F-Secure Security for Virtual and Cloud Environments

F-Secure Security for
Virtual and Cloud Environments
Release Notes
Copyright © 1998-2013 F-Secure Corporation. All Rights Reserved.
1
Overview
F-Secure Security for Virtual and Cloud Environments (SVCE) is the solution to protect your virtualized
servers and desktops against malware, exploits, network-based attacks and other security threats. It
allows to improve operation efficiency and reduce impact to virtual infrastructure while ensuring up-todate security and policy compliance. The solution is hypervisor agnostic and thus can be deployed in
private or public cloud environments based on any virtualization platforms.
F-Secure Security for Virtual and Cloud Environments release includes:



F-Secure client and server protection:
o F-Secure Client Security 11.50
o F-Secure Anti-Virus for Workstations 11.50
o F-Secure Server Security 10.50
o F-Secure E-mail and Server Security 10.50
F-Secure Scanning and Reputation Server 11.00
o Virtual appliance for VMware ESXi, vSphere hypervisor
o Virtual appliance for Citrix XenServer, Xen hypervisor
o Virtual appliance for Microsoft Hyper-V hypervisor
F-Secure Policy Manager:
o F-Secure Policy Manager for Windows 11.10
o F-Secure Policy Manager for Linux 10.30
F-Secure client and server security products are installed on virtual desktops and servers respectively.
They include the Offload Scanning Agent (OSA) that interacts with F-Secure Scanning and Reputation
Server for malware scanning, content analysis and reputation, which minimizes resource consumption
and performance impact to the virtualization infrastructure.
F-Secure Scanning and Reputation Server is a dedicated security server based on a hardened Linux
operating system and employs technologies used in the existing F-Secure award-winning end-point
and server protection products. It comes as a virtual appliance that can be easily deployed in your
virtualization (VI or VDI) environment.
RELEASE NOTES
F-SECURE SECURITY FOR VIRTUAL AND CLOUD ENVIRONMENTS
All parts of the solution are centrally managed with F-Secure Policy Manager.
2
How it works
The following diagram explains how different parts of the solution are deployed and work with each
other in the virtual environment.
F-Secure Policy Manager – provides centralized management for F-Secure security protection
installed on physical and virtual machines. F-Secure Policy Manager is available for Windows and
Linux platforms and should be installed on a separate virtual machine.
F-Secure Policy Manager Console is the administration console to define policies, deploy F-Secure
software and monitor status of security in your virtual environment. F-Secure Policy Manager Console
can be installed to a separate or the same virtual machine running F-Secure Policy Manager Server.
F-Secure Client Security and F-Secure Server Security – endpoint security protection installed on
physical or virtual desktops and servers respectively. It includes F-Secure Management Agent
(FSMA), Anti-Virus (FSAV), Offload Scanning Agent (OSA), DeepGuard, Web Traffic Scanning (WTS),
© 2013 F-SECURE CORPORATION. ALL RIGHTS RESERVED.
2/5
RELEASE NOTES
F-SECURE SECURITY FOR VIRTUAL AND CLOUD ENVIRONMENTS
Email Scanning and Browsing Protection (BP). F-Secure Client Security also includes Firewall, Device
Control and Software Updater components.
F-Secure Management Agent – communicates with F-Secure Policy Manager, applies defined
policies and sends status information and alerts to the Policy Manager Server.
F-Secure Automatic Update Agent – responsible for downloading and installing software and
database updates.
F-Secure Offload Scanning Agent – installed together with F-Secure Client Security and F-Secure
Server Security to a virtual machine in order to offload malware scanning and content reputation
checking to a dedicated server running F-Secure Scanning and Reputation Server. This allows to
minimize the performance impact to virtualization infrastructure.
F-Secure Scanning and Reputation Server – the virtual appliance based on hardened Linux
platform. It provides malware scanning and content reputation services.
3
Compatibility and Requirements
3.1
Supported virtualization platforms
The following virtualization platforms are supported in this release:




VMware vSphere 5.0, 5.1 with VMware vCenter Server 5.0, 5.1
Citrix XenServer 6.2 or newer
Microsoft Hyper-V Server 2008R2, 2012, 2012 R2
Citrix VDI-in-a-Box 5.x
Other virtualization platforms are supported on a “Best Effort” basis: we will try to help you, but it may
not be possible to reproduce all problems, and we cannot guarantee a solution.
3.2
Supported guest operating systems
F-Secure Security for Virtual and Cloud Environments solution can protect virtualized servers and
desktops running the following operating systems:









Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Server 2003
Microsoft Windows Server 2003 R2
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
© 2013 F-SECURE CORPORATION. ALL RIGHTS RESERVED.
3/5
RELEASE NOTES








F-SECURE SECURITY FOR VIRTUAL AND CLOUD ENVIRONMENTS
Microsoft Small Business Server 2003
Microsoft Small Business Server 2003 R2
Microsoft Small Business Server 2008
Microsoft Small Business Server 2011, Standard edition
Microsoft Small Business Server 2011, Essentials
Microsoft Windows Server 2012
Microsoft Windows Server 2012 Essentials
Microsoft Windows Server 2012 R2
Note: All Operating Systems should have the latest service pack from Microsoft installed. For the
latest information and more details about supported OS platforms, refer to the product release notes.
3.3
System requirements
Consult the product release notes for system requirements required to deploy and use F-Secure
SVCE elements.
3.4
Centralized management
The following versions of F-Secure Policy Manager are required to centrally manage F-Secure SVCE
solution:


F-Secure Policy Manager (Windows) 11.10 or newer
F-Secure Policy Manager (Linux) 10.30 or newer
F-Secure Policy Manager can be deployed on a dedicated Windows or Linux virtual machine.
Please check F-Secure Policy Manager’s release notes for system requirements and latest
information about supported platforms.
4
Installation
For detailed installation instructions, please refer to F-Secure Security for Virtual and Cloud
Environments deployment guide.
5
Licensing and installation keys
A license key is required to install F-Secure client and server protection products as well as Scanning
and Reputation Server. The full and trial installation keycodes are available in F-Secure Partner Portal
under “Partner Downloads” > Keycodes.
F-Secure Policy Manager does not require an installation keycode. However, in order to use it for
other than evaluation purposes, the product must be registered with a valid customer number provided
with the license certificate.
© 2013 F-SECURE CORPORATION. ALL RIGHTS RESERVED.
4/5
RELEASE NOTES
6
F-SECURE SECURITY FOR VIRTUAL AND CLOUD ENVIRONMENTS
Contact information and feedback
We look forward to hearing your comments and feedback on the product functionality, usability and
performance.
Please report any technical issues via:


F-Secure support web site: http://support.f-secure.com/
F-Secure Community: http://community.f-secure.com/t5/Business/ctp/Business_Security_Solutions
When reporting a technical problem, please attach the F-Secure diagnostic report(s) to the feedback.
This report contains basic information about hardware, operating system, network configuration and
installed F-Secure and third-party software.
Also please provide the following information about your virtual environment:
-
7
The name and version of hypervisor software
Resources (CPU, RAM, etc.) on host(s) running the hypervisor software
The name and version of VI/VDI software in use
Number of virtual machines running F-Secure Client Security
Number of virtual machines running F-Secure Server Security
Number of deployed F-Secure SRS servers
F-Secure license terms
F-Secure license terms are included in the software. You must read and accept them before you can
install and use the software.
© 2013 F-SECURE CORPORATION. ALL RIGHTS RESERVED.
5/5