Kaspersky Security for Virtualization 6.2 Light Agent

Contents

Installing the Kaspersky Security solution

Installation of Kaspersky Security for Virtualization 6.2 Light Agent in the virtual infrastructure consists of the following stages:

  1. Installing the Integration Server

    Depending on your infrastructure, you need to install the Windows-based Integration Server or the Linux-based Integration Server.

    For the Linux-based Integration Server, connecting to virtual infrastructure based on Microsoft Hyper-V is not supported. Use the Windows-based Integration Server to install and run Kaspersky Security in an infrastructure based on the Microsoft Hyper-V platform.

    If you want to use the Integration Server Console to manage the Windows-based Integration Server, you also need to install Integration Server Console on the device where Kaspersky Security Center Administration Console is installed, or on another device with a Windows operating system.

    If you want to use Integration Server Web Console to manage the Integration Server, you need to install the Integration Server web plug-in. After it is installed, Integration Server Web Console will be available in Kaspersky Security Center Web Console.

  2. Installing Kaspersky Security management plug-ins

    If you want to manage components of the Kaspersky Security solution via Kaspersky Security Center Web Console and use Integration Server Web Console, you need to install management web plug-ins on the device where Kaspersky Security Center Web Console is installed.

    If you want to manage solution components via Kaspersky Security using Kaspersky Security Center Administration Console, you need to install management MMC plug-ins on the device where Kaspersky Security Center Administration Console is installed.

    If you are using Kaspersky Security Center Linux, you need to install the management web plug-ins. The Kaspersky Security Center Administration Console and management MMC plug-ins are not supported.

    After installing the Protection Server management plug-in, it is recommended to run the Download updates to the Administration Server storage task in Kaspersky Security Center and make sure that the task completes successfully. For details, please refer to the Kaspersky Security Center help.

    After installing the management plug-ins, you can create a default policy and an Update databases and solution modules task for the Protection Server using the Kaspersky Security Center Initial Configuration Wizard.

  3. Installing Kaspersky Security Protection Servers

    The Protection Server is installed as a result of deploying SVMs on a hypervisor in a virtual infrastructure.

    You can deploy SVMs in the following ways:

    • Using the Integration Server Web Console. In the Web Console, you must first configure the connection of the Integration Server to the virtual infrastructure. Then you create a task for the Integration Server, in which you specify all the necessary SVM deployment settings, and start the task. The Integration Server runs the SVM deployment task. You can monitor the task progress in Integration Server Web Console.
    • Using the Integration Server Console. In Integration Server Console, you launch the SVM Management Wizard. Following the instructions in the wizard, you configure the wizard's connection to the virtual infrastructure, enter all the necessary SVM deployment settings, and start the deployment. The Integration Server deploys the SVMs. You can monitor the deployment progress in the wizard.
    • Without using the Integration Server management consoles, using the Integration Server REST API (open a description of REST API requests).

    If none of the above methods are suitable, you can deploy SVMs using the tools of the virtual infrastructure and then configure the SVM using the klconfig script API manually or using automation tools.

    In an infrastructure managed by VMware vCenter Server and VMware NSX Manager, if you use Integration Server Console for SVM deployment, then after the SVM deployment is complete, you need to configure the Integration Server's connection to VMware NSX Manager. If you use Integration Server Web Console for SVM deployment, you can configure a connection to VMware NSX Manager when configuring the Integration Server's connection to the virtual infrastructure or later, using the procedure for changing connection settings.

  4. Preparing the Protection Servers for operation

    You must follow the steps to prepare the deployed SVMs and Protection Servers for operation.

  5. Installing Light Agents and Kaspersky Security Center Network Agent

    On each virtual machine that needs to be protected using the Kaspersky Security solution, you need to install the following:

    To protect your VDI, you need to install Light Agent and Network Agent on your virtual machine templates.

  6. Preparing Light Agents for operation

    You must follow the steps to prepare the installed Light Agents for operation.

In this Help section

Installing a Windows-based Integration Server

Installing a Linux-based Integration Server

Installing Kaspersky Security web plug-ins

Installing Kaspersky Security MMC plug-ins

SVM deployment using the Integration Server Web Console

Deploying SVMs using the Integration Server Console

Automatically creating tasks and a default policy for the Protection Server

Preparing the Protection Server for operation

Installing Light Agents and Network Agent

Preparing Light Agents for operation

Displaying virtual machines and SVMs in Kaspersky Security Center

Viewing the list of SVMs connected to the Integration Server

Page top
[Topic 255919]

Installing a Windows-based Integration Server

The procedure for installing the Windows-based Integration Server depends on which version of Kaspersky Security Center you plan to use to manage the Kaspersky Security solution:

  • If you want to use the Kaspersky Security Center Windows to manage the Kaspersky Security solution, you can use the Kaspersky Security components installation wizard. The wizard lets you install the Windows-based Integration Server and Integration Server Console.

    The Integration Server must be installed on the device on which the Administration Server of Kaspersky Security Center is installed. The Integration Server Console must be installed on the device where the Kaspersky Security Center Administration Console is installed.

  • If you want to use Kaspersky Security Center Linux to manage the Kaspersky Security solution, do not use the Kaspersky Security Components Installation Wizard. The Windows-based Integration Server must be installed on a device with a Windows operating system, regardless of the location of the Kaspersky Security Center components. You can also install the Integration Server Console on a Windows device. Installation is performed manually.

The Integration Server and Integration Server Console must be installed under an account that belongs to the local administrator group.

Installation requires at least 4 GB of free space on the drive containing the %ProgramData% folder.

For successful installation of the Integration Server, in the settings of network equipment or traffic monitoring software you need to allow connections through the port that will be used by SVMs and Light Agents to connect to the Integration Server. By default, port number 7271 (TCP) is used.

In this section:

Installing the Integration Server and Integration Server Console using the wizard

Installing manually

Page top
[Topic 98668]

Installing the Integration Server and Integration Server Console using the wizard

You can install the Integration Server and Integration Server Console by using the Kaspersky Security Components installation wizard in interactive mode or in silent mode.

The Microsoft .NET Framework 4.6.2, 4.7, or 4.8 is required for the Kaspersky Security Components Installation Wizard. You can install the Microsoft .NET Framework platform in advance, or the Kaspersky Security Component Installation Wizard will suggest installing it during the installation of Kaspersky Security solution components. Internet access is required to install Microsoft .NET Framework. If there are any problems with the installation of Microsoft .NET Framework, make sure that Windows updates KB2919442 and KB2919355 have been installed on the device.

Depending on the availability of Kaspersky Security Center components installed on the device, the following operations are performed once installation is started:

  • If only Kaspersky Security Center Administration Console is installed on the device, the Integration Server Console is installed.
  • If the Kaspersky Security Center Administration Server and Kaspersky Security Center Administration Console are installed on the device, the Integration Server and Integration Server Console are installed.

When you install the Integration Server, the data kept while removing the previous version of the Integration Server can be used.

After installation of the Integration Server Console is complete, in Kaspersky Security Center Administration Console, in the workspace of the Administration Server <server name> node on the Monitoring tab, the Deployment section displays a Manage Kaspersky Security for Virtualization <version number> Light Agent link (where <version number> is the number of the installed version of the Kaspersky Security solution). This link is used to start the Integration Server Console.

The procedure for installing the Integration Server as part of Kaspersky Security solution update differs from the "clean" installation procedure described in this section.

In this section:

Installing in interactive mode using the wizard

Installing in silent mode using the wizard

Page top
[Topic 255958]

Installing in interactive mode using the wizard

To install the Integration Server and Integration Server Console in interactive mode using the wizard:

  1. On the device where Administration Console and Kaspersky Security Center Administration Server are installed, run the ksvla-components_<solution version number>_mlg.exe file. This file is included in the distribution kit.

    Kaspersky Security components installation Wizard starts.

  2. Select the localization language of the Wizard and of the Kaspersky Security components and proceed to the next step of the Wizard.

    By default, the localization language of the operating system installed on the device where the Wizard was started is used.

  3. Make sure that the Install management components option is selected and proceed to the next step of the Wizard.

    The Wizard checks the amount of free space on the drive that contains the %ProgramData% folder. If there is less than 4 GB of free space on the drive, the Wizard displays an error message and you cannot proceed to the next step of the Wizard. If this is the case, close the Wizard, free up space on the drive, and restart the Kaspersky Security Components Installation Wizard.

  4. In the next step, read the Kaspersky Security End User License Agreement, which is concluded between you and Kaspersky, and the Privacy Policy, which describes the processing and transmission of data.

    To continue the installation, you must confirm that you have fully read and accept the terms of the End User License Agreement and the Privacy Policy. To confirm, select both check boxes in the window of the Wizard.

    Proceed to the next step of the wizard.

  5. Create the password of the Integration Server administrator (admin) account. The admin account is used for the following purposes:

    Enter a password in the Password and Confirm password fields. The account name cannot be edited.

    A password must be no longer than 60 characters. You can use only letters of the Latin alphabet (uppercase and lowercase letters), numerals, and the following special characters: ! # $ % & ' ( ) * " + , - . / \ : ; < = > _ ? @ [ ] ^ ` { | } ~. For security purposes, you are advised to set a password that is at least 8 characters long and use at least three of the four categories of characters: lowercase letters, uppercase letters, numerals, and special characters.

    Proceed to the next step of the wizard.

  6. If port 7271, which is the default port for connecting to the Integration Server, is occupied on the device where the wizard is running, the wizard will prompt you to specify a port number for connecting to the Integration Server.

    In the Port field, specify a port number in the range of 1025–65535 and proceed to the next step of the Wizard.

  7. Review the information about the actions that the wizard will perform and click the Install button to begin performing the listed actions.
  8. Wait for the wizard to finish.

    If an error occurs during wizard operation, the wizard rolls back the changes made.

  9. Click Finish to close the Wizard window.

Information about the work of the Wizard is written to trace files of the Kaspersky Security Components Installation Wizard. If the wizard completed with an error, you can use these files when contacting Technical Support.

Page top
[Topic 255959]

Installing in silent mode using the wizard

Before starting installation of the Integration Server and Integration Server Console, it is recommended to close the Kaspersky Security Center Administration Console.

To install the Integration Server and Integration Server Console in silent mode using the wizard:

ksvla-components_<solution version number>_mlg.exe -q --lang=<language ID> --accept-EulaAndPrivacyPolicy=yes --viisPass=<password> [--log-path=<file path>] [--viisPort=<port number>]

where:

  • <solution version number> is the version number of the solution in X.X.X.X format.
  • -q is an option specifying that the installation is performed in silent mode. If you want to run the installation interactively from the command line, do not specify this option.
  • --lang=<language ID> is the identifier of the language of the components to install.

    The language ID must be indicated in the following format: ru, en, de, fr, zh-Hans, zh-Hant, ja. It is case-sensitive.

  • --accept-EulaAndPrivacyPolicy=yes means that you accept the terms of the Kaspersky Security End User License Agreement, concluded between you and Kaspersky, and the Privacy Policy, which describes the processing and transmission of data. By setting this parameter to yes, you confirm the following:
    • You have fully read, understood and accept the terms and conditions of the Kaspersky Security End User License Agreement.
    • You have fully read and understood the Privacy Policy, you are aware and agree that your data will be handled and transmitted (including to third countries) as described in the Privacy Policy.

    The text of the End User License Agreement and Privacy Policy is included in the solution's distribution kit. Accepting the terms of the End User License Agreement and Privacy Policy is a prerequisite for installing Integration Server and Integration Server Console.

    You can read the text of the End User License Agreement and the Privacy Policy by executing the following command:

    ksvla-components_<solution version number>_mlg.exe --lang=<language ID> --show-EulaAndPrivacyPolicy

    The text of the End User License Agreement and the Privacy Policy is output to the license_<language ID>.txt file in the tmp folder.

  • --viisPass=<password> is the password of the Integration Server administrator account (admin). The admin account is used for the following purposes:

    A password must be no longer than 60 characters. You can use only letters of the Latin alphabet (uppercase and lowercase letters), numerals, and the following special characters: ! # $ % & ' ( ) * " + , - . / \ : ; < = > _ ? @ [ ] ^ ` { | } ~. For security purposes, you are advised to set a password that is at least 8 characters long and use at least three of the four categories of characters: lowercase letters, uppercase letters, numerals, and special characters.

