Table of Contents
4.2 (EoS)
Expand all | Collapse all
-
- Set Up the Endpoint Infrastructure
- Activate Traps Licenses
-
- Endpoint Infrastructure Installation Considerations
- TLS/SSL Encryption for Traps Components
- Configure the MS-SQL Server Database
- Install the Endpoint Security Manager Server Software
- Install the Endpoint Security Manager Console Software
- Manage Proxy Communication with the Endpoint Security Manager
- Load Balance Traffic to ESM Servers
-
- Malware Protection Policy Best Practices
- Malware Protection Flow
- Manage Trusted Signers
-
- Remove an Endpoint from the Health Page
- Install an End-of-Life Traps Agent Version
-
-
- Traps Troubleshooting Resources
- Traps and Endpoint Security Manager Processes
- ESM Tech Support File
-
- Access Cytool
- View the Status of the Agent Using Cytool
- View Processes Currently Protected by Traps Using Cytool
- Manage Logging of Traps Components Using Cytool
- Restore a Quarantined File Using Cytool
- View Statistics for a Protected Process Using Cytool
- View Details About the Traps Local Analysis Module Using Cy...
- View Hash Details About a File Using Cytool
VDI Overview
Your rapidly changing business environment demands a
flexible infrastructure to support the evolving desktop, application,
and data access requirements of your staff. By implementing a virtual
desktop infrastructure (VDI), you can empower your employees to
work independent of location using a variety of devices.
An individual’s user interface in a virtualized environment is
called a virtual desktop. Usually, the virtual desktop is stored
on a remote server rather than locally. Desktop virtualization software separates
the physical machine from the software and presents an isolated
operating system for users. When a user logs on to a VDI infrastructure,
the infrastructure supplies the user a hosted desktop image.
A VDI environment usually involves running user desktops inside
virtual machines that are hosted on datacenter servers. In a VDI
environment, each user is allotted a dedicated VM that runs a separate
operating system. This is different than a specific VM to which
users can connect and from virtualized applications that run in
a regular environment.
Although a VDI solution presents many desktop security advantages—including
centralized control, reduced complexity, and efficient management
of user access and privileges—it is critical to ensure that the
entire VDI is secure. Securing this new, centralized environment
is increasingly difficult. A single IP address can represent thousands
of different users all accessing their applications and data using
a variety of devices. Users can also have access to other applications
in your data center besides their virtual desktop. By using Traps
to secure your VDI environment, you can take advantage of the following
benefits:
- Advanced endpoint protection as part of the Traps solution that prevents sophisticated vulnerability exploits and unknown malware-driven attacks.
- A highly scalable, lightweight Traps agent that uses an innovative new approach for defeating attacks without requiring any prior knowledge of the threat.
- Software that is not dependent on scanning or maintaining external updates.
The following topics describe the VDI deployments in more detail: