EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response

Total Page:16

File Type:pdf, Size:1020Kb

EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response The more data sources you have in your security incident and event management (SIEM), the better equipped you are to detect attacks. And the more security orchestration and automation response (SOAR) connections you have between your SIEM and your IT and security systems the quicker LIMITLESS SCALE WITH FLAT, PREDICTABLE PRICING you can respond. Every log and every security event matters. Not retaining your log data can create security blinds spots that prevent Exabeam Security Management Platform (SMP) integrates compliance or leave your organization vulnerable to attack. with over 300 IT and security vendors to help your analysts Exabeam is designed to scale without penalizing you for the work smarter - providing inbound integrations with data amount of data you ingest. Our flat pricing model is based sources from vendors to easily allow you to ingest as on the number of users and devices in your environment, much data as possible; and SOAR integrations with not data volume. 3rd party vendors to help you automate and orchestrate your security response. CENTRALIZED SECURITY AUTOMATION AND ORCHESTRATION WITH 3RD PARTY INTEGRATIONS EXTENSIVE DATA SOURCES Exabeam integrates with over 65 third party IT and Exabeam ingests data from approximately 300 different IT security vendors. These integrations help your analysts and security vendors to provide security analysts with the full to gather evidence and attach them as artifacts to scope of events. Exabeam ingest logs from various sources, incidents or quarantine affected users and assets including VPN, endpoint, network, web, database, CASB, and until incidents are mitigated. cloud solutions. After ingesting the raw logs, Exabeam then parses and enriches them with contextual information to provide security analysts with the information they need to detect and investigate incidents. List of Integrations as of November 2018 INBOUND DATA SOURCES FOR LOG INGESTION SERVICE INTEGRATIONS FOR INCIDENT RESPONDER • Authentication • Asset Discovery • Cloud Access Security Broker (CASB) • Cloud Infrastructure and Applications • Cloud Infrastructure & Applications • Endpoint Detection and Response (EDR) • Data Loss Prevention (DLP) • Email Management • Database Activity • Email Protection • Directory Service • Firewall • Email • Geolocation • Endpoint • Identity Access Management (IAM) • Endpoint Monitoring • Information Technology Service Management (ITSM) • Network Access Controller (NAC) • Malware Scanning • Network • Mobile Device Management (MDM) • Physical Access • Messenger • Privileged Account Management • Sandbox • Unix/Linux/OSX • Security Incident and Event Management (SIEM) • VPN Servers • Threat Intelligence • Web Activity INBOUND DATA SOURCES FOR LOG INGESTION TYPE OF LOG DATA SOURCES AUTHENTICATION • Duo • RSA Authentication Manager • SecureAuth • Microsoft Azure AD • VMWare Horizon • Secure Computing • Microsoft Azure MFA • Google G Suite • SiteMinder • Cisco ISE CLOUD ACCESS SECURITY • Imperva Skyfence • Netskope BROKER (CASB) • McAfee SkyHigh CLOUD INFRASTRUCTURE & • Github • Okta APPLICATIONS • Office 365 • Shibboleth • Box • Webmail OWA • Perforce • Pulse Secure • OneLogin • Netskope • Osirium • Salesforce • Google • IP Switch MoveIt • Skyformation • SecureAuth • Duo Security • Ping Identity • Securelink • Xceedium • Verdasys Digital • Thales Vormetric • Guardian • Comware • Kemp • AWS CloudTrail • Tanium • oVirt • NetIQ • ServiceNow • Dropbox • iManage DMS Exabeam Security Management Platform Integrations 2 TYPE OF LOG DATA SOURCES DATA LOSS PREVENTION (DLP) • Symantec DLP • Websense DLP • Vontu • Codegreen • Digital Guardian • Imperva Counterbreach • Varonis • Forcepoint • Accellion • Pharos • Tripwire Enterprise • HP SafeCom • Lumension • Lexmark • Ricoh • Trap-X • Nasuni • xsuite • BitGlass DATABASE ACTIVITY • Imperva • Oracle • Microsoft SQL Server • IBM Guardium • Ranger Audit DIRECTORY SERVICES • SteathBits • Namespace rDirectory • Microsoft Active Directory EMAIL • Vontu • Symantec Brightmail • Websense • Codegreen • Microsoft Exchange/365 • Proofpoint • Clearswift SEG • Minecast • Postfix • Cisco Ironport ESA • Mimecast ENDPOINT • McAfee EPO • IBM Trusteer • Sophos • Symantec DLP • Symantec EPP • Forcepoint • TrendMicro • LightCyber • Microsoft