  • --log-path=<path to file> is the path to the file where information about installation results is saved.

    Optional parameter. By default, the installation results are logged in trace files saved at %temp%\Kaspersky_Security_for_Virtualization_<version number>_Light_Agent_BundleInitialInstall_logs_<date and time>.zip, where:

    • <version number> refers to the number of the installed version of the Kaspersky Security solution;
    • <date and time> refers to the date and time when the installation was completed in the dd_MM_yyyy_HH_mm_ss format.
  • --viisPort=<port number> is the port for connecting to the Integration Server.

    Optional parameter. Port number 7271 is used by default for connecting to the Integration Server. Specify this parameter if you want to use a different port to connect to the Integration Server.

To view a description of all available command line parameters for installing and updating Kaspersky Security components, use the --help parameter.

Installing the Integration Server and Integration Server Console takes some time. Information about the work of the Wizard is written to trace files of the Kaspersky Security Components Installation Wizard. If the wizard completed with an error, you can use these files when contacting Technical Support.

Page top
[Topic 255960]

Installing manually

To remove the Integration Server and Integration Server Console manually:

  1. Place the ksvla-components_<solution version number>_mlg.exe file (where <version number> is the version number of the solution in X.X.X.X format) on the Windows device. This file is included in the distribution kit.
  2. Extract files required for installing Integration Server and Integration Server Console by running:

    ksvla-components_<solution version>_mlg.exe -layout <folder> --accept-EulaAndPrivacyPolicy=yes

    where:

    • <solution version> is the version number of the solution in X.X.X.X format.
    • <folder> is the path to the folder to extract the Integration Server and Integration Server Console installation files into. If you do not specify a folder path, the files are extracted into the 'data' subfolder inside the folder containing the ksvla-components_<solution version number>_mlg.exe file.
    • accept-EulaAndPrivacyPolicy=yes means that you accept the terms of the Kaspersky Security End User License Agreement between you and Kaspersky and the Privacy Policy that describes processing and transmission of data. By setting this parameter to yes, you confirm the following:
      • You have fully read, understood and accept the terms and conditions of the Kaspersky Security End User License Agreement.
      • You have fully read and understood the Privacy Policy, you are aware and agree that your data will be handled and transmitted (including to third countries) as described in the Privacy Policy.

      Accepting the terms of the End User License Agreement and Privacy Policy is a prerequisite for installing Integration Server and Integration Server Console. You can read the text of the End User License Agreement and the Privacy Policy by executing the following command:

      ksvla-components_<solution version>_mlg.exe --lang=<language ID> --show-EulaAndPrivacyPolicy

      The text of the End User License Agreement and the Privacy Policy is output to the license_<language ID>.txt file in the tmp folder.

    Running the command creates two subfolders with files inside the specified folder. The AttachedContainer subfolder includes the following files, among others:

    • viis_service.msi – file required to install the Integration Server
    • viis_console.msi – file required to install Integration Server Console
  3. Start the Integration Server installation process by running:

    viis_service.msi ADMIN_VIIS_PASSWORD=<password>

    where:

    • <password> is the password of the Integration Server administrator account (admin). The admin account is used for connecting Integration Server Console to Integration Server.

      A password must be no longer than 60 characters. You can use only letters of the Latin alphabet (uppercase and lowercase letters), numerals, and the following special characters: ! # $ % & ' ( ) * " + , - . / \ : ; < = > _ ? @ [ ] ^ ` { | } ~. For security purposes, you are advised to set a password that is at least 8 characters long and use at least three of the four categories of characters: lowercase letters, uppercase letters, numerals, and special characters.

  4. Launch the Integration Server Console installation process by running:

    viis_console.msi

After installation is complete, you can start the Integration Server Console using the executable file located in the Integration Server Console installation folder.

Page top
[Topic 100568]

Installing a Linux-based Integration Server

To install the Linux-based Integration Server, you need to install the Integration Server package on a device with the Linux operating system and perform the initial configuration of the Integration Server.

To install the Linux-based Integration Server package, run the command:

sudo apt-get install ./ksvla-viis_<build number>-<build number>_amd64.deb

If the device does not have the required packages, they may be installed automatically during installation of the Integration Server, or a warning will be displayed about the need to install them.

After completing the installation of the Integration Server, you need to perform the initial configuration of the Integration Server.

To perform the initial configuration of the Integration Server:

  1. Run the following command:

    sudo /opt/kaspersky/viis/bin/viis-setup.sh

    The initial configuration script starts.

  2. When prompted by the script, do the following:
    1. Select the locale that will be used to display the End User License Agreement and Privacy Policy.
    2. Please read the text of the End User License Agreement, which is concluded between you and Kaspersky, and the Privacy Policy, which describes the processing and transfer of data. To continue the installation, you must confirm that you have fully read and accept the terms of the End User License Agreement and the Privacy Policy.

      Files with the text of the End User License Agreement and Privacy Policy are located in the directory /opt/kaspersky/viis/doc/EULA/<language identifier>/license.txt.

    3. Specify the port number to connect to the Integration Server.
    4. Create the password of the Integration Server administrator (admin) account.

When the script ends and the console is no longer busy, the initial configuration process is complete. After the initial configuration is complete, the Integration Server starts and is ready to work.

Integration Server Web Console is used to manage the Linux-based Integration Server. The Integration Server Web Console becomes available in Kaspersky Security Center Web Console after installing the Integration Server web plug-in.

You can view the installation results and the installed version of the Linux-based Integration Server by running the command:

# apt show ksvla-viis

Page top
[Topic 58143]

Installing Kaspersky Security web plug-ins

To manage Kaspersky Security solution components via Kaspersky Security Center Web Console, you need to install:

  • Management web plug-in for the Protection Server (Kaspersky Security for Virtualization <version number> Light Agent – Protection Server)
  • Management web plug-in for Light Agent for Linux (Kaspersky Endpoint Security for Linux running in Light Agent mode) and/or management web plug-in for Light Agent for Windows (Kaspersky Endpoint Security for Windows running in Light Agent mode)
  • Management web plug-in for the Integration Server (Kaspersky Security for Virtualization <version number> Light Agent – Integration Server), if you want to use Integration Server Web Console to manage the Integration Server

To install a web plug-in:

  1. In the Kaspersky Security Center Web Console main window, select Settings → Web plug-ins.

    The list of installed web plug-ins opens.

  2. Start installation of the Kaspersky Security web plug-in in one of the following ways:
    • Installing from a list of Kaspersky web plug-ins:
      1. Click the Add button.

        A list of all available Kaspersky web plug-ins opens. The list is updated automatically as new web plug-in versions are released.

      2. Find the required web plug-in in the list and click the plug-in name.
      3. In the web plug-in description window that opens, click Install plug-in.
      4. Wait for the installation process to finish and click OK in the information window.
    • Installing a web plug-in from a third-party source. The solution distribution kit includes archives required for installing web plug-ins.
      1. Click the Add from file button.
      2. In the window that opens, download the ZIP archive with the web plug-in distribution and the file with the signature in TXT format. ZIP archives with web plug-in distributions and signed files are located in the archives with web plug-ins that are included in the solution distribution kit.
      3. Click the Add button.
      4. Wait for the installation process to finish and click OK in the information window.

Newly installed plug-ins are displayed in the list of installed web plug-ins.

Page top
[Topic 255975]

Installing Kaspersky Security MMC plug-ins

To manage Kaspersky Security solution components via Kaspersky Security Center Administration Console, you need to install:

  • Management MMC plug-in for the Protection Server (Kaspersky Security for Virtualization <version number> Light Agent – Protection Server)
  • Management MMC plug-in for Light Agent for Linux (Kaspersky Endpoint Security for Linux running in Light Agent mode) and/or management MMC plug-in for Light Agent for Windows (Kaspersky Endpoint Security for Windows running in Light Agent mode)

We recommend closing the Kaspersky Security Center Administration Console before starting the installation of the MMC plug-ins.

To install the MMC plug-in,

on the device where Kaspersky Security Center Administration Console is installed, run the klcfginst.msi file.

The files required for installing MMC plug-ins are included in the Kaspersky Security solution distribution kit.

After installation, the MMC plug-ins appear in the list of installed management MMC plug-ins in the properties of the Kaspersky Security Center Administration Server.

To view the list of installed management MMC plug-ins:

  1. In the Kaspersky Security Center Administration Console tree, select the Administration Server: <server name> node, and open the Administration Server properties window in one of the following ways:
    • Using the Properties command in the context menu of the Administration Server <server name> node.
    • Using the Administration Server properties link in the workspace of the Administration Server <server name> node in the Administration Server section.
  2. In the list on the left, in the Additional section, select the Information about the installed application management plug-ins section.
Page top
[Topic 255961]

SVM deployment using the Integration Server Web Console

Before deployment, you need to download the SVM images and SVM image description files.

To deploy an SVM using Integration Server Web Console, you need to do the following:

  1. Configure the connection of the Integration Server to the virtual infrastructure in which you want to deploy the SVM.
  2. Create and run an SVM deployment task for the Integration Server in the selected infrastructure.

After it starts, the task appears in the task list in Integration Server Web Console, in the SVM management section, and is added to the task queue on the Integration Server. You can view information about each task and its execution status.

Upon successful completion of the task, the SVM is deployed to the selected infrastructure.

In this section:

Connecting the Integration Server and the virtual infrastructure

Creating and running an SVM deployment task

Viewing information about task execution

Page top
[Topic 256288]

Connecting the Integration Server and the virtual infrastructure

To configure the Integration Server's connection to the virtual infrastructure:

  1. Open Integration Server Web Console and connect to the Integration Server.
  2. Go to the List of virtual infrastructures section.
  3. Click the Add button.
  4. In the Add virtual infrastructure window that opens, specify the following required settings:
    • Infrastructure object type

      Type of the virtual infrastructure object that the Integration Server will connect to.

      Depending on the type of virtual infrastructure, select a hypervisor, virtual infrastructure administration server, or Keystone microservice.

    • Protocol

      Protocol used to connect the Integration Server to the virtual infrastructure. By default, HTTPS protocol is used.

      The Protocol field is displayed if you are configuring a connection to a virtual infrastructure based on the OpenStack platform, VK Cloud platform or TIONIX Cloud Platform.

    • Infrastructure object address

      Address of the virtual infrastructure object that the Integration Server will connect to. Depending on the type of virtual infrastructure, you need to specify the hypervisor address or the address of the virtual infrastructure administration server. To connect to an OpenStack-based infrastructure, you need to specify the address of the Keystone microservice.

      The address can be specified as the IP address in IPv4 format or the fully qualified domain name (FQDN).

      In this field, you can also specify the port used to connect to the virtual infrastructure object in the format <IP address>:<port>.

      If you are configuring a connection to Microsoft Windows Server (Hyper-V) hypervisors that are part of a hypervisor cluster managed by the Windows Failover Clustering service, you can specify the address of the cluster. All hypervisors that are part of the cluster will be added to the list.

      If you are using the Linux-based Integration Server, SVM deployment in a virtual infrastructure based on Microsoft Hyper-V is not supported.

      If you are configuring a connection to VMware ESXi hypervisors managed by VMware vCenter Servers running in Linked mode, you can specify the address of any of these VMware vCenter Servers. All the hypervisors running on VMware vCenter servers in Linked mode will be added to the list.

      If you are configuring a connection to an infrastructure managed by Nutanix Prism Element, you need to specify the Nutanix Prism Element address. If the infrastructure is managed by Nutanix Prism Central, specify the Nutanix Prism Central address. All Nutanix Prism Element servers managed by Nutanix Prism Central will be added to the list.

    • Account settings for connecting to the infrastructure with administrator rights:
      • OpenStack domain

        Name of the OpenStack domain that contains an account used to connect the Integration Server to the virtual infrastructure.

        The OpenStack domain field is displayed if you are configuring a connection to a virtual infrastructure based on the OpenStack platform, VK Cloud platform or TIONIX Cloud Platform.

      • User name

        Name of the user account that the Integration Server uses to connect to the virtual infrastructure during SVM deployment, removal and reconfiguration. This account must have privileges that are sufficient for SVM deployment, removal and reconfiguration.

