Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Creating VMware Service Policy and applying NSX Security Policy in NSX manager for Deep Security

    • Updated:
    • 18 May 2016
    • Product/Version:
    • Deep Security 9.5
    • Deep Security 9.6
    • Platform:
    • Amazon AMI 32-bit
    • Amazon AMI 64-bit
    • CentOS 5.4 32-bit
    • CentOS 5.4 64-bit
    • CentOS 5.5 32-bit
    • CentOS 5.5 64-bit
    • CentOS 5.6 32-bit
    • CentOS 5.6 64-bit
    • CentOS 5.7 32-bit
    • CentOS 5.7 64-bit
    • CentOS 5.8 32-bit
    • CentOS 5.8 64-bit
    • CentOS 6 32-bit
    • CentOS 6 64-bit
    • CentOS 6.1 32-bit
    • CentOS 6.1 64-bit
    • CentOS 6.2 32-bit
    • CentOS 6.2 64-bit
    • HPUX 11.x
    • IBM AIX 6.1
    • Linux - Red Hat RHEL 5 32-bit
    • Linux - Red Hat RHEL 5 64-bit
    • Linux - Red Hat RHEL 6 32-bit
    • Linux - Red Hat RHEL 6 64-bit
    • Linux - SuSE 10
    • Linux - SuSE 10 64-bit
    • Linux - SuSE 11
    • Linux - SuSE 11 64-bit
    • Oracle Linux 5 32-bit
    • Oracle Linux 5 64-bit
    • Oracle Linux 6 32-bit
    • Oracle Linux 6 64-bit
    • Oracle Solaris 11 SPARC
    • Oracle Solaris 11 x86
    • Ubuntu 10.04 64-bit
    • Ubuntu 12.04 64-bit
    • Unix - Solaris (Sun) version 10 (SunOS 5.10)
    • Unix - Solaris (Sun) version 9 (SunOS 5.9)
    • Windows 2003 Server R2
    • Windows 2003 Small Business Server
    • Windows 2003 Small Business Server R2
    • Windows 2008 Enterprise
    • Windows 2008 Enterprise 64-bit
    • Windows 2008 Essential Business Server
    • Windows 2008 Server Core
    • Windows 2008 Server Foundation
    • Windows 2008 Server R2
    • Windows 2008 Server R2 Datacenter
    • Windows 2008 Server R2 Enterprise
    • Windows 2008 Server R2 with Hyper-V(TM)
    • Windows 2008 Small Business Server
    • Windows 2008 Standard
    • Windows 2008 Standard 64-bit
    • Windows 2012 Datacenter R2
    • Windows 2012 Enterprise
    • Windows 2012 Server Essential R2
    • Windows 2012 Server Foundation R2
    • Windows 2012 Standard R2
    • Windows 8.1 32-bit
    • Windows 8.1 64-bit
    • Windows Vista 32-bit
    • Windows Vista 64-bit
    • Windows XP Professional
    • Windows XP Professional 64-bit
Summary

To manage the security of virtual machines in your data center with Deep Security, you need to setup the VMware Service Profile in NSX manager and assign NSX security policy to the NSX security group.

Details
Public

Creating a VMware Service Profile

  1. On the vSphere Web Client, go to Home > Networking & Security > Service Definitions.
  2. Select the Trend Micro Deep Security service definition and click Edit settings.
  3. Click Service Instances under Trend Micro Deep Security.
  4. Select the Trend Micro Deep Security-Global Instance service listed under Services Instances.
  5. On the Related Objects tab, click the green plus sign (+) to create a New Service Profile.

    Create New Service Profile

  6. Provide a name for the new profile.
  7. Leave the other settings at their default values and click OK. The new profile now appears in the service profile list.

    New Service Profile

  8. Select the newly created service profile and click Apply to Objects under Actions menu.

    Apply to Objects

  9. On the Apply to Network Objects window, click Distributed Virtual Port Groups and select all the port groups of the VMs you will protect.

    Distributed Virtual Port Groups

  10. Click OK to create the Service Profile.

Applying the Security Policy to NSX Security Group

  1. On your vSphere Web Client, go to Home > Networking & Security > Service Composer.
  2. Click the Security Policies tab.
  3. Select your preferred Security Policy and click the Apply Security Policy icon.
  4. In the Apply Policy to Security Groups window, select the Security Group containing the VMs you want to protect and click OK.

    Apply Policy to Security Groups

The NSX Security Policy is now applied to the VMs in the NSX Security Group.
You can now activate the VMs in the imported vCenter using your Deep Security Manager console. For more details on using Deep Security in protecting your VMs, refer to the Deep Security User's Guide.

Premium
Internal
Rating:
Category:
Configure
Solution Id:
1104426
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.