Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Deployment recommendations for Deep Security on Microsoft Hyper-V

    • Updated:
    • 13 Jun 2014
    • Product/Version:
    • Deep Security 8.0
    • Deep Security 9.0
    • Platform:
    • N/A N/A
Summary
Follow these recommendations when deploying Deep Security on Microsoft Hyper-V, to prevent performance issues caused by duplicate inspection of network traffic.
Details
Public
Trend Micro recommends the following deployment configuration when deploying Deep Security on Microsoft Hyper-V:
Deep Security Agent should be installed within each guest operating system in each virtual machine (VM). This provides the maximum amount of context and security for each guest. Recommendation Scan can be used to determine the applicable set of Intrusion Prevention, Integrity Monitoring and Log Inspection rules required per guest. Anti-Malware, Web Reputation and Firewall policies can also be individually configured per guest using the Agent deployment.
If protection of the Parent Partition (also know as the Management Operating System) is desired, additional steps have to be taken to ensure that network traffic is not inspected twice. It is recommended to choose one of the following options:
  • Do not utilize Intrusion Prevention in the parent partition.
  • Utilize Intrusion Prevention in the parent partition, but utilize the Firewall policy assigned to the Agent in the parent partition to bypass incoming and outgoing traffic for the IPs of the VMs being hosted. This can be accomplished through the use of two Bypass rules - one for incoming and one for outgoing - that operate on the destination IP range of guests for incoming traffic, and the source IP range of guests for outgoing traffic. The use of Bypass skips the Intrusion Prevention rule processing, thus preventing duplicate inspection of the traffic in both the parent partition and guest virtual machine.
It is also advised to use Bypass rules, like the second option above, if using a Firewall policy on the parent partition.
Premium
Internal
Rating:
Category:
Troubleshoot; Deploy
Solution Id:
1103857
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.