      • Password

        Password of the user account that the Integration Server uses to connect to the virtual infrastructure during SVM deployment, removal and reconfiguration.

  5. In a virtual infrastructure based on XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, OpenStack, Alt Virtualization Server, Astra Linux, Numa vServer, VK Cloud platform, or TIONIX Cloud Platform, we also recommend specifying an account that has limited rights to perform actions in the virtual infrastructure. Under this account, the Integration Server will connect to the virtual infrastructure while Kaspersky Security is running in order to get information about SVMs available for connection and to distribute Light Agents between SVMs.

    To set restricted permissions for a user account:

    1. Click Add an account with restricted permissions in the Account with restricted permissions section.
    2. In the window that opens, specify the account name and password.
    3. Click the Save button.

    If an account with restricted permissions is not configured the Integration Server uses the same user account that is used for SVM deployment, removal and reconfiguration, to connect to the virtual infrastructure while Kaspersky Security is running.

    In a virtual infrastructure running on the Microsoft Hyper-V platform, you can connect to the virtual infrastructure during Kaspersky Security operation only by using the same user account that is used for SVM deployment, removal and reconfiguration.

  6. In a virtual infrastructure based on the VMware vSphere platform, you can configure the use of VMware NSX Manager by the Kaspersky Security solution:
    1. Click the Specify VMware NSX Manager connection settings button in the VMware NSX Manager block.
    2. This opens a window; in that window, specify the following settings:
      • Address

        New IP address in IPv4 format or the fully qualified domain name (FQDN) of the VMware NSX Manager.

        If your VMware NSX Manager virtual infrastructure is clustered, specify the virtual IP address of the cluster. First, you need to assign a virtual IP address and certificate to the cluster (for more information on configuring a VMware NSX Manager cluster, see the VMware documentation).

      • User name

        Name of the account that the Integration Server uses to connect to VMware NSX Manager. A VMware NSX Manager account that has been assigned the Enterprise Administrator role is required.

      • Password

        Password of the account that the Integration Server uses to connect to VMware NSX Manager.

    3. Click the Save button in the VMware NSX Manager settings window.
  7. Click the Save button in the Add virtual infrastructure window.

    The Integration Server adds the selected virtual infrastructure objects to the list and attempts to establish a connection.

    The Integration Server verifies the authenticity of all virtual infrastructure objects with which the connection is established.

    Authenticity is not verified for a Microsoft Windows Server (Hyper-V) hypervisor.

    For Keystone microservices, authenticity is verified only when using the HTTPS protocol to connect the Integration Server to the virtual infrastructure.

    To verify authenticity, the Integration Server receives an SSL certificate or fingerprint of the public key from each virtual infrastructure object and verifies them.

    If the authenticity of the received certificate(s) cannot be established, the Verify certificate window opens with a message about this. Click the link in this window to view the details of the received certificate. If the certificate complies with the security policy of your organization, you can confirm the authenticity of the certificate and continue connecting to the virtual infrastructure object. The received certificate will be installed as a trusted certificate on the device where the Integration Server is installed. If you do not consider this certificate to be authentic, click the Cancel connection button in the Verify certificate window to disconnect, and replace the certificate with a new one.

    If the authenticity of the open key could not be established, the Verify public key fingerprint window opens with a message about this. You can confirm the authenticity of the open key and continue the connection. The public key fingerprint will be saved on the device where the Integration Server is installed. If you do not consider this open key to be authentic, click the Cancel connection button in the Verify public key fingerprint window to terminate the connection.

    If a connection to a virtual infrastructure object could not be established, information about connection errors is displayed in the list of infrastructures in the Status column.

Using the buttons above the table, you can:

  • refresh the list of virtual infrastructures
  • sort and search the list
  • edit the settings for connecting the Integration Server to virtual infrastructures
  • delete settings for connecting to virtual infrastructures
  • export the list in CSV format
Page top
[Topic 74376][Topic 145525]

Selecting infrastructure for SVM deployment

At this step, the table displays information about the virtual infrastructures to which connections are configured for the Integration Server. If SVMs are already deployed in the virtual infrastructure, the table also contains information about them. Each row of the table displays the following information about the virtual infrastructure:

  • Name/Address

    This column contains the IP addresses or fully qualified domain names (FQDN) of the virtual infrastructure objects to which the Integration Server connects, and the names of the SVMs deployed on the hypervisors.

    Depending on the type of virtual infrastructure, the column may display:

    • IP address or the fully qualified domain name (FQDN) of the virtual infrastructure administration server
    • IP address or the fully qualified domain name of the hypervisor
    • IP address or the fully qualified domain name of the Keystone microservice
    • OpenStack project and domain name.
  • Status

    This column contains information about the status of the Integration Server's connection to the virtual infrastructure, the state of the infrastructure objects to which the connection is made, and the state of the SVMs deployed in the infrastructure.

    If the Integration Server is not connected to the virtual infrastructure object, the column displays an error message.

  • Infrastructure object type

    The column contains the type of the virtual infrastructure object that the Integration Server will connect to.

  • SVM version

    This column contains the SVM version number.

You can search the list of virtual infrastructure objects based on the Name/Address column. The table displays only those virtual infrastructure objects that meet the search criteria. To reset the search results, delete the contents of the search field.

You can update the list of virtual infrastructure objects using the Refresh button above the table. When updating a list, the Integration Server verifies the SSL certificates or fingerprints of the public key, just like what happens when adding virtual infrastructure objects to the list.

To select infrastructure for SVM deployment:

  1. Depending on the type of the virtual infrastructure, select checkboxes in the table to the left of the names of the hypervisors on which you want to deploy an SVM, or the OpenStack projects in which you want to deploy an SVM. You can select hypervisors or OpenStack projects to which the Integration Server has successfully connected.

    If SVMs are being deployed in an infrastructure based on the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform, simultaneous SVM deployment in different infrastructures is not supported. You can deploy SVMs in only one of these infrastructures at a time, or in one or more infrastructures of other types.

    The simultaneous deployment of SVMs within OpenStack projects, which are running on different Keystone microservices, is not supported. You can simultaneously deploy SVMs only in OpenStack projects that are running on the same Keystone microservice.

    Simultaneous deployment of SVMs to hypervisors of different types (for example, to a VMware ESXi hypervisor and a KVM hypervisor) is not supported.

  2. If you want to allow parallel deployment of multiple SVMs, select the Allow parallel deployment of N SVMs check box and specify the number of SVMs that should be deployed in parallel.

Proceed to the next step of the wizard.

Page top
[Topic 99492]

Selecting the SVM image

At this step, select the file of the SVM image for deployment. The SVM image file and SVM image description file (in XML format) must be placed on the device where the Integration Server is installed, into a single folder that the Integration Server has read access to.

To specify the SVM image, in the field, enter the path to the SVM image description file (in XML format) relative to the file system of the device on which the Integration Server is installed, and click the Select button.

The Wizard automatically selects the required SVM image file:

  • An XVA file for deployment on a XenServer hypervisor or on a Numa vServer hypervisor.
  • An OVA file for deployment on a VMware ESXi hypervisor.
  • A QCOW2 file for deployment on a KVM hypervisor (including on a KVM hypervisor running on OpenStack platform, Astra Linux, VK Cloud Platform or TIONIX Cloud Platform), on a Proxmox VE hypervisor, on a R-Virtualization hypervisor, on a HUAWEI FusionCompute CNA hypervisor, on a Nutanix AHV hypervisor, or on an ALT Virtualization Server platform basic hypervisor.

The window displays the following information about the selected image:

  • Vendor is the name of the vendor of the solution that the SVM is part of.
  • Publisher is the name of the publisher of the solution that the SVM is part of. If the image is authentic, the Publisher field displays the value AO Kaspersky Lab.

    If the authenticity of the image has not been verified, an error message is displayed at the top of the window, and Unknown is displayed in the Publisher field.

    If the authenticity of the image has not been verified, it is recommended to use a different image for SVM deployment. To do this, you need to re-download the archive with the files necessary for SVM deployment.

  • Solution name is the name of the solution that the SVM is part of.
  • SVM version is the SVM version number.
  • Description is a brief description of the SVM image.
  • Virtual drive size is the amount of disk space required to deploy the SVM.

It is recommended to validate the SVM image. To do so, click the Validate button in the SVM image integrity check section. The verification results are displayed in the window as follows:

  • If the image file integrity check is successful, the Completed successfully message is displayed.
  • If the image file gets modified or corrupted while being transmitted from the publisher to the end user or if the image format is not supported, the upper part of the window shows an error message and the SVM image integrity check section displays information about the detected problem.

If an SVM image file integrity check ended with an error, it is recommended to use a different image for SVM deployment. To do this, you need to re-download the archive with the files necessary for SVM deployment.

If the authenticity of an image has been verified and the image file integrity check completed successfully, proceed to the next step of the Wizard.

If the authenticity of an image has not been verified or an image file integrity check has not been performed or ended with an error but you accept the risk and want to use the selected SVM image, to proceed to the next step of the Wizard you need to select the check box located in the lower part of the window.

Page top
[Topic 99493]

Selecting the number of SVMs for deployment (infrastructures based on OpenStack)

This step is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

For this step, you must specify the number of SVMs to be deployed on the hypervisors within each selected OpenStack project. The OpenStack project name column displays the name of the project that the SVM will be deployed in, as well as the project path in the infrastructure.

In the Number of SVMs column, specify the number of SVMs to be deployed on the hypervisors within the OpenStack project.

Proceed to the next step of the wizard.

Page top
[Topic 99494]

Specifying SVM settings

This step is displayed if you are deploying the SVM to a virtual infrastructure based on Microsoft Hyper-V, XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, Alt Virtualization Server, Astra Linux, or Numa vServer.

At this step, you need to specify the name of the SVM and select the storage on the hypervisor where the SVM will be deployed. The Hypervisor address column displays the IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM will be deployed.

Specify the following settings:

  • SVM name

    An arbitrary name for new SVM.

  • Storage

    Data storage for SVM image.

    The drop-down list displays the storage repositories available for SVM deployment.

    If you are deploying SVMs on a Microsoft Windows Server (Hyper-V) hypervisor that is part of a cluster, only shared repositories can be selected in the list.

    If you are deploying SVMs on a Microsoft Windows Server (Hyper-V) hypervisor that is not part of a cluster, you can manually enter the path to the repository.

Proceed to the next step of the wizard.

Page top
[Topic 99495]

Specifying SVM settings (infrastructures based on OpenStack)

This step is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

On this step, you must specify deployment settings for each SVM that is to be deployed within the selected OpenStack projects. The OpenStack project name column displays the name of the project that the SVM will be deployed in, as well as the project path in the infrastructure.

Specify the following settings required for SVM deployment:

  • SVM name

    An arbitrary name for new SVM.

  • Virtual machine type

    Virtual machine type (instance type) determines RAM volume, disk size, number of CPU cores, and other settings of created virtual machine.

    Select appropriate virtual machine type for SVM deployment from available types for OpenStack project. Virtual machine type must match recommendations of Kaspersky experts concerning the resource allocation for SVMs.

    If there is no virtual machine of the suitable type in the list, use the virtual infrastructure to create the required virtual machine type. After that, to refresh the list of available virtual machine types, you can go back to the infrastructure selection step and select the Refresh button or restart the SVM deployment procedure.

You can also specify the following settings:

  • Volume type

    Volume type determines which data storage will be used for disk creation during the SVM deployment. Select a volume type from available types for OpenStack project.

  • Availability zone

    A logical collection of hypervisors used to provide fault tolerance in infrastructures based on OpenStack. Select an availability zone into which the SVM will be located.

  • Server group

    Grouping of virtual machines according to the policy that determines the hypervisors on which virtual machines will be started. Select a Server group, into which the SVM will be located.

Proceed to the next step of the wizard.

Page top
[Topic 99496]

Configuring SVM network settings (infrastructures based on OpenStack)

For this step, you must specify network settings for each SVM to be deployed.

The window displays the following information:

  • Hypervisor address

    IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM will be deployed.

    The Hypervisor address column is displayed if you are deploying the SVM to a virtual infrastructure based on Microsoft Hyper-V, XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, Alt Virtualization Server, Astra Linux, or Numa vServer.

