Applying the Power of Virtual Desktops

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

Ed Duguid with subject: MACE Cloud
Wyse.com 2010