Forefront/SCEP • Windows Native Logs • ESET • Crowdstrike Falcon • Invincea • Secureworks • MalwareBytes • Cisco Threat Grid • Cisco AMP for Endpoints • Anomali ThreatStream • Confer • ProtectWise • RSA Ecat • Fidelis XPS • F-Secure • Red Canary ENDPOINT MONITORING • CarbonBlack • Ziften • Dtex • Avecto • Bit9 • Defendpoint • Fortigate • Kaspersky • Safend NETWORK ACCESS • Cisco ISE • Infoblox CONTROLLER (NAC) • ForeScout NETWORK • Tipping Point • Palo Alto Networks WildFire • Cisco FirePower • Cyphort • Blue Coat Damballa • Cylance • Failsafe • Snort • Cisco FirePower Management • FireEye • Radius • Morphisec • BCN • Quest InTrust • Nokia VitalQIP • StealthWatch • Darktrace • Vectra Exabeam Security Management Platform Integrations 3 TYPE OF LOG DATA SOURCES PHYSICAL ACCESS • KABA EXOS • Vanderbilt • PicturePerfect • Badgepoint • ICPAM • Viscount • Lenel • Siemens • Honeywell • DataWatch • CCURE • ProWatch • RedCloud • AMAG Technologies • Swipes PRIVILEGED ACCOUNT • CyberArk • BeyondTrust MANAGEMENT • Liebsoft • Password Manager Pro • Thycotic UNIX/LINUX/OSX • SSH • Sudo VPN SERVERS • Citrix Netscaler • Nortel Contivity • Fortinet • Pulse Secure • NetMotion Wireless • Dell • SonicWall Aventail • Palo Alto Globalprotect • Checkpoint • Cognitas CrossLink • Cisco ASA • F5 WEB ACTIVITY • Bluecoat • Palo Alto Networks • Microsoft • Bro Network Security • Checkpoint • McAfee Web Gateway • Cisco Umbrella • Cisco Ironport WSA • TMG • Zscaler • Watchguard SERVICE INTEGRATIONS FOR INCIDENT RESPONDER PRODUCT AREA PRODUCT ACTIONS ASSET DISCOVERY Shodan • Lookup domain • Lookup IP CLOUD INFRASTRUCTURE AND Amazon AWS EC2 • Remove tag APPLICATIONS • Add tag • Disable account • Enable account • Get EC2 tags • Unmonitor EC2 instance • Monitor EC2 instance • Unquarantine AWS instance • Quarantine EC2 instance • Stop EC2 instance • Start EC2 instance • Terminate EC2 instance • Get EC2 Security groups • Get EC2 details • Get EC2 instance ENDPOINT DETECTION AND CarbonBlack Response • List alerts RESPONSE (EDR) • List processes • Unblock hash • Get device Info • Unquarantine host • Hunt file Exabeam Security Management Platform Integrations 4 PRODUCT AREA PRODUCT ACTIONS ENDPOINT DETECTION AND CarbonBlack Detect & Response • Get file RESPONSE (EDR) - (CON’T) • Ban hash from endpoint • Get triage data • Delete file • Kill process Cisco AMP for Endpoints • Search infected hosts • Get device info • Hunt file • Hunt IP Crowdstrike Falcon • Hunt URL/domain • Get device info • Hunt file SentinelOne • Change user password • List reports • Generate report • Get file reputation • Send email verification • Restart host • List processes • Scan host • Get File • List applications on host • Get device information • Get user information • Enable two-factor authentication • Disable two-factor authentication FireEye HX • Get file • Get triage data • Hunt file • Get device information • Get containment state • Contain host Tanium • List sensors • Run sensor • Get device info by IP • Get device info by hostname McAfee EPO • Add/Remove tag WMI • Get installed applications from endpoint WinRm • Get installed applications from endpoint • Get processes from endpoint • Get triage data • Get recently opened files • Get file • Get recently run applications • Get removable device information In addition to above, WinRm has these actions • Get processes from endpoint • Get event logs (departed employee) Exabeam Security Management Platform Integrations 5 PRODUCT AREA PRODUCT ACTIONS EMAIL MANAGEMENT Microsoft Exchange • Search email by sender Microsoft Office 365 • Delete email (by sender/subject) • Delete email by Message ID • Search email by Sender SMTP • Search email • Send phishing report EMAIL PROTECTION Proofpoint TAP • Get clicks to malicious links/files • Get forensics analysis on malicious links/files • Search SIEM for clicks to malicious links/files FIREWALL Check Point Firewall • Block IP Palo Alto Firewall • Block URL Fortinet Firewall • Block IP • Unblock IP GEOLOCATION MaxMind GeoIP2 • Geolocate IP MaxMind GeoLite2 IP-API IDENTITY ACCESS MANAGEMENT Microsoft Active Directory • Get user information (IAM) LDAP Okta • Add user to group • Get user Info • Remove user from group • Suspend user • Test service • Unsuspend user • Reset password INFORMATION TECHNOLOGY Atlassian JIRA • Add comment SERVICE MANAGEMENT (ITSM) • Re-assign ticket • Close ticket • Get ticket • Delete ticket • Change ticket Status • Create ticket