  • OpenStack project name

    Name of the OpenStack project selected for SVM deployment, as well as project path in the infrastructure.

    The OpenStack project name column is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

    • SVM name

      The name that was defined when specifying SVM settings.

For each SVM, specify one or more virtual networks in the Network name column.

The name of the virtual network that the SVM will use to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

You can specify one or more virtual networks. To add a field for selecting virtual networks, use the button located next to the network selection field.

If you intend to use dynamic IP addressing (DHCP) for all SVMs, the network settings will be received from the DHCP server via the first virtual network in the list of networks specified for each SVM. Make sure that the Wizard can connect to the SVM with the network settings of the first virtual network received from the DHCP server.

If the virtual infrastructure uses the VMware Distributed Virtual Switch component, you can specify a Distributed Virtual Port Group to which the SVM will be connected.

You can also specify the following settings:

  • VLAN ID

    The ID of the virtual local area network (VLAN) that the SVM will use to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

    If VLAN is not used, the column shows No.

    The VLAN ID column is displayed if you are deploying the SVM in a virtual infrastructure based on Microsoft Hyper-V platform or in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

  • Security group

    Set of network traffic filtering rules that are created in the virtual infrastructure and applied in the virtual network.

    The drop-down list displays all available security groups. You can specify one or more security groups for each selected virtual network. To select a security group, select the check box to the left of its name. The names of the selected security groups are displayed in the field.

    The Security group column is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

Proceed to the next step of the wizard.

Page top
[Topic 101165]

Configuring IP address settings for SVM

For this step, you must specify IP addressing settings for all SVMs. You can use dynamic or static IP addressing.

If you want to specify all network settings of the SVM manually, select:

  1. Select Static IP addressing. This opens a table containing the following information:
    • Hypervisor address

      IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM will be deployed.

      The Hypervisor address column is displayed if you are deploying the SVM to a virtual infrastructure based on Microsoft Hyper-V, XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, Alt Virtualization Server, Astra Linux, or Numa vServer.

    • OpenStack project name

      Name of the OpenStack project selected for SVM deployment, as well as project path in the infrastructure.

      The OpenStack project name column is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

    • SVM name

      The name that was defined when specifying SVM settings.

    • Network name

      The name of the virtual network that the SVM uses to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

  2. Specify the following IP addressing settings for each SVM:
    • DNS server
    • alternative DNS server
    • SVM IP address
    • Subnet mask
    • gateway

    If you specified several virtual networks for the SVM at the previous step, specify the settings for each virtual network.

If you want to use DHCP network settings for all SVMs:

  1. Select Dynamic IP addressing (DHCP).

    By default, the IP address of the DNS server and the IP address of the alternative DNS server received over the DHCP protocol are used for each SVM (the Use list of DNS servers received via DHCP check box is selected). If you specified several virtual networks for the SVM at the previous step, by default the network settings for the SVM are received from the DHCP server of the first virtual network in the list of the specified virtual networks.

  2. If you want to manually specify the IP address of the DNS server and alternative DNS server, clear the Use list of DNS servers received via DHCP check box. This opens a table containing the following information:
    • Hypervisor address

      IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM will be deployed.

      The Hypervisor address column is displayed if you are deploying the SVM to a virtual infrastructure based on Microsoft Hyper-V, XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, Alt Virtualization Server, Astra Linux, or Numa vServer.

    • OpenStack project name

      Name of the OpenStack project selected for SVM deployment, as well as project path in the infrastructure.

      The OpenStack project name column is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

    • SVM name

      The name that was defined when specifying SVM settings.

    Specify the IP addresses of DNS servers in the DNS server and Alternative DNS server table columns.

Proceed to the next step of the wizard.

Page top
[Topic 101197]

Specifying Kaspersky Security Center connection settings

At this step, you must specify the settings of SVM connection to the Kaspersky Security Center Administration Server.

Specify the following settings:

  • Address

    Address of the device hosting the Kaspersky Security Center Administration Server. You can specify the IP address in IPv4 format or the fully qualified domain name (FQDN) of the device.

  • Port

    Number of the port for connecting the SVM to the Kaspersky Security Center Administration Server.

  • SSL port

    Number of the port for connecting an SVM to the Kaspersky Security Center Administration Server using an SSL certificate.

Proceed to the next step of the wizard.

Page top
[Topic 101200]

Creating the configuration password and the root account password

At this step, you need to create a klconfig account password (configuration password) and a root account password on the SVM.

The configuration password is required for SVM reconfiguration. The root user account is used for access to the operating system on SVMs.

Enter passwords for each account into the Password and Confirm password fields.

Passwords must be no longer than 60 characters. You can use only letters of the Latin alphabet (uppercase and lowercase letters), numerals, and the following special characters: ! # $ % & ' ( ) * " + , - . / \ : ; < = > _ ? @ [ ] ^ ` { | } ~. For security purposes, you are advised to set passwords that are at least 8 characters long and use at least three of the four categories of characters: lowercase letters, uppercase letters, numerals, and special characters.

If you want to configure access to SVMs over SSH under the root account, select the Allow remote access to SVM for the root account via SSH check box.

Proceed to the next step of the wizard.

Page top
[Topic 101201]

Start task for SVM deployment

This step is displayed if you are deploying the SVM to a virtual infrastructure based on Microsoft Hyper-V, XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, Alt Virtualization Server, Astra Linux, or Numa vServer.

This step displays all the settings of the created SVM deployment task for the Integration Server:

  • The task name is generated automatically and contains the task type. You can use this name to find the task in the list in Integration Server Web Console, in the SVM management section.
  • The list at the top of the window contains general settings for all SVMs that will be deployed by the task:
    • SVM image description file

      The full path and name of the SVM image description file (in XML format) that you specified at the SVM image selection step.

    • SVM IP settings

      Method of configuring IP addressing settings.

      Possible values: Dynamic IP addressing using the list of DNS servers received via DHCP, Dynamic IP addressing using the list of manually defined DNS servers, Static IP addressing.

    • SSH-based remote access to the SVM for the root account

      Remote access to the SVM over SSH for the root user account.

      Possible values: Allowed, Blocked.

    • Kaspersky Security Center connection settings

      IP address in IPv4 format or fully qualified domain name (FQDN) of the device hosting the Kaspersky Security Center Administration Server, and port numbers for connecting the SVM to the Kaspersky Security Center Administration Server.

    • Parallel deployment

      The number of SVMs to be deployed concurrently.

  • The table at the bottom of the window contains individual settings for each SVM:
    • Hypervisor address

      IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM will be deployed.

    • SVM name

      The name that was defined when specifying SVM settings.

    • Storage

      Data storage for SVM image.

    • Network name

      The name of the virtual network that the SVM uses to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

    • VLAN ID

      The ID of the virtual local area network (VLAN) that the SVM uses to connect to virtual machines, the Integration Server and the Kaspersky Security Center Administration Server.

      The VLAN ID is displayed if you are deploying the SVM in the virtual infrastructure running on Microsoft Hyper-V platform.

    • All IP addressing settings that you provided for the SVM.

To start the SVM deployment task, click the Start button.

You can monitor the task progress in Integration Server Web Console, in the SVM management section.

Page top
[Topic 101202]

Starting an SVM deployment task (OpenStack-based infrastructure)

This step is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

This step displays all the settings of the created SVM deployment task for the Integration Server:

  • The task name is generated automatically and contains the task type. You can use this name to find the task in the list in Integration Server Web Console, in the SVM management section.
  • The list at the top of the window contains general settings for all SVMs that will be deployed by the task:
    • Keystone microservice address

      IP address or fully qualified domain name (FQDN) of the Keystone microservice that manages the OpenStack project in which the SVMs are being deployed.

    • SVM image description file

      The full path and name of the SVM image description file (in XML format) that you specified at the SVM image selection step.

    • SVM IP settings

      Method of configuring IP addressing settings.

      Possible values: Dynamic IP addressing using the list of DNS servers received via DHCP, Dynamic IP addressing using the list of manually defined DNS servers, Static IP addressing.

    • SSH-based remote access to the SVM for the root account

      Remote access to the SVM over SSH for the root user account.

      Possible values: Allowed, Blocked.

    • Kaspersky Security Center connection settings

      IP address in IPv4 format or fully qualified domain name (FQDN) of the device hosting the Kaspersky Security Center Administration Server, and port numbers for connecting the SVM to the Kaspersky Security Center Administration Server.

    • Parallel deployment

      The number of SVMs to be deployed concurrently.

  • The table at the bottom of the window contains individual settings for each SVM:
    • OpenStack project name

      Name of the OpenStack project selected for SVM deployment, as well as project path in the infrastructure.

    • SVM name

      The name that was defined when specifying SVM settings.

    • Virtual machine type

      Type of virtual machine (instance type) selected for SVM.

    • Volume type

      Volume type to be used during SVM deployment.

    • Availability zone

      Logical collection of hypervisors where the SVM will be located.

    • Server group

      Group of virtual machines in which the SVM will be located.

    • Network name

      The name of the virtual network that the SVM uses to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

    • VLAN ID

      The ID of the virtual local area network (VLAN) that the SVM uses to connect to virtual machines, the Integration Server and the Kaspersky Security Center Administration Server.

    • Security group

      Security group selected for the virtual network.

    • All IP addressing settings that you provided for the SVM.

    To start the SVM deployment task, click the Start button.

You can monitor the task progress in Integration Server Web Console, in the SVM management section.

Page top
[Topic 274163]

Viewing information about task execution

You can monitor the progress of tasks in Integration Server Web Console, in the SVM management section.

To view information about a task for the Integration Server:

  1. Open Integration Server Web Console and connect to the Integration Server.
  2. Go to the SVM management section.

    In the window that opens, a list of tasks for the Integration Server is displayed as a table. The list contains the Integration Server tasks that you created and ran using the wizard (SVM deployment, reconfiguration, and removal tasks), as well as SVM image verification tasks that are created automatically when you run an SVM image file integrity check while creating SVM deployment tasks. The task is placed in the list immediately after its creation and is automatically deleted from the list some time after the task has been completed (successfully or with an error) or canceled. By default, completed or canceled tasks are listed for 60 minutes.

    If necessary, you can cancel tasks that have not yet been completed. To do this, select the task in the list and click the Cancel button located above the table.

    For tasks that are running, their progress is displayed. If a task completes with an error, an error message is displayed.

  3. To view detailed information about a task, click on the task name.

    The window that opens displays the following information about the selected task:

    • Task name
    • Task type
    • Time when the task was created
    • Time when the task transitioned from the current status
    • Current task status and an error message if the task was completed with an error
    • List of all SVMs on which the task is running, and the progress of the task on each SVM Each row in the list contains the following information:
      • SVM name
      • IP address of the SVM in IPv4 format
      • Task status on the SVM, and an error message if the task was completed with an error
      • Location of the SVM in the virtual infrastructure (address and type of hypervisor or the OpenStack project name, address and type of infrastructure)
  4. For Deployment or Reconfiguration tasks, you can view information about the execution of stages of a task on the selected SVM. To open the list of stages, click on the SVM name in the list.

    In the window that opens, information about the execution of each stage of the task on an individual SVM is displayed in the form of a table:

    • Stage name
    • Stage start time
    • Stage execution status and error message if an error occurred at this stage
    • Stage end time
Page top
[Topic 274211]

Deploying SVMs using the Integration Server Console

If you use the Integration Server Console, SVMs are deployed using the SVM Management Wizard, which is launched from the Integration Server Console.

Following the instructions of the SVM Management Wizard, you need to configure the wizard's connection to the virtual infrastructure, specify all the SVM deployment settings, and start the deployment.

Information about SVM deployment results is displayed in the last step of the wizard.

Before deployment, you need to download the SVM images and SVM image description files.

To deploy SVMs using the Integration Server Console:

  1. Open Integration Server Console and connect to the Integration Server.
  2. In the SVM management section, click the SVM management button to start the SVM Management Wizard.
  3. Follow the wizard instructions.
Page top
[Topic 256012]

Selecting an action

At this step, choose the SVM deployment option.

Proceed to the next step of the wizard.

Page top
[Topic 74370]

Selecting infrastructure for SVM deployment

At this step, you need to select the virtual infrastructure in which you want to deploy the SVM. If SVM deployment was not previously performed in this virtual infrastructure, you need to configure the connection of the SVM Management Wizard to the virtual infrastructure. Then select the hypervisors or OpenStack projects for SVM deployment depending on the type of virtual infrastructure.

