloud Security Free Edition search and add servers automatically by pressing theAD Discovery button, or search for servers by IP range/subnet mask, which can be set in thewindow below called out by pressing

5nine Cloud Security Free Edition is designed for the monitoring and control of the traffic between Hyper-V Virtual machines and between Virtual machines and external networks (Virtual Firewall). It also includes