ServiceNow • Create ticket • Update ticket • Comment on ticket • Close ticket MALWARE SCANNING Yara • Scan file • Scan text MOBILE DEVICE MANAGEMENT Duo • Send 2FA (two factor authentication) push (MDM) • Get user information • Enable user account • Disable user account • Change user password MESSENGER Slack • Send message Exabeam Security Management Platform Integrations 6 PRODUCT AREA PRODUCT ACTIONS SANDBOX Cuckoo, FireEye AX, • Detonate file in sandbox Hybrid Analysis VxStream, • Detonate URL Joe Security Cloud Quicksand, PaloAlto Wildfire, • Detonate file in sandbox Cisco ThreatGrid, Payload Security VxStream SECURITY INCIDENT AND EVENT Arcsight • Run query MANAGEMENT (SIEM) ElasticSearch • Run query • List collections IBM QRadar
Recommended publications
  • Accelerometer Sensor Emulation!!!! by Columbia University ­ NYC ­ Thesis ­ Raghavan Santhanam Benchmark
    Enabling the Virtual Phones to remotely sense the Real Phones in real-time ~ A Sensor Emulation initiative for virtualized Android-x86 ~ Raghavan Santhanam Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science in the School of Engineering and Applied Science 2014 © 2014 Raghavan Santhanam All Rights Reserved ABSTRACT Enabling the Virtual Phones to remotely sense the Real Phones in real-time ~ A Sensor Emulation initiative for virtualized Android-x86 ~ Smartphones nowadays have the ground-breaking features that were only a figment of one’s imagination. For the ever-demanding cellphone users, the exhaustive list of features that a smartphone supports just keeps getting more exhaustive with time. These features aid one’s personal and professional uses as well. Extrapolating into the future the features of a present-day smartphone, the lives of us humans using smartphones are going to be unimaginably agile. With the above said emphasis on the current and future potential of a smartphone, the ability to virtualize smartphones with all their real-world features into a virtual platform, is a boon for those who want to rigorously experiment and customize the virtualized smartphone hardware without spending an extra penny. Once virtualizable independently on a larger scale, the idea of virtualized smartphones with all the virtualized pieces of hardware takes an interesting turn with the sensors being virtualized in a way that’s closer to the real-world behavior. When accessible remotely with the real-time responsiveness, the above mentioned real-world behavior will be a real dealmaker in many real-world systems, namely, the life-saving systems like the ones that instantaneously get alerts about harmful magnetic radiations in the deep mining areas, etc.
    [Show full text]
  • Vmware Horizon 7 Datasheet
    DATASHEET VMWARE HORIZON 7 AT A GLANCE End-User Computing Today VMware Horizon® 7 delivers virtualized or Today, end users are leveraging new types of devices for work—accessing hosted desktops and applications through a Windows and Linux applications alongside iOS or Android applications—and single platform to end users. These desktop are more mobile than ever. and application services—including Remote Desktop Services (RDS) hosted apps, In this new mobile cloud world, managing and delivering services to end users packaged apps with VMware ThinApp®, with traditional PC-centric tools have become increasingly di cult. Data loss software-as-a-service (SaaS) apps, and and image drift are real security and compliance concerns. And organizations even virtualized apps from Citrix—can all are struggling to contain costs. Horizon 7 provides IT with a new streamlined be accessed from one digital workspace approach to deliver, protect, and manage Windows and Linux desktops and across devices, locations, media, and applications while containing costs and ensuring that end users can work connections without compromising quality anytime, anywhere, on any device. and user experience. Leveraging complete workspace environment Horizon 7: Delivering Desktops and Applications as a Service management and optimized for the software– defi ned data center, Horizon 7 helps IT control, Horizon 7 enables IT to centrally manage images to streamline management, manage, and protect all of the Windows reduce costs, and maintain compliance. With Horizon 7, virtualized or hosted resources end users want, at the speed they desktops and applications can be delivered through a single platform to end expect, with the e ciency business demands.