To configure the connection of SVM Management Wizard to the virtual infrastructure:

  1. Click the Add button.
  2. In the Virtual infrastructure connection settings window that opens, specify the following settings:
    • Type

      Type of virtual infrastructure object that SVM Management Wizard will connect to.

      Depending on the type of virtual infrastructure, select a hypervisor, virtual infrastructure administration server, or Keystone microservice.

    • Protocol

      Protocol used to connect SVM Management Wizard to the virtual infrastructure. By default, the HTTPS protocol is used.

      The Protocol field is displayed if you are configuring a connection to a virtual infrastructure based on the OpenStack platform, VK Cloud platform or TIONIX Cloud Platform.

    • Addresses

      Addresses of the virtual infrastructure objects that SVM Management Wizard will connect to.

      Depending on the type of virtual infrastructure, you need to specify the hypervisor address or the address of the virtual infrastructure administration server. To connect to an OpenStack-based infrastructure, you need to specify the address of the Keystone microservice.

      The address can be specified as the IP address in IPv4 format or the fully qualified domain name (FQDN).

      You can specify multiple addresses by separating them with a semicolon, a space, or a new line. The number of correctly recognized addresses is shown under the list of addresses.

      In this field, you can also specify the port used to connect to the virtual infrastructure object in the format <IP address>:<port>.

      If you are configuring a connection to Microsoft Windows Server (Hyper-V) hypervisors that are part of a hypervisor cluster managed by the Windows Failover Clustering service, you can specify the address of the cluster. All hypervisors that are part of the cluster will be added to the list.

      If you are configuring a connection to VMware ESXi hypervisors managed by VMware vCenter Servers running in Linked mode, you can specify the address of any of these VMware vCenter Servers. All the hypervisors running on VMware vCenter servers in Linked mode will be added to the list.

      If you are configuring a connection to hypervisors that are managed by Microsoft SCVMM, you can specify the settings for connecting to Microsoft SCVMM. All hypervisors that are managed by Microsoft SCVMM will be added to the list.

      If you are configuring a connection to an infrastructure managed by Nutanix Prism Element, you need to specify the Nutanix Prism Element address. If the infrastructure is managed by Nutanix Prism Central, specify the Nutanix Prism Central address. All Nutanix Prism Element servers managed by Nutanix Prism Central will be added to the list.

    • OpenStack domain

      Name of the

      that contains an account used to connect SVM Management Wizard to the virtual infrastructure object.

      The OpenStack domain field is displayed if you are configuring a connection to a virtual infrastructure based on the OpenStack platform, VK Cloud platform or TIONIX Cloud Platform.

    • User name

      Name of the user account that the SVM Management Wizard uses to connect to the virtual infrastructure during SVM deployment, removal and reconfiguration. This account must have privileges that are sufficient for SVM deployment, removal and reconfiguration.

      If you use a domain account to connect to a virtual infrastructure object, you can specify the account name in the <domain>\<user name> or <user name>@<domain> format.

    • Password

      Password of the user account that the SVM Management Wizard uses to connect to the virtual infrastructure during SVM deployment, removal and reconfiguration.

  3. If you are deploying SVMs in a virtual infrastructure based on XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, OpenStack, Alt Virtualization Server, Astra Linux, Numa vServer, VK Cloud platform, or TIONIX Cloud Platform, to connect the Integration Server to the virtual infrastructure while Kaspersky Security is running, we recommend using an account that has limited rights to perform actions in the virtual infrastructure. Select the Account with restricted permissions check box and specify the settings of the user account that the Integration Server will use to connect to the virtual infrastructure during operation of Kaspersky Security.

    If the check box is cleared, during Kaspersky Security operation the Integration Server will connect to the virtual infrastructure using the same user account that is used for SVM deployment, removal and reconfiguration.

    In a virtual infrastructure running on the Microsoft Hyper-V platform, you can connect to the virtual infrastructure during Kaspersky Security operation only by using the same user account that is used for SVM deployment, removal and reconfiguration.

  4. Click the Connect button.

    The Virtual infrastructure connection settings window closes. The Wizard adds the selected virtual infrastructure objects to the list and attempts to establish a connection.

    The Wizard verifies the authenticity of all virtual infrastructure objects with which the connection is established.

    Authenticity is not verified for a Microsoft Windows Server (Hyper-V) hypervisor.

    For Keystone microservices, authenticity is verified only when using the HTTPS protocol to connect the SVM Management Wizard to the virtual infrastructure.

    To verify authenticity, the Wizard receives the SSL certificate or fingerprint of the public key from each virtual infrastructure object and verifies them.

    If the authenticity of the received certificate(s) cannot be established, the Verify certificate window opens with a message about this. Click the link in this window to view the details of the received certificate. If the certificate complies with the security policy of your organization, you can confirm the authenticity of the certificate and continue connecting to the virtual infrastructure object. The received certificate will be installed as a trusted certificate on the device where the Kaspersky Security Center Administration Console is installed. If you do not consider this certificate to be authentic, click the Cancel button in the Verify certificate window to disconnect, and replace the certificate with a new one.

    If the authenticity of the open key could not be established, the Verify public key fingerprint window opens with a message about this. You can confirm the authenticity of the open key and continue the connection. The open key fingerprint will be saved on the device where the Kaspersky Security Center Administration Console is installed. If you do not consider this open key to be authentic, click the Cancel button in the Verify public key fingerprint window to terminate the connection.

    If a connection cannot be established with a virtual infrastructure object, information about the connection errors is displayed in the table.

The table displays information about the virtual infrastructures to which connections are configured in the SVM Management Wizard. If SVMs are already deployed in the virtual infrastructure, the table also contains information about them. Each row of the table displays a hierarchical list of virtual infrastructure objects and the following information:

  • Name/Address

    Depending on the type of virtual infrastructure, the column may contain the following:

    • IP address or the fully qualified domain name (FQDN) of the virtual infrastructure administration server
    • IP address or the fully qualified domain name of the hypervisor
    • IP address or the fully qualified domain name of the Keystone microservice
    • Name of the OpenStack domain
    • Name of the OpenStack project
    • Name of the SVM deployed on the hypervisor

    If SVM deployment is restricted, or if a connection with the virtual infrastructure cannot be established, the warning icon is displayed. A description of the restriction or connection error is shown in the table and in the tooltip of the warning sign.

  • State

    This column contains information on the state of the virtual infrastructure object or the SVM.

    For the hypervisor, one of the following values is specified: Enabled or Disabled. If a connection to the hypervisor cannot be established, the column shows Disconnected.

    For the Keystone microservice, the OpenStack project, and the OpenStack domain, one of the following values is specified: Enabled or Disconnected.

    One of the following values is specified for an SVM: Enabled, Disabled.

  • Protection

    This column contains the SVM version number.

  • Type

    This column contains the type of virtual infrastructure object that the SVM Management Wizard will connect to.

You can search the list of virtual infrastructure objects based on the Name/Address column. The search starts as you type in the Search field. The table displays only those virtual infrastructure objects that meet the search criteria. To reset the search results, delete the contents of the Search field.

You can update the list of virtual infrastructure objects using the Refresh button above the table. When updating a list, the Wizard verifies the SSL certificates or fingerprints of the public key, just like what happens when adding virtual infrastructure objects to the list.

You can use buttons in the Name/Address column to:

  • Remove selected virtual infrastructure from the list.

    The Integration Server continues to connect to the virtual infrastructure removed from this list, and to receive the information required for SVM operation.

  • If you cannot connect to the virtual infrastructure, open the Virtual infrastructure connection settings window to change the settings of the account used to make the connection.

    After the settings are modified, the Wizard verifies the SSL certificates or fingerprints of the public key, just like what happens when adding virtual infrastructure objects to the list.

To select infrastructure for SVM deployment:

  1. Depending on the type of the virtual infrastructure, select check boxes in the table to the left of the names of the hypervisors on which you want to deploy an SVM, or the OpenStack projects in which you want to deploy an SVM.

    You can select hypervisors or OpenStack projects that are not subject to SVM deployment restrictions.

    If SVMs are being deployed in an infrastructure based on the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform, simultaneous SVM deployment in different infrastructures is not supported. You can deploy SVMs in only one of these infrastructures at a time, or in one or more infrastructures of other types.

    The simultaneous deployment of SVMs within OpenStack projects, which are running on different Keystone microservices, is not supported. You can simultaneously deploy SVMs only in OpenStack projects that are running on the same Keystone microservice.

  2. If you want to allow concurrent deployment of multiple SVMs, select the Allow parallel deployment on N hypervisors or Allow parallel deployment on N SVMs check box (depending on the type of virtual infrastructure) and specify the number of SVMs to be deployed concurrently.

Proceed to the next step of the wizard.

Page top
[Topic 265505]

Selecting the SVM image

At this step, select the file of the SVM image for deployment on the hypervisor. The SVM image file and SVM image description file (in XML format) must be placed in the same folder on the device where the Kaspersky Security Center Administration Console is installed, or in the same folder on a network resource to which the user account performing the installation has read access. If you are installing the Protection Server on different types of hypervisors, the SVM image files for each type of hypervisor and the SVM image description file must be located in the same folder.

To specify the SVM image, click Browse and in the window that opens select the SVM image description file (in XML format).

After a file has been selected, the field to the left of the button displays the full path to the file and its name. The Wizard automatically selects the required SVM image file:

  • A VHDX file for deployment on a Microsoft Windows Server (Hyper-V) hypervisor.
  • An XVA file for deployment on a XenServer hypervisor or on a Numa vServer hypervisor.
  • An OVA file for deployment on a VMware ESXi hypervisor.
  • A QCOW2 file for deployment on a KVM hypervisor (including on a KVM hypervisor running on OpenStack platform, Astra Linux, VK Cloud Platform or TIONIX Cloud Platform), on a Proxmox VE hypervisor, on a R-Virtualization hypervisor, on a HUAWEI FusionCompute CNA hypervisor, on a Nutanix AHV hypervisor, or on an ALT Virtualization Server platform basic hypervisor.

The window displays the following information about the selected image:

  • Vendor is the name of the vendor of the solution that the SVM is part of.
  • Publisher is the name of the publisher of the solution that the SVM is part of.
  • Solution name is the name of the solution that the SVM is part of.
  • SVM version is the version number of the SVM image.
  • Description is a brief description of the SVM image.
  • Virtual drive size is the amount of disk space required to deploy the SVM.

The Wizard verifies the authenticity of the image. The verification results are displayed in the window as follows:

  • If the image is authentic, the Publisher field displays the value AO Kaspersky Lab.
  • If the authenticity of the image has not been verified, an error message is displayed at the top of the window, and Unknown is displayed in the Publisher field.

If the authenticity of the image has not been verified, it is recommended to use a different image for SVM deployment. To do this, you need to re-download the archive with the files necessary for SVM deployment using the Kaspersky Security Components Installation Wizard or on the Kaspersky website.

The SVM image integrity check section displays information about the results of SVM image file integrity check for each type of hypervisor. If integrity check was not performed, the Validation not performed message is displayed.

It is recommended to validate the SVM image. To do so, click the Validate button in the SVM image integrity check section. The verification results are displayed in the window as follows:

  • If the image file successfully passed the integrity check, the Valid message is displayed.
  • If the image file gets modified or corrupted while being transmitted from the publisher to the end user or if the image format is not supported, the upper part of the window shows an error message and the SVM image integrity check section displays information about the detected problem.

If an SVM image file integrity check ended with an error, it is recommended to use a different image for SVM deployment. To do this, you need to re-download the archive with the files necessary for SVM deployment using the Kaspersky Security Components Installation Wizard or on the Kaspersky website.

If the authenticity of an image has been verified and the image file integrity check completed successfully, proceed to the next step of the Wizard.

If the authenticity of an image has not been verified or an image file integrity check has not been performed or ended with an error but you accept the risk and want to use the selected SVM image, to proceed to the next step of the Wizard you need to select the check box located in the lower part of the window.

