BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Vulnerability Scanning From a Virtual Machine

Posted March 30, 2011    Morey Haber

Virtualization offers a wide array of benefits from power and environmental constraints to physical space limitations and disaster recovery efforts.  As leaders  for Unified Vulnerability Management, we realize these benefits offer a significant value  to our install base and we are in full support of virtualization for our solutions.

Although virtualization is in many ways identical to running on physical hardware from a software perspective, there are certain caveats that are unique to a connection sensitive application such as a vulnerability assessment scanner. Having an extremely diverse customer base including some of the largest deployments of vulnerability assessment, Retina has had a significant amount of  in various  environments and the challenges that can go along with them.

As virtualized environments and configurations vary widely, we can provide some guidance for scanning from these environments and anomalies you may encounter. Regardless of the scanning solution, best practice guides, minimum prerequisites, and user documentation should be adhered to during the installation of the products. eEye has developed a set of recommendations that will optimize the solution in a virtual environment and minimize any potential run times errors or scan anomalies:

Dedicated Network Interface Cards

Retina should have a dedicated physical NIC for its scanning jobs since UDP packets by nature can be dropped during high utilization from another application sharing the NIC. It is our experience that highly utilized virtualized systems favor established TCP connections over half-open or SYN only connections as well. This can have an undesirable effect on scan results too.

MS SQL Database

MS SQL should not be virtualized unless database considerations are taken for virtualization and best practices implemented per the virtualization vendor. MS SQL server requires a significant amount of resources to function correctly. In our experience we have seen a few cases where the management components, and especially MS SQL instances, have been given far inadequate amounts of resources. This always results in poor performance.  Disk speed and utilization is also a contributor to performance. MS SQL is by nature disk intensive and performs best when delivered by a RAID array or SAN solution.  Bottom line, virtualization of a machine does not change the resources required for it to function properly. Under powering SQL or management components can have a drastic impact on performance and user experience.

Dedicated Virtual Machines

Virtual machines for scanning and management components should not be shared with other applications. The Retina Network Security Scanner, Retina CS, and MS SQL are all enterprise ready solutions. Enterprise class software is optimally designed to run on enterprise class hardware. Shared resources generally lead to overburdened machines and again poor performance and user experience.

Industrial Virtualization Suites

There are many options when selecting a virtualization suite. We do not recommend one particular suite over another but do recommend choosing an industrial grade, server level, solution with commercial support and maintenance.  VMWare ESX, Parallels, Xen, and MS Virtual Serverare all acceptable technologies. Using workstation or other non-industrial virtualization technology is not recommended.

Leave a Reply

Additional articles

powerbroker-for-mac-diagram-small

PowerBroker for Mac: A Least-Privileged Apple a Day…

Posted July 27, 2015    Jason Silva

BeyondTrust PowerBroker for Mac reduces the risk of privilege misuse by enabling standard users on Mac OS X to perform administrative tasks successfully without entering elevated credentials.

Tags:
, ,
PrivilegedAccountManagement

On Demand Webinar – Now is the time for Privileged Account Management

Posted July 24, 2015    BeyondTrust Software

In this webinar, SANS Instructor and Founder of Voodoo Security, Dave Shackleford, will revisit several hacking and breach scenarios that involved privileged accounts, and use these as examples while discussing tools and tactics to get this problem under control once and for all.

Tags:
, ,
dave-shackleford-headshot

Privileged Account Management: The Time is Now

Posted July 22, 2015    Dave Shackleford

There’s plenty of problems we don’t have great options for in InfoSec today. Malware is a pain point that keeps evolving rapidly. 0-day exploits are tough to prepare for. Privileged account management? We got this. We know the root causes, we know how it manifests, we know how to get it under control effectively, and there are great technology solutions that are enterprise-class.

Tags:
, ,