    [Show full text]
  • Virtualization with Limited Hardware Support
    Virtualization with Limited Hardware Support by Bi Wu Department of Computer Science Duke University Date: Approved: Landon Cox, Supervisor Jeffrey Chase Alvin Lebeck Harvey Tuch Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2013 Abstract Virtualization with Limited Hardware Support by Bi Wu Department of Computer Science Duke University Date: Approved: Landon Cox, Supervisor Jeffrey Chase Alvin Lebeck Harvey Tuch An abstract of a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2013 Copyright c 2013 by Bi Wu All rights reserved except the rights granted by the Creative Commons Attribution-Noncommercial Licence Abstract Over the past 15 years, virtualization has become a standard way to migrate old software to new hardware, isolate untrusted code, and encapsulate application state. However, many of the techniques for implementing common virtualization functional- ity, such as transparent isolation and full-system record and replay, rely on hardware features provided by the x86 architecture. As the mainstream computing landscape diversifies to include less feature-rich mobile and embedded systems, it is critical to rethink how to efficiently provide core virtualization functionality with limited hardware support. As a result, this dissertation explores the feasibility of providing common virtu- alization functionality with limited hardware support. We propose three approaches to virtualization using limited hardware support. First, we describe a way to transparently virtualize a CPU using hardware break- points and on-demand control-flow analysis.
    [Show full text]
  • Vmware Product Guide
    VMWARE PRODUCT GUIDE J U L Y 2017 Table of Contents 1 TERMS APPLICABLE TO ALL PRODUCTS 4 - 10 2 DATA CENTER AND CLOUD INFRASTRUCTURE 11 - 23 2.1 VMware vSphere 11 - 13 2.2 VMware vSphere Essentials Plus with vSphere Storage Appliance 13 2.3 VMware vCloud Director 13 2.4 VMware vSphere Storage Appliance 14 2.5 VMware NSX Platform 14 - 15 2.6 VMware vSAN 15 - 20 2.7 VMware vSphere Data Protection Advanced 20- 21 2.8 VMware vCenter Support Assistant 21 2.9 VMware Software Manager 21 2.10 VMware Continuent 21 - 22 2.11 VMware Photon Platform 22 - 23 3 INFRASTRUCTURE AND OPERATIONS MANAGEMENT 24 - 30 3.1 VMware vCenter Server 24 3.2 VMware vRealize Suite 24 - 25 3.3 VMware vRealize Operations Insight 25 3.4 VMware Site Recovery Manager 25 - 26 3.5 VMware vRealize Automation 26 - 27 3.6 VMware vCloud Connector Core 27 3.7 VMware vRealize Log Insight 27 - 28 3.8 VMware vRealize Operations Management Pack for EPIC 28 - 29 3.9 VMware vRealize Code Stream 29 3.10 VMware Health Analyzer Collector 29 3.11 VMware vRealize Operations Management Pack for MEDITECH 29 3.12 VMware vRealize Network Insight 29 - 30 4 SECURITY PRODUCTS 31 4.1 VMware vCloud Networking and Security 31 5 VMWARE SUITES 32 - 39 5.1 VMware vCloud Suite 32 - 33 5.2 VMware vSphere with Operations Management 33 - 35 5.3 VMware vRealize Operations 35 - 37 5.4 VMware vCloud NFV 37 5.5 VMware Cloud Foundation 38 - 39 1 5.6 Server SAN Suite 39 6 DESKTOP AND END USER COMPUTING 40 - 56 6.1 VMware Horizon View Enterprise Add-on 40 6.2 VMware Horizon Client for IOS 40 - 41 6.3 VMware Horizon
    [Show full text]
  • A Full GPU Virtualization Solution with Mediated Pass-Through
    A Full GPU Virtualization Solution with Mediated Pass-Through Kun Tian, Yaozu Dong, David Cowperthwaite Intel Corporation Abstract shows the spectrum of GPU virtualization solutions Graphics Processing Unit (GPU) virtualization is an (with hardware acceleration increasing from left to enabling technology in emerging virtualization right). Device emulation [7] has great complexity and scenarios. Unfortunately, existing GPU virtualization extremely low performance, so it does not meet today’s approaches are still suboptimal in performance and full needs. API forwarding [3][9][22][31] employs a feature support. frontend driver, to forward the high level API calls inside a VM, to the host for acceleration. However, API This paper introduces gVirt, a product level GPU forwarding faces the challenge of supporting full virtualization implementation with: 1) full GPU features, due to the complexity of intrusive virtualization running native graphics driver in guest, modification in the guest graphics software stack, and and 2) mediated pass-through that achieves both good incompatibility between the guest and host graphics performance and scalability, and also secure isolation software stacks. Direct pass-through [5][37] dedicates among guests. gVirt presents a virtual full-fledged GPU the GPU to a single VM, providing full features and the to each VM. VMs can directly access best performance, but at the cost of device sharing performance-critical resources, without intervention capability among VMs. Mediated pass-through [19], from the hypervisor in most cases, while privileged passes through performance-critical resources, while operations from guest are trap-and-emulated at minimal mediating privileged operations on the device, with cost. Experiments demonstrate that gVirt can achieve good performance, full features, and sharing capability.