Page top
[Topic 256123]

Selecting the number of SVMs for deployment (infrastructures based on OpenStack)

This step is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

For this step, you must specify the number of SVMs to be deployed on the hypervisors within each selected OpenStack project. The OpenStack project column displays the name of the project that the SVM will be deployed in, as well as the project path in the infrastructure.

In the Number of SVMs column, specify the number of SVMs to be deployed on the hypervisors within the OpenStack project.

Proceed to the next step of the wizard.

Page top
[Topic 77368]

Specifying SVM settings

This step is displayed if you are deploying the SVM to a virtual infrastructure based on Microsoft Hyper-V, XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, Alt Virtualization Server, Astra Linux, or Numa vServer.

For this step, you must specify deployment options for each SVM to be deployed on the selected hypervisors. The Hypervisor column displays the IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM will be deployed.

Specify the following settings required for SVM deployment:

  • SVM name

    An arbitrary name for new SVM.

  • Storage

    Data storage for SVM image.

    The drop-down list displays the storage repositories available for SVM deployment.

    If you are deploying SVMs on a Microsoft Windows Server (Hyper-V) hypervisor that is part of a cluster, only shared repositories can be selected in the list.

    If you are deploying SVMs on a Microsoft Windows Server (Hyper-V) hypervisor that is not part of a cluster, you can manually enter the path to the repository.

  • Network name

    The name of the virtual network that the SVM will use to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

    You can specify one or more virtual networks available on the hypervisor. To add or remove a field for selecting virtual networks, use the buttons next to the network selection field.

    If you intend to use dynamic IP addressing (DHCP) for all SVMs, the network settings will be received from the DHCP server via the first virtual network in the list of networks specified for each SVM. Make sure that the Wizard can connect to the SVM with the network settings of the first virtual network received from the DHCP server.

    If the virtual infrastructure uses the VMware Distributed Virtual Switch component, you can specify a Distributed Virtual Port Group to which the SVM will be connected.

If you are deploying an SVM in a virtual infrastructure running the Microsoft Hyper-V platform, you can also specify the VLAN ID.

The ID of the virtual local area network (VLAN) that the SVM will use to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

If VLAN is not used, the column shows No.

Proceed to the next step of the wizard.

Page top
[Topic 274239]

Specifying SVM settings (infrastructures based on OpenStack)

This step is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

On this step, you must specify deployment settings for each SVM that is to be deployed within the selected OpenStack projects. The OpenStack project column displays the name of the project that the SVM will be deployed in, as well as the project path in the infrastructure.

Specify the following settings required for SVM deployment:

  • SVM name

    An arbitrary name for new SVM.

  • Virtual machine type

    Virtual machine type (instance type) determines RAM volume, disk size, number of CPU cores, and other settings of created virtual machine.

    Select appropriate virtual machine type for SVM deployment from available types for OpenStack project. Virtual machine type must match recommendations of Kaspersky experts concerning the resource allocation for SVMs.

    If there is no virtual machine of the suitable type in the list, use the virtual infrastructure to create the required virtual machine type. After that, to refresh the list of available virtual machine types, you can go back to the infrastructure selection step and select the Refresh button or restart the SVM deployment procedure.

You can also specify the following settings:

  • Volume type

    Volume type determines which data storage will be used for disk creation during the SVM deployment. Select a volume type from available types for OpenStack project.

  • Availability zone

    A logical collection of hypervisors used to provide fault tolerance in infrastructures based on OpenStack. Select an availability zone into which the SVM will be located.

  • Server group

    Grouping of virtual machines according to the policy that determines the hypervisors on which virtual machines will be started. Select a Server group, into which the SVM will be located.

Proceed to the next step of the wizard.

Page top
[Topic 74377]

Configuring SVM network settings (infrastructures based on OpenStack)

This step is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

For this step, you must specify network settings for each SVM to be deployed within the selected OpenStack projects. The OpenStack project column displays the name of the project that the SVM will be deployed in, as well as the project path in the infrastructure.

For each SVM, specify one or more virtual networks in the Network name column.

The name of the virtual network that the SVM will use to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

You can specify one or more virtual networks available within the OpenStack project. To add or remove a field for selecting virtual networks, use the buttons next to the network selection field.

If you intend to use dynamic IP addressing (DHCP) for all SVMs, the network settings will be received from the DHCP server via the first virtual network in the list of networks specified for each SVM. Make sure that the Wizard can connect to the SVM with the network settings of the first virtual network received from the DHCP server.

You can also specify the following settings:

  • VLAN ID

    The ID of the virtual local area network (VLAN) that the SVM will use to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

    If a VLAN is not used, the column shows No.

  • Security group

    Set of network traffic filtering rules that are created in the virtual infrastructure and applied in the virtual network.

    You can specify one or more security groups for each selected virtual network. To add or remove a field for selecting security groups, use the buttons next to the Security groups selection field.

Proceed to the next step of the wizard.

Page top
[Topic 213310]

Configuring IP address settings for SVM

For this step, you must specify IP addressing settings for all SVMs. You can use dynamic or static IP addressing.

If you want to use DHCP network settings for all SVMs:

  1. Select Dynamic IP addressing (DHCP).

    By default, the IP address of the DNS server and the IP address of the alternative DNS server received over the DHCP protocol are used for each SVM (the Use list of DNS servers received via DHCP check box is selected). If you specified several virtual networks for the SVM at the previous step, by default the network settings for the SVM are received from the DHCP server of the first virtual network in the list of the specified virtual networks.

  2. If you want to manually specify the IP address of the DNS server and alternative DNS server, clear the Use list of DNS servers received via DHCP check box. This opens a table containing the following information:
    • Hypervisor

      IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM will be deployed.

      The Hypervisor column is displayed if you are deploying the SVM to a virtual infrastructure based on Microsoft Hyper-V, XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, Alt Virtualization Server, Astra Linux, or Numa vServer.

    • OpenStack project

      Name of the OpenStack project selected for SVM deployment, as well as project path in the infrastructure.

      The OpenStack project column is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

    • SVM name

      The name that was defined when specifying SVM settings.

    Specify the IP addresses of DNS servers in the DNS server and Alternative DNS server table columns.

If you want to specify all network settings of the SVM manually, select:

  1. Select Static IP addressing. This opens a table containing the following information:
    • Hypervisor

      IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM will be deployed.

      The Hypervisor column is displayed if you are deploying the SVM to a virtual infrastructure based on Microsoft Hyper-V, XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, Alt Virtualization Server, Astra Linux, or Numa vServer.

    • OpenStack project

      Name of the OpenStack project selected for SVM deployment, as well as project path in the infrastructure.

      The OpenStack project column is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

    • SVM name

      The name that was defined when specifying SVM settings.

    • Network name

      The name of the virtual network that the SVM uses to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

  2. Specify the following IP addressing settings for each SVM:
    • SVM IP address
    • Subnet mask
    • Gateway
    • DNS server
    • Alternative DNS

    If you specified several virtual networks for the SVM at the previous step, specify the settings for each virtual network.

Proceed to the next step of the wizard.

Page top
[Topic 274240]

Specifying Kaspersky Security Center connection settings

This step is performed if the wizard cannot automatically determine the settings for connecting to Kaspersky Security Center.

At this step, you must specify the settings of SVM connection to the Kaspersky Security Center Administration Server.

Specify the following settings:

  • Address

    Address of the device hosting the Kaspersky Security Center Administration Server. You can specify the IP address in IPv4 format or the fully qualified domain name (FQDN) of the device.

  • Port

    Number of the port for connecting the SVM to the Kaspersky Security Center Administration Server.

  • SSL port

    Number of the port for connecting an SVM to the Kaspersky Security Center Administration Server using an SSL certificate.

Proceed to the next step of the wizard.

Page top
[Topic 84172]

Creating the configuration password and the root account password

At this step, you need to create a klconfig account password (configuration password) and a root account password on the SVM.

The configuration password is required for SVM reconfiguration. The root user account is used for access to the operating system on SVMs.

Enter passwords for each account into the Password and Confirm password fields.

Passwords must be no longer than 60 characters. You can use only letters of the Latin alphabet (uppercase and lowercase letters), numerals, and the following special characters: ! # $ % & ' ( ) * " + , - . / \ : ; < = > _ ? @ [ ] ^ ` { | } ~. For security purposes, you are advised to set passwords that are at least 8 characters long and use at least three of the four categories of characters: lowercase letters, uppercase letters, numerals, and special characters.

If you want to configure access to SVMs over SSH under the root account, select the Allow remote access to SVM for the root account via SSH check box.

Proceed to the next step of the wizard.

Page top
[Topic 274241]

Starting SVM deployment

This step is displayed if you are deploying the SVM to a virtual infrastructure based on Microsoft Hyper-V, XenServer, VMware vSphere, KVM, Proxmox VE, Basis, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, Alt Virtualization Server, Astra Linux, or Numa vServer.

For this step, the wizard window displays all previously entered settings required for deploying the SVM:

General settings for all SVMs:

Individual settings for each SVM:

  • Hypervisor

    IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM will be deployed.

  • SVM name

    The name that was defined when specifying SVM settings.

  • Storage

    Data storage for SVM image.

  • Network name

    The name of the virtual network that the SVM uses to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

  • VLAN ID

    The ID of the virtual local area network (VLAN) that the SVM uses to connect to virtual machines, the Integration Server and the Kaspersky Security Center Administration Server.

    The VLAN ID is displayed if you are deploying the SVM in the virtual infrastructure running on Microsoft Hyper-V platform.

  • All IP addressing settings that you provided for the SVM.

To start deploying SVMs, go to the next step of the wizard.

Page top
[Topic 274242]

Starting SVM deployment (infrastructures based on OpenStack)

This step is displayed if you are performing SVM deployment in a virtual infrastructure managed by the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform.

For this step, the wizard window displays all previously entered settings required for deploying the SVM:

General settings for all SVMs:

  • Keystone microservice address

    IP address or fully qualified domain name (FQDN) of the Keystone microservice that manages the OpenStack project in which the SVMs are being deployed.

  • SVM image description file

    The full path and name of the SVM image description file (in XML format) that you specified at the SVM image selection step.

  • SVM IP settings

    Method of configuring IP addressing settings.

    Possible values: Dynamic IP addressing (DHCP), Static IP addressing.

  • SSH-based remote access to the SVM for the root account

    Remote access to the SVM over SSH for the root user account.

    Possible values: Allowed, Blocked.

  • Kaspersky Security Center connection settings

    IP address in IPv4 format or fully qualified domain name (FQDN) of the device hosting the Kaspersky Security Center Administration Server, and port numbers for connecting the SVM to the Kaspersky Security Center Administration Server.

  • Parallel deployment

    The number of SVMs to be deployed concurrently.

Individual settings for each SVM:

  • OpenStack project

    Name of the OpenStack project selected for SVM deployment, as well as project path in the infrastructure.

  • SVM name

    The name that was defined when specifying SVM settings.

  • Virtual machine type

    Type of virtual machine (instance type) selected for SVM.

  • Volume type

    Volume type to be used during SVM deployment.

  • Availability zone

    Logical collection of hypervisors where the SVM will be located.

  • Server group

    Group of virtual machines in which the SVM will be located.

  • Network name

    The name of the virtual network that the SVM uses to connect to Light Agents, the Integration Server and the Kaspersky Security Center Administration Server.

  • VLAN ID

    The ID of the virtual local area network (VLAN) that the SVM uses to connect to virtual machines, the Integration Server and the Kaspersky Security Center Administration Server.

  • Security group

    Security group selected for the virtual network.

  • All IP addressing settings that you provided for the SVM.

To start deploying SVMs, go to the next step of the wizard.

Page top
[Topic 274243]

SVM deployment

At this step, SVMs are deployed on hypervisors. The process takes some time. Please wait until deployment is complete.

The window shows, one row at a time, the stages of deployment of each SVM with the status of each stage: Processing N%, Pending, Skipped, Completed, Error.

After SVM deployment is complete, you are advised to make sure that the Integration Server is running and can be accessed by the SVM over the network.

If an error occurs on a hypervisor during the SVM deployment process, the Wizard rolls back the changes on this hypervisor. Deployment continues on the other hypervisors.

When deployment is completed, SVM is turned on automatically.

Proceed to the next step of the wizard.

Page top
[Topic 110000]

Finishing SVM deployment

This step displays information about the SVM deployment results in the virtual infrastructure.

