BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Vulnerability Scanning From a Virtual Machine

Posted March 30, 2011    Morey Haber

Virtualization offers a wide array of benefits from power and environmental constraints to physical space limitations and disaster recovery efforts.  As leaders  for Unified Vulnerability Management, we realize these benefits offer a significant value  to our install base and we are in full support of virtualization for our solutions.

Although virtualization is in many ways identical to running on physical hardware from a software perspective, there are certain caveats that are unique to a connection sensitive application such as a vulnerability assessment scanner. Having an extremely diverse customer base including some of the largest deployments of vulnerability assessment, Retina has had a significant amount of  in various  environments and the challenges that can go along with them.

As virtualized environments and configurations vary widely, we can provide some guidance for scanning from these environments and anomalies you may encounter. Regardless of the scanning solution, best practice guides, minimum prerequisites, and user documentation should be adhered to during the installation of the products. eEye has developed a set of recommendations that will optimize the solution in a virtual environment and minimize any potential run times errors or scan anomalies:

Dedicated Network Interface Cards

Retina should have a dedicated physical NIC for its scanning jobs since UDP packets by nature can be dropped during high utilization from another application sharing the NIC. It is our experience that highly utilized virtualized systems favor established TCP connections over half-open or SYN only connections as well. This can have an undesirable effect on scan results too.

MS SQL Database

MS SQL should not be virtualized unless database considerations are taken for virtualization and best practices implemented per the virtualization vendor. MS SQL server requires a significant amount of resources to function correctly. In our experience we have seen a few cases where the management components, and especially MS SQL instances, have been given far inadequate amounts of resources. This always results in poor performance.  Disk speed and utilization is also a contributor to performance. MS SQL is by nature disk intensive and performs best when delivered by a RAID array or SAN solution.  Bottom line, virtualization of a machine does not change the resources required for it to function properly. Under powering SQL or management components can have a drastic impact on performance and user experience.

Dedicated Virtual Machines

Virtual machines for scanning and management components should not be shared with other applications. The Retina Network Security Scanner, Retina CS, and MS SQL are all enterprise ready solutions. Enterprise class software is optimally designed to run on enterprise class hardware. Shared resources generally lead to overburdened machines and again poor performance and user experience.

Industrial Virtualization Suites

There are many options when selecting a virtualization suite. We do not recommend one particular suite over another but do recommend choosing an industrial grade, server level, solution with commercial support and maintenance.  VMWare ESX, Parallels, Xen, and MS Virtual Serverare all acceptable technologies. Using workstation or other non-industrial virtualization technology is not recommended.

Leave a Reply

Additional articles

normal-blog-img

New IT Security Best Practices for Maintaining “Business as Usual” Despite Evolving Threats

Posted August 13, 2014    Morey Haber

It’s time to get back to business. Here in the U.S., summer vacations are wrapping up and businesses are looking forward to closing out 2014. Over the past year, we’ve seen several incidents that warrant changes in the ways consumers make purchases and businesses conduct transactions. Consider last week’s theft of a whopping 1.2 billion…

Tags:
, , ,

Retina Vulnerability Audits – August 2014 Patch Tuesday

Posted August 12, 2014    BeyondTrust Research Team

The following is a list of Retina vulnerability audits for this August 2014 Patch Tuesday: MS14-043 - Vulnerability in Windows Media Center Could Allow Remote Code Execution (2978742) 34924 – Microsoft WMC Remote Code Execution (2978742) MS14-044 - Vulnerabilities in SQL Server Could Allow Elevation of Privilege (2984340) 34915 – Microsoft SQL Server Multiple Vulnerabilities (2984340) – 2008 34916 –…

patch-tuesday

August 2014 Patch Tuesday

Posted August 12, 2014    BeyondTrust Research Team

This August Microsoft has released nine security bulletins which account for a whole variety of critical vulnerabilities. The most critical bulletins are MS14-051 (Internet Explorer), MS14-045 (Kernel-mode), and MS14-049 (Windows Installer). MS14-043 fixes a critical code execution vulnerability within Windows Media Center (people still use that?). The vulnerability itself is specifically within a COM object…

Tags:
, , ,