    [Show full text]
  • KVM/ARM: Experiences Building the Linux ARM Hypervisor
    KVM/ARM: Experiences Building the Linux ARM Hypervisor Christoffer Dall and Jason Nieh fcdall, [email protected] Department of Computer Science, Columbia University Technical Report CUCS-010-13 April 2013 Abstract ization. To address this problem, ARM has introduced hardware virtualization extensions in the newest ARM As ARM CPUs become increasingly common in mo- CPU architectures. ARM has benefited from the hind- bile devices and servers, there is a growing demand sight of x86 in its design. For example, nested page for providing the benefits of virtualization for ARM- tables, not part of the original x86 virtualization hard- based devices. We present our experiences building the ware, are standard in ARM. However, there are impor- Linux ARM hypervisor, KVM/ARM, the first full sys- tant differences between ARM and x86 virtualization ex- tem ARM virtualization solution that can run unmodified tensions such that x86 hypervisor designs may not be guest operating systems on ARM multicore hardware. directly amenable to ARM. These differences may also KVM/ARM introduces split-mode virtualization, allow- impact hypervisor performance, especially for multicore ing a hypervisor to split its execution across CPU modes systems, but have not been evaluated with real hardware. to take advantage of CPU mode-specific features. This allows KVM/ARM to leverage Linux kernel services and We describe our experiences building KVM/ARM, functionality to simplify hypervisor development and the ARM hypervisor in the mainline Linux kernel. maintainability while utilizing recent ARM hardware KVM/ARM is the first hypervisor to leverage ARM virtualization extensions to run application workloads in hardware virtualization support to run unmodified guest guest operating systems with comparable performance operating systems (OSes) on ARM multicore hardware.
    [Show full text]
  • Virtual GPU Software User Guide Is Organized As Follows: ‣ This Chapter Introduces the Capabilities and Features of NVIDIA Vgpu Software
    Virtual GPU Software User Guide DU-06920-001 _v13.0 Revision 02 | August 2021 Table of Contents Chapter 1. Introduction to NVIDIA vGPU Software..............................................................1 1.1. How NVIDIA vGPU Software Is Used....................................................................................... 1 1.1.2. GPU Pass-Through.............................................................................................................1 1.1.3. Bare-Metal Deployment.....................................................................................................1 1.2. Primary Display Adapter Requirements for NVIDIA vGPU Software Deployments................2 1.3. NVIDIA vGPU Software Features............................................................................................. 3 1.3.1. GPU Instance Support on NVIDIA vGPU Software............................................................3 1.3.2. API Support on NVIDIA vGPU............................................................................................ 5 1.3.3. NVIDIA CUDA Toolkit and OpenCL Support on NVIDIA vGPU Software...........................5 1.3.4. Additional vWS Features....................................................................................................8 1.3.5. NVIDIA GPU Cloud (NGC) Containers Support on NVIDIA vGPU Software...................... 9 1.3.6. NVIDIA GPU Operator Support.......................................................................................... 9 1.4. How this Guide Is Organized..................................................................................................10
