Network Map I would like to achieve
Modem"issues wan ip from dhcp"-->WAN vSwitch-->Sophos-->LAN vSwitch-->16 port switch-->Clients
This thread was automatically locked due to age.
Network Map I would like to achieve
Modem"issues wan ip from dhcp"-->WAN vSwitch-->Sophos-->LAN vSwitch-->16 port switch-->Clients
Hi Jordan
Yes, you can as long as you have enough memory, you need at least 1Gb memory for the VM to start.
I use it for test et demo.
You may need to create an internal vswitch with a vnetworkadapter on the host computer so you can access to your Sophos.
PS>new-vmswitch -name SophosInternal -AllowManagementOS $false
PS> Add-VMNetworkAdapter -ManagementOS -SwitchName SophosInternal -name SophosLan
Jordan,
Yes you can.
Now, this does not protect the host server, the server OS, nor the hypervisor. This means that there is always a way that malware can still get in even if you have Sophos Home installed in the VM.
To protect the server, its OS and the virtualization environment as well as all the data traveling in and out of it, you can purchase Sophos Server Protection. If you are using VMWare, you can also use VMWare NSX. Other options also exist from a variety of vendors.
Hi
In fact you can protect the Hyperviseur (the Host OS)
you just need to create 2 vswitch :
An external for the Firewall
and an internal one for the lan network with an adapter for the sophos firewall and an other for the host
So in this setup you can protect the server with the sophos Firewall
And for host setup you can also test Virtualization Security with Hyper-V or WMWare www.sophos.com/.../virtualization-security.aspx
OLIVIERMIOSSEC said:Hi
In fact you can protect the Hyperviseur (the Host OS)you just need to create 2 vswitch :
An external for the Firewall
and an internal one for the lan network with an adapter for the sophos firewall and an other for the host
So in this setup you can protect the server with the sophos Firewall
Oliver,
All you are doing with this setup is scanning the communication flowing through the virtual switch ports. The ports you identified are is not the only ports on the server. This Does Not protect the host, the hypervisor, or any of the VMs inside from USB, Optical, Printer, Wi-Fi, or KVM connections to the host itself. I can walk right up to the physical host, plug an infected CD/DVD, Keyboard, Mouse, Printer, USB, computer, or other peripheral into the host and infect it directly.
OLIVIERMIOSSEC said:And for host setup you can also test Virtualization Security with Hyper-V or WMWare www.sophos.com/.../virtualization-security.aspx
I read the features of Sophos Virtualization Security. The features clearly state that "Sophos for Virtual Environments comprises of two components, the Security Virtual Machine and a thin agent on the Guest Virtual Machine". In other words, this is a virtual machine protecting other virtual machines. It can also protect external physical machines.
This DOES NOT protect the physical hosts or hypervisors. To protect the Host, the Host OS, and the Hypervisor, you would have to use Sophos Server Protection.