You can use the links to open a brief report and the SVM Management Wizard log.

You can view the following information in the brief report:

  • Addresses of the hypervisors on which SVMs were deployed, or OpenStack projects, within which SVMs were deployed (depending on the type of virtual infrastructure).
  • Names of deployed SVMs.
  • Brief description of the completed stages of deployment of each SVM, including the start and end times of each stage. If an error occurred during a particular stage, the relevant information is reflected in the report.

The brief report is saved in a temporary file. To be able to use information from the report later, save the log file in a permanent storage location.

The SVM Management Wizard log saves information specified by you at every step of the wizard. If the SVM deployment process ends in an error, you can use the wizard log when contacting Technical Support.

The SVM Management Wizard log is saved on the device where the wizard was launched, in the file %LOCALAPPDATA%\Kaspersky Lab\Kaspersky VIISLA Console\logs\KasperskyDeployWizard_<file creation date and time>.log and does not contain account passwords. A new log file is created each time the wizard starts.

Finish the wizard.

If your virtual infrastructure uses a Microsoft Windows Server (Hyper-V) hypervisor, after SVM deployment the event log may contain an event indicating the need to update the Integration Services package on the SVM. You can ignore this notification because the Integration Services do not need to be updated to operate the SVM.

Page top
[Topic 93537]

Automatically creating tasks and a default policy for the Protection Server

The Kaspersky Security Center Initial Configuration Wizard lets you automatically create a default Protection Server policy and an Update databases and solution modules task for the Protection Server. The Initial Configuration Wizard is available in Kaspersky Security Center Administration Console and in Kaspersky Security Center Web Console.

If you use Kaspersky Security Center Web Console, the Initial Configuration Wizard starts the first time you launch Kaspersky Security Center Web Console.

You can also run the Initial Configuration Wizard manually.

How to run the Initial Configuration Wizard in Kaspersky Security Center Web Console

To start the Initial Configuration Wizard:

In the main window of the Kaspersky Security Center Web Console, select Discovery & deployment → Deployment & assignment → Initial Configuration Wizard.

After installing the Protection Server web plug-in, the wizard will prompt you to create a default Protection Server policy and an Update databases and solution modules task for the Protection Server.

If you use Kaspersky Security Center Administration Console, the Initial Configuration Wizard starts automatically the first time you launch Administration Console after installing the management MMC plug-in for the Protection Server.

If the Initial Configuration Wizard for the managed application was not started automatically, you can manually start it.

How to run the Initial Configuration Wizard in Kaspersky Security Center Administration Console

To start the Initial Configuration Wizard:

  1. In the Kaspersky Security Center Administration Console tree, select the Administration Server <server name> node, open the context menu of the node and select All tasksManaged applications Initial Configuration Wizard.
  2. In the welcome window, click the Next button, and in the next step select Kaspersky Security for Virtualization 6.2 Light Agent – Protection Server as the managed application.

Follow the instructions of the Initial Configuration Wizard.

Creating an Update databases and solution modules task for the Protection Server

An Update Solution Databases and Modules task is created for the Managed devices administration group and lets you download an update package for the databases and application modules of the Kaspersky Security solution to all SVMs that will be moved to the Managed devices administration group or to any nested administration group. The task is started every time an update package is downloaded to the Kaspersky Security Center Administration Server repository.

Creating default policy for Protection Server

A default Protection Server policy is created for the Managed devices administration group with the name Kaspersky Security for Virtualization 6.2 Light Agent – Protection Server and is applied on all SVMs that will be moved to the Managed devices administration group or to any nested administration group.

When creating a default Protection Server policy, the wizard prompts you to configure the following settings:

  1. Decide whether you want to use Kaspersky Security Network in the operation of the Protection Server.
  2. Configure settings for connecting SVMs to the Integration Server.

The other policy settings take the default values. You can configure them later.

If you have not configured the settings for connecting SVMs to the Integration Server or cannot connect with the specified settings, the policy is created with the Inactive policy status. Later you can configure the settings of this policy and activate it.

Page top
[Topic 254203]

Preparing the Protection Server for operation

After completing the SVM deployment procedure, it is recommended to use virtual infrastructure tools to check the system date on the SVM. A discrepancy between the system dates on Kaspersky Security Center Administration Server and the SVM may result in an error when connecting the SVM to Kaspersky Security Center as well as incorrect operation of Kaspersky Security solution components.

After deploying the SVM on a hypervisor, you can modify the resources allocated to the SVM, for example, to match those recommended by Kaspersky experts. You can regulate the performance of the SVM using the resources assigned to it.

To prepare the Protection Server for operation, you must perform the following actions:

  1. Make sure that new SVMs are connected to the Integration Server. You can view the list of connected SVMs in the Integration Server Console or in the Integration Server Web Console.
  2. Activate the solution on all new SVMs.

    To activate the solution on SVMs, you must add a license key to the SVMs by using the Solution activation task. After installing the Light Agent component on virtual machines and connecting the Light Agents to the SVMs, the Protection Server component sends license information to the Light Agents.

  3. Update the databases of the solution on all new SVMs and download database updates for Light Agents to the SVMs. By default, database updates required for the operation of the Protection Server, Light Agent for Linux, and Light Agent for Windows are downloaded to the SVMs from the Administration Server repository.

    If the current version of the solution supports more than one version of Light Agent for Linux or Light Agent for Windows, you need to make sure you are downloading database updates for the correct version of Light Agent. If you have different versions of Light Agent installed on protected devices, updates for all installed versions must be downloaded to the SVM.

    To configure the downloading of updates for the correct versions of Light Agent:

    1. In the Protection Server policy, specify the versions of Light Agents for which the Protection Server must receive updates.

      The Administration Server needs some time to download database updates for Light Agents. We recommend starting the database update process after completing the synchronization of the Network Agent on the SVM with the Administration Server (by default, the synchronization period is 15 minutes after changing the policy settings).

    2. Manually run the Download updates to the repository task.
    3. Download the update packages to the SVM. To download update packages to the SVM, you can use an automatically created Protection Server task, Updating databases and solution modules.
Page top
[Topic 256136]

Installing Light Agents and Network Agent

On each virtual machine that needs to be protected using the Kaspersky Security solution, you need to install Light Agent and Kaspersky Security Center Network Agent.

Installed on protected virtual machines, Kaspersky Security Center Network Agent facilitates interaction between a Light Agent installed on a virtual machine and the Kaspersky Security Center Administration Server, and lets you use Kaspersky Security Center to manage the operation of the Light Agent.

You can install Light Agent on a virtual machine template that will be used to create persistent and non-persistent virtual machines. When installing on a non-persistent virtual machine template, we recommend configuring additional installation settings for Light Agents and Network Agent.

You can install Light Agent on virtual machines as part of an infrastructure that uses VDI-based solutions for creating virtual desktops. For Light Agent for Windows to be compatible with some virtualization solutions, additional steps are required during installation.

In this section:

About installing Kaspersky Security Center Network Agent on virtual machines

About installing Light Agent for Linux

About installing Light Agent for Windows

Installing Light Agent on a template for non-persistent virtual machines

Compatibility of Light Agent for Windows with virtualization solutions

Page top
[Topic 286616]

About installing Kaspersky Security Center Network Agent on virtual machines

Before or during the installation of Kaspersky Endpoint Security for Linux in Light Agent mode, you need to install Network Agent for Linux on each virtual machine.

Before or during installation of Kaspersky Endpoint Security for Windows in Light Agent mode, you need to install Network Agent for Windows on each virtual machine.

The files required for installing Network Agent are included in the Kaspersky Security Center distribution kit. For more information on installing Network Agent, please refer to the Kaspersky Security Center Help.

Page top
[Topic 256137]

About installing Light Agent for Linux

Kaspersky Endpoint Security for Linux in Light Agent mode for protection of virtual environments is installed in one of the following ways:

  • Remotely from the administrator's workstation using Kaspersky Security Center.

    To use Kaspersky Endpoint Security for Linux as a Light Agent for Linux, you select the Light Agent mode in one of the following ways:

    • In the properties of the installation package of the Kaspersky Endpoint Security for Linux application, on the Settings tab.
    • Using the autoinstall.ini configuration file, which is included in the application installation package (KSVLA_MODE=yes).
  • Using the command line.

    To use Kaspersky Endpoint Security for Linux as a Light Agent for Linux, after the installation is complete, you need to run the initial application configuration and select the Light Agent mode in one of the following ways:

    • Enter yes in the Specifying the application usage step of the initial configuration script.
    • Specify the KSVLA_MODE=yes setting in the initial setup configuration file.

When installing on a non-persistent virtual machine template, we recommend configuring additional installation settings for Light Agent and Network Agent.

For more information about installing Kaspersky Endpoint Security for Linux in Light Agent mode, see the application Help of the relevant version.

Page top
[Topic 256139]

About installing Light Agent for Windows

Kaspersky Endpoint Security for Windows in Light Agent mode for protection of virtual environments is installed in one of the following ways:

  • Remotely from the administrator's workstation using Kaspersky Security Center.

    To use Kaspersky Endpoint Security for Windows as a Light Agent for Windows, you need to select the Light Agent configuration in the properties of the Kaspersky Endpoint Security for Windows installation package on the Settings tab.

  • Locally on a virtual machine using the installation wizard.

    To use Kaspersky Endpoint Security for Windows as a Light Agent for Windows, you need to select the Light Agent for protecting virtual environments configuration at the configuration selection step.

  • Using the command line.

    To use Kaspersky Endpoint Security for Windows as a Light Agent for Windows, you select the Light Agent mode in one of the following ways:

    • Run the installation command with LIGHTAGENTMODE=1.
    • Perform a silent installation using a setup.ini file with KSVLAMode=1.

To optimize the performance of Kaspersky Endpoint Security for Windows in Light Agent mode, we recommend using predefined groups of exclusions and trusted applications for various virtualization solutions. You can include recommended scan exclusions and trusted applications in the trusted zone during local installation using the wizard or when creating an installation package in interactive mode.

When installing on a non-persistent virtual machine template, we recommend configuring additional installation settings for Light Agent and Network Agent.

For more information about installing Kaspersky Endpoint Security for Windows in Light Agent mode, see the application Help of the relevant version.

Page top
[Topic 109889]

Installing Light Agent on a template for non-persistent virtual machines

If you are installing on a virtual machine template that will be used to create non-persistent virtual machines, we recommend that you configure settings that optimize the operation of Light Agent on the non-persistent virtual machines.

If these settings are configured, the operation of non-persistent virtual machines created from the template will be optimized as follows:

  • Kaspersky Security Center functionality that is not required for non-persistent virtual machines will be disabled, namely the receiving of information about software, hardware, vulnerabilities, and necessary updates.
  • Updates that require restarting the protected virtual machine will not be installed on virtual machines created from the template. When receiving updates that require a restart, the Light Agent installed on the virtual machine sends a message to Kaspersky Security Center about the need to update the virtual machine template.
  • Non-persistent virtual machines running Windows operating systems will not use the active infection disinfection technology regardless of the configured settings of Light Agent for Windows. If it is necessary to perform the disinfection procedure for an active infection, the Light Agent installed on the virtual machine will send a message to Kaspersky Security Center about the need to perform this procedure on the virtual machine template.

Kaspersky Security Center Network Agent settings

If you are installing Network Agent using Kaspersky Security Center, in the properties window of the Network Agent installation package, you need to specify the following settings in the Advanced section:

  • Enable dynamic mode for VDI.
  • Optimize the settings for VDI.

If you are installing Network Agent using the command line, you need to use a response file (in TXT format) with the following settings:

  • KLNAGENT_VM_VDI=1
  • KLNAGENT_VM_OPTIMIZE=1

For more information on installing Network Agent, please refer to the Kaspersky Security Center Help.

Light Agent for Linux settings

If you are installing Kaspersky Endpoint Security for Linux in Light Agent mode using Kaspersky Security Center, you need to include the autoinstall.ini configuration file in the installation package with the following settings:

  • KSVLA_MODE=yes
  • VDI_MODE=yes

If you create an installation package in Kaspersky Security Center Web Console, you can specify these settings using the following check boxes in the installation package properties on the Settings tab:

  • Use the application in Light Agent mode
  • Enable VDI protection mode.