    [Show full text]
  • How to Migrate Citrix Xenapp to Vmware Horizon
    How to Migrate Citrix XenApp to VMware Horizon TECHNICAL WHITE PAPER How to Migrate Citrix XenApp to VMware Horizon Table of Contents Introduction . 3 Comparing Citrix XenApp to VMware Horizon . 4 Remote Desktop Services . .. 5 License Server . 5 Database . .How . .to . .Migrate . .Citrix . 6 Connection Brokering and Session MonitoringXenApp. 6 to VMware Horizon Web Portal . 6 Clients and Protocol . 6 Preparing for the Migration . 7 Business Requirements . 7 Published Applications . 7 XenApp Infrastructure . 7 End-User Requirements. 8 Four Approaches to XenApp Migration . 9 Integration . 9 Migration . 9 Replacement . 9 Combination. 10 Integrating XenApp with Horizon Using VMware Identity Manager . 11 Deploy VMware Identity Manager . 11 Implement the Identity Manager Integration Broker . 11 Configure Identity Manager to Connect to XenApp . 12 Decommission Citrix Web Interface or StoreFront . 16 Migrating or Replacing XenApp with VMware Horizon . 17 Deploy VMware Horizon . 17 Deploy VMware Identity Manager (Optional) . 18 Prepare the Microsoft RDSH Servers . 18 Create RDSH Server Farms and Application Pools and Entitle Users . 19 Add an RDSH Server Farm . 19 Create Application Pools to Publish Applications . 23 Manually Create Application Pools . 26 Publish Shared Desktops . 28 Decommission Citrix XenApp . 31 Additional Documentation . 33 About the Author . 34 WHITE PAPER / 2 How to Migrate Citrix XenApp to VMware Horizon Introduction VMware Horizon® support for published applications provides exciting new opportunities for customers running Citrix XenApp. Tightly integrated with Microsoft Remote Desktop Services (RDS), VMware Horizon is a new option for delivering not just published applications and shared desktops, but also virtual desktops, software as a service (SaaS), and virtualized applications to the devices your end users want to use.
    [Show full text]
  • Vmware Horizon® on Microsoft® Azure® Vmware Solution
    FREQUENTLY ASKED QUESTIONS VMware Horizon® on Microsoft® ® Azure VMware Solution Q. What is VMware Horizon? Q. Is this the same as Horizon Cloud on Microsoft Azure? A. VMware Horizon is a modern platform for secure delivery of A. No. Horizon Cloud on Microsoft Azure is a managed service virtual desktops and apps across the hybrid cloud, from the from VMware that does not leverage VMware SDDC. The market leader in software-defined data center (SDDC) Horizon Cloud infrastructure is deployed natively into a architecture and digital workspaces. customer’s Azure subscription. Horizon offers these key benefits: Q. Can I use my Windows Virtual Desktop benefit from Microsoft with VMware Horizon on Azure VMware Solution? • Hybrid delivery, management and scale – Efficiently deploy and easily scale virtual desktops and apps across A. No. Windows Virtual Desktop benefits are applicable to native private and public clouds, all managed from a single Microsoft Azure workloads only. Horizon Cloud on Microsoft control plane. Azure, as a native Azure offering, is able to leverage your • Modern platform for simplicity and speed – Rapidly Windows Virtual Desktop benefit while adding the power of provision full-featured, personalized virtual desktops and VMware Horizon. apps with Instant Clone technology. Simplify and automate day 2 management of images, apps, profiles and policies to DEPLOYMENT OPTIONS & MANAGEMENT save time and reduce costs. Q. Which version of Horizon is be supported in Azure • End-to-end security from a trusted partner – Secure VMware Solution? delivery of virtual desktops and apps to protect your network and data center—powered with intrinsic security A. Horizon 2006 (a.k.a.
