aSEC Connect to SCP
In aSEC console will show a welcome page. Fill in the Initial password of the new aSEC VM, click OK. In the pop-up window it requires you to change the Initial password, after filling in the new password click OK. Then fill in the new password on the new page.
The Initial password is Sfcsec@123.
• The length is 8~64 characters.
• Must contain 4 items of uppercase letters, lowercase letters, numbers, and special characters, special characters support ~`@#%&<>"',;_-^$.*+?=!:|{}()[]/.
• It cannot be the same as or contain the username.
• The same character cannot appear consecutively, such as aaa, 11, etc.
• Common characters (including upper and lower case) of sangfor/sinfor/dlanrecover cannot be used
After successful login, click Platform Authentication and then select SCP. Enter the platform authentication page:
Cluster IP: IP of the SCP management network.
Cluster Port: Keep the default port 443 (if no NAT configured).
Username: asec_admin (Create Account User for aSEC)
Password: the password of asec_admin.
Click Authenticate wait for authentication successfully and click OK.
EDR Deployment
- Upload EDR Image.
Login to SCP go to Compute > Images > Advanced Service Images click Upload. Fil out the following information:
Image: Select the EDR file.
Name: Define the name of this image.
Description: This is an option.
Type: Select VM Security Protection.
Resource Pool: Select the resource pool you plan to deploy the EDR.
The resource pool must select the resource pool where you have deployed aSEC aSEC.
- Basic configuration.
Login to SCP go to Security > aSecurity, it pops up a message prompt to enable the VM security protection and cyber-attack protection, click Go Now. In the page click Settings fill out the following information:
Resource Pool: select the resource pool where you have deployed aSEC.
VM Image: Select the EDR image.
Datastore: Select the datastore to deploy EDR.
Run Location: HCI node to running EDR (suggest auto).
Security Agent Installation: The method to install the security agent. Manual for manual installing the agent. Auto for Auto install security agents during vmTools installation.
- Management Interface configuration.
This interface is the EDR’s management interface. Ensure that the IP and network of this interface can communicate properly with SCP, aSEC, and the HCI cluster of the virtual machines that need protection. Connected To is the port group or virtual switch the EDR connects to. Fill in the IP, Netmask and Gateway at the same time.
- Edge-Connected Interface configuration.
The interface connects to antivirus database, cloud-based engine server, etc... Please make sure the interface can connect to the following servers:
(You can choose either Malaysia or the EU. Selecting the one closer to the device's location will provide a better experience.)
Malaysia:
auth.sea.sangfor.com: auth.sea.sangfor.com
wiki.sec.sangfor.com: wiki.sec.sangfor.com
upd.sea.sangfor.com: upd.sea.sangfor.com
download.sea.sangfor.com: download.sea.sangfor.com
European Union:
auth.sea.sangfor.com: auth.forenova.com
wiki.sec.sangfor.com: wiki.forenova.com
upd.sea.sangfor.com: upd.forenova.com
download.sea.sangfor.com: download.forenova.com
Connected To is the port group or virtual switch the EDR connects to. Fill in the IP, Netmask and Gateway at the same time.
Click OK wait for the EDR to deploy successfully.
- Issue EDR license.
Login SCP page goes to the Management > System > Licensing > Service License locate the item which the type is aSecurity, click Edit confirm the name, IP Adress then In the x86 Host CPUs field, fill in the total number of CPUs of all the physical nodes in the HCI clusters (the cluster you want user EDR to protect the VM running on). Then click OK.