If you are installing Kaspersky Endpoint Security for Linux in Light Agent mode using the command line, after the installation is complete, you need to configure the settings as follows, depending on the initial configuration mode:

  • Run the initial configuration script and enter yes in the Specifying the application usage mode and Enabling VDI protection mode steps.
  • Run the initial configuration in automatic mode by specifying the following settings in the initial configuration file:
    • KSVLA_MODE=yes
    • VDI_MODE=yes

For more information about installing Kaspersky Endpoint Security for Linux in Light Agent mode, see the application Help of the relevant version.

Light Agent for Windows settings

If you are installing Kaspersky Endpoint Security for Windows in Light Agent mode using Kaspersky Security Center, you need to configure the following settings in the properties of the Kaspersky Endpoint Security for Windows installation package on the Settings tab:

  • select the Light Agent configuration
  • select the Protect VDI check box

If you are installing Kaspersky Endpoint Security for Windows in Light Agent mode using the Installation Wizard, you need to configure the following settings at the configuration selection step:

  • select the Light Agent for protecting virtual environments configuration
  • select the Protect VDI check box

If you are installing Kaspersky Endpoint Security for Windows in Light Agent mode using the command line, you need to do one of the following:

  • Run the installation command with LIGHTAGENTMODE=1 and VDI=1.
  • Perform installation in silent mode using a setup.ini file with KSVLAMode=1 and InstallOnVDI=1.

For more information about installing Kaspersky Endpoint Security for Windows in Light Agent mode, see the application Help of the relevant version.

Page top
[Topic 98763]

Compatibility of Light Agent for Windows with virtualization solutions

You need to take additional steps when installing Light Agent for Windows on virtual infrastructures that use the following virtualization solutions:

  • Citrix App Layering
  • Citrix Provisioning (Citrix Provisioning Services)
  • VMware App Volumes

Expand all | Collapse all

Compatibility with Citrix App Layering technology

If you plan to use the Full User Layer to save the state of non-persistent virtual machines, you must do the following before installing the Light Agent on a virtual machine template:

  1. Create the file C:\Program Files\Unidesk\Uniservice\UserExclusions\KESLA.txt and add the following exclusions to it:
    • C:\ProgramData\KasperskyLab\
    • C:\ProgramData\Kaspersky Lab\
    • C:\Program Files (x86)\Kaspersky Lab\
  2. Make the following changes to the operating system registry:
    1. In the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Unifltr registry key, create a new DWORD key with the name MiniFilterBypass and the value 1.
    2. In the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Unirsd registry key, create a new MULTI_SZ key with the name ExcludeKey and the value \Registry\Machine\SOFTWARE\WOW6432Node\KasperskyLab.
  3. Restart the virtual machine.

To install on virtual machines in an infrastructure that uses Citrix App Layering technology, you need to do the following:

  1. Install Kaspersky Security Center Network Agent and Light Agent for Windows on a virtual machine template on the Application Layer.
  2. Create a multi-layer virtual machine image.
  3. Deploy the created image to hypervisors that support Citrix App Layering.
  4. Configure creation of non-persistent virtual machines from the created image.

For more information on installing antivirus software with Citrix App Layering, refer to Citrix App Layering documentation.

Compatibility with Citrix Provisioning (Citrix Provisioning Services) technology

To ensure that Light Agent for Windows is compatible with Citrix Provisioning technology (Citrix Provisioning Services), you must perform the following steps:

  1. If Citrix Provisioning Target Device software is installed on the virtual machine, it must be removed before you begin installing Light Agent. After completing the installation of Light Agent, you need to install the Citrix Provisioning Target Device.
  2. Light Agent for Windows must be installed in one of the following ways:
    • Using the installation wizard Select the Ensure compatibility with Citrix PVS check box in the Advanced settings step.
    • Remotely via Kaspersky Security Center. Select the Ensure compatibility with Citrix PVS check box in the installation package settings.

Compatibility with VMware App Volumes technology

Before installing on a virtual machine template, you need to create the file %SVAgent%\Config\Custom\snapvol.cfg and add the following exceptions to it:

  • exclude_path=\ProgramData\Kaspersky Lab
  • exclude_path=\ProgramData\KasperskyLab
  • exclude_path=\Program Files\Kaspersky Lab
  • exclude_path=\Program Files\Common Files\Kaspersky Lab
  • exclude_path=\Program Files\Kaspersky Lab
  • exclude_path=\Program Files (x86)\Kaspersky Lab
  • exclude_path=\Program Files (x86)\Common Files\Kaspersky Lab
  • exclude_process_path=\Program Files (x86)\Kaspersky Lab
  • exclude_process_path=\Program Files (x86)\Common Files\Kaspersky Lab
  • exclude_process_path=\Program Files\Common Files\Kaspersky Lab
  • exclude_process_path=\Program Files\Kaspersky Lab
  • exclude_process_name=avp.exe
  • exclude_process_name=klnagent.exe
  • exclude_registry=\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\KasperskyLab
  • exclude_registry=\REGISTRY\MACHINE\SOFTWARE\KasperskyLab
  • exclude_registry=\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Services\klupd_klif_arkmon
  • exclude_registry=\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Services\klupd_klif_klark
  • exclude_registry=\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Services\klupd_klif_klbg
  • exclude_registry=\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Services\klupd_klif_mark
  • exclude_registry=\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Services\klupd_klif_swmon

For details, please refer to the VMware documentation.

Page top
[Topic 65891]

Preparing Light Agents for operation

To prepare Light Agents for operation, you must perform the following actions:

  1. Configure the settings required for SVM discovery and connection of Light Agents to SVMs.

    To configure the settings for Light Agent for Linux, you need to create a policy for Kaspersky Endpoint Security for Linux running in Light Agent mode.

    To configure the settings for Light Agent for Windows, you need to create a policy for Kaspersky Endpoint Security for Windows running in Light Agent mode.

    Following the instructions in the New Policy Wizard, you need to select the SVM discovery method and, depending on the selected method, configure the settings for connecting to the Integration Server or specify a list of SVM addresses.

  2. Make sure that Light Agents connect to SVMs and to the Integration Server.
  3. Make sure that Light Agents have received information about the license used to activate Kaspersky Security for Virtualization Light Agent.

    After activating the solution on SVMs and connecting Light Agents to the SVMs, the Protection Server component sends license information to Light Agents. You can view information about the license that Light Agent uses. You can view it on a protected virtual machine with Light Agent.

  4. Make sure that the database updates required for Light Agent are installed on the protected virtual machines.

    Databases on protected virtual machines are updated using a special Update task, in which a folder on the SVM is specified as the update source. The update task is started automatically.

    You can check how up-to-date the databases are on a protected virtual machine with Light Agent:

    • For Light Agent for Linux: using the command kesl-control --app-info.
    • For Light Agent for Windows: in the local interface of Kaspersky Endpoint Security for Windows.

For details about configuring the applications running in Light Agent mode, see the Help for the relevant application.

Page top
[Topic 256140]

Displaying virtual machines and SVMs in Kaspersky Security Center

After installation of Kaspersky Security in the virtual infrastructure, the SVMs and protected virtual machines on which Network Agent is installed will forward information about themselves to Kaspersky Security Center. By default, Kaspersky Security Center adds devices on which Kaspersky Security components are installed to the Unassigned devices folder.

In the Kaspersky Security Center Administration Console, an SVM is displayed under the name that you specified during deployment of this SVM. The name of the protected virtual machine matches the network name of the virtual machine (hostname). If a virtual machine with the same name is already registered on the Kaspersky Security Center Administration Server, a sequence number is added to the name of the new virtual machine, for example: <Name>~1, <Name>~2.

If you configured rules for moving virtual machines to administration groups prior to installing the solution, Kaspersky Security Center moves the devices on which Kaspersky Security components are installed to the specified administration groups in accordance with the configured rules for moving devices.

After installing the solution components, the SVMs and protected virtual machines send tags to Kaspersky Security Center. You can use these tags when creating rules for moving SVMs and protected virtual machines to administration groups.

The SVM sends the following tag to Kaspersky Security Center:

%VmType%=SVM – indicates that the virtual machine is an SVM.

A protected virtual machine with Kaspersky Security Center Network Agent installed sends the following tag to Kaspersky Security Center:

  • %VmType%=<Persistent / Nonpersistent> – indicates whether this virtual machine is non-persistent or persistent virtual machine:
    • %VmType%=Persistent – persistent virtual machine;
    • %VmType%=Nonpersistent – non-persistent virtual machine.
  • %KsvlaMode%=<Yes / No> – a flag that determines the operating mode of the Kaspersky Endpoint Security for Linux or Kaspersky Endpoint Security for Windows application on a virtual machine:
    • %KsvlaMode%=Yes – the application is being used in Light Agent mode to protect virtual environments;
    • %KsvlaMode%=No – the application is being used in standard mode.

You can manually move SVMs to the Managed devices administration group or nested administration groups (for more information about moving virtual machines to administration groups, see the Kaspersky Security Center Help).

Page top
[Topic 145545]

Viewing the list of SVMs connected to the Integration Server

You can view a list of all SVMs that are connected to the Integration Server in the Integration Server Web Console or the Integration Server Console.

How to view information about SVMs connected to the Integration Server in the Integration Server Web Console

To view information about SVMs connected to the Integration Server:

  1. Open Integration Server Web Console and connect to the Integration Server.
  2. Go to the List of connected SVMs section.

    In the window that opens, a list of SVMs connected to the Integration Server is displayed as a table. The table contains the following information about each SVM:

    • SVM IP address.
    • SVM path. Depending on the type of protected virtual infrastructure:
      • IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM is deployed.
      • IP address in the IPv4 format or the fully qualified domain name (FQDN) of the Keystone microservice that controls the OpenStack project within which the SVM is deployed.

    You can sort the list by the SVM IP address column, search the list, and export the list in CSV format using the button located above the table.

  3. To view detailed information about an SVM, click on the IP address of the selected SVM in the list.

    This opens a window with the following information about the selected SVM:

    • SVM ID.
    • SVM IP address.
    • SVM path. Depending on the type of protected virtual infrastructure:
      • IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM is deployed.
      • IP address in the IPv4 format or the fully qualified domain name (FQDN) of the Keystone microservice that controls the OpenStack project within which the SVM is deployed.
    • Information about whether the data transfer channel from Light Agents is encrypted.
    • SVM port used for sending scan requests from Light Agents to the Protection Server over a secure connection.
    • SVM port used for sending scan requests from Light Agents to the Protection Server over an unsecure connection.
    • SVM port used for sending service requests from Light Agents to the Protection Server over a secure connection.
    • SVM port used for sending service requests from Light Agents to the Protection Server over an unsecure connection.

How to view information about SVMs connected to the Integration Server in the Integration Server Console

To view information about SVMs connected to the Integration Server:

  1. Open Integration Server Console and connect to the Integration Server.
  2. In the list on the left, select the List of connected SVMs section.

    The table on the right side of the window displays the following information about all SVMs connected to the Integration Server:

    • SVM IP address.
    • SVM path. Depending on the type of protected virtual infrastructure:
      • IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM is deployed.
      • IP address in the IPv4 format or the fully qualified domain name (FQDN) of the Keystone microservice that controls the OpenStack project within which the SVM is deployed.
  3. To view detailed information, select an SVM in the table and open the Information about SVM window by double-clicking or by clicking the Detailed information link above the table.

    The window displays the following information about the selected SVM:

    • Unique identifier of the SVM.
    • SVM IP address.
    • SVM path. Depending on the type of protected virtual infrastructure:
      • IP address in IPv4 format or the fully qualified domain name (FQDN) of the hypervisor on which the SVM is deployed.
      • IP address in the IPv4 format or the fully qualified domain name (FQDN) of the Keystone microservice that controls the OpenStack project within which the SVM is deployed.
    • SVM port used for sending scan requests from Light Agents to the Protection Server over a secure connection.
    • SVM port used for sending scan requests from Light Agents to the Protection Server over an unsecure connection.
    • SVM port used for sending service requests from Light Agents to the Protection Server over a secure connection.
    • SVM port used for sending service requests from Light Agents to the Protection Server over an unsecure connection.
    • Information about whether the data transfer channel from Light Agents is encrypted.
Page top
[Topic 256141]