    [Show full text]
  • Vdi Resource Comparison: Vmware Horizon View 5.2 Vs. Citrix Xendesktop 7
    VDI RESOURCE COMPARISON: VMWARE HORIZON VIEW 5.2 VS. CITRIX XENDESKTOP 7 Virtual Desktop Infrastructure (VDI) offers unparalleled flexibility and security that traditional desktop computing cannot match. However, burdens on datacenter resources hosting the VDI solution can increase with the growth of a VDI user base. An advantageous solution can be key in mitigating the overall impact of new users on datacenter resources without sacrificing the flexibility and security that VDI offers. As the number of VDI users grows, challenges such as keeping the disk footprint required for applications and user data to a minimum, maintaining non-disruptive security and protection for users, and ensuring rapid deployment of new virtual desktops within the system can all negatively affect cost and productivity. Organizations unprepared for these challenges can benefit from a well-designed VDI solution that alleviates these time and resource burdens. Here in the Principled Technologies labs, we performed a multi-feature VDI comparison between VMware Horizon View 5.2 hosted on VMware vSphere 5.1 and Citrix XenDesktop 7 hosted on Citrix XenServer 6.2. In our testing, we measured disk space usage for a persistent virtual desktop, the impact of anti-virus (AV) scans on datacenter resources, and the speed each solution can deploy virtual machines (VMs). We found that VMware Horizon View 5.2 hosted on VMware vSphere 5.1 was able to do all three things faster or better than Citrix XenDesktop 7 hosted on Citrix XenServer 6.2. Our results show the time- and resource-saving qualities that any VDI user base would appreciate. September 2013 A PRINCIPLED TECHNOLOGIES TEST REPORT Commissioned by VMware The advantages of VMware Horizon View 5.2 The two VDI solutions we tested, VMware Horizon View 5.2 and Citrix XenDesktop 7, are similar in basic function and offer the traditional benefits associated with VDI, however there are key differences that can potentially affect datacenter resources and desktop user productivity.
    [Show full text]
  • Setting up Linux Desktops in Horizon
    Setting Up Linux Desktops in Horizon VMware Horizon 2103 Setting Up Linux Desktops in Horizon You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2021 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Setting Up Linux Desktops in Horizon 6 1 Features and System Requirements 7 Features of Horizon Linux Desktops 7 Overview of Configuration Steps for Setting Up Linux Desktops 13 System Requirements for Horizon Agent for Linux 14 Virtual Machine Settings for 2D Graphics 23 Configuring Session Collaboration on Linux Desktops 23 2 Preparing a Linux Virtual Machine for Desktop Deployment 27 Create a Virtual Machine and Install Linux 27 Update the GNOME Shell Window List Extension on SLED/SLES Virtual Machines 28 Prepare a Linux Machine for Remote Desktop Deployment 29 Install Dependency Packages for Horizon Agent 32 Upgrade the Operating System of a Linux Virtual Machine 33 3 Setting Up Active Directory Integration and User Authentication Features for Linux Desktops 34 Integrating Linux Desktops with Active Directory 34 Use the OpenLDAP Server Pass-Through Authentication 35 Set Up SSSD LDAP Authentication Against the Microsoft Active Directory 35 Use the Winbind Domain Join Solution 36 Configure PowerBroker Identity Services Open (PBISO) Authentication 36 Configure the Samba Offline Domain Join 37 Use the Realmd Join Solution for RHEL/CentOS 8.x 39 Setting Up Single
    [Show full text]
  • Dell EMC SC Series Best Practices with Vmware Vsphere 5.X–6.X
    Best Practices Dell EMC SC Series: Best Practices with VMware vSphere Abstract This document provides best practices for integrating VMware® vSphere® 5.x- 7.x hosts with Dell EMC™ SC Series storage. May 2021 2060-M-BP-V Revisions Revisions Date Description July 2016 Initial release: Combined vSphere 5.x and 6.x best practice documents, added SCOS 7.1 updates September 2016 Minor revisions and corrections October 2016 Changed Disk.AutoremoveOnPDL to reflect current VMware guidance January 2017 Updated for vSphere 6.5 changes; added appendix D summarizing all host settings February 2017 Updated Linux guest disk timeout recommendations in section 4.7.2 April 2017 Updated iSCSI login timeout recommendation July 2017 Updated SAS driver info in 4.2.3, Added auto UNMAP requirements in 16.3.5 April 2018 Updated to provide vSphere 6.7 guidance October 2018 Minor revisions and corrections December 2018 Added SAS front-end lsi_msgpt3 module parameter recommendation in 4.2.3 March 2019 Modified SATP claim rules in section 6.9.1 and appendix D July 2019 Minor revisions and corrections (VMFS3.EnableBlockDelete=1) September 2019 Claim rule syntax corrections April 2020 vSphere 7.0 additions December 2020 Minor clarifications January 2021 Esxcli command syntax change for DelayedAck in appendix D.1 May 2021 Updated section 4.2.3 with additional KB articles for SAS FE connectivity Acknowledgments Author: Darin Schmitz The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose.
    [Show full text]