How to manage virtual Machines

Security for Virtualized Environments (SVE) is the first comprehensive security solution for virtualized datacenters. SVE protects not only Windows servers and end-user systems, but also Linux and Solaris systems. Integrated with VMware vShield and VMware vCenter, its unique architecture also allows it to defend systems running on any system virtualization technology.

To view information about virtual machines and manage their security, point to Computers and select Inventory. Here you can see the objects managed by vCenter Server.

Select one of the two available views from the menu on the left side of the page:

VMs and Templates - displays the virtual machines and templates, grouped by datacenter.

Hosts and Clusters - offers a hierarchical view of vCenter Server objects, including folders, datacenters, hosts, clusters, resource pools.

To view virtual machines in the table, you can select individual machines or entire hosts, clusters or folders from the tree menu. The following information is displayed for each machine:

  •   Name

  •   Guest operating system

  •   Active security policies

  •   Current state:

The machine is powered on.

The machine is powered off.

  • Protection status:

The machine is protected by Bitdefender.

The machine is not protected by Bitdefender.

Menus above the table allow you to easily manage the security of the virtual machines:

  • Task - perform a quick security task.

Important security tasks can be performed on the managed virtual machines from the Inventory page. To perform a quick security task on selected virtual machines, follow these steps:

  • Point to Computers and select Inventory.

  • Select from the menu on the left side of the page the virtual machines on which you want to perform the task. The machines will appear in the table.

  • From the Task menu located above the table, select one of the following tasks:

Manual Scan. Configure and initiate an instant malware scan.

A new page will appear where you can configure the scan settings. If you have created manual scans in the past, you can use them as templates for the new scan.

 Memory Scan. Initiate an instant scan of the programs running in the memory of the virtual machines.

  •   Policy - create a security policy.

  •   Report - create a new security status report.

Security for Virtualized Environments allows you to create and view centralized reports on the security status of the managed virtual machines. The reports can be used for multiple purposes, such as:

  • Monitoring and ensuring compliance with the organization's security policies.
  • Checking and assessing the security status.
  • Identifying security issues, threats and vulnerabilities.
  • Monitoring security incidents and malware activity.

Several report types are available so that you can easily get the information you need. The information is presented as easy-to-read pie charts, tables and graphics, allowing you to quickly check the security status and identify security issues.

All generated reports are available in the console for a default period of 30 days, and can be exported as comma-separated values (CSV) or portable document format (PDF).


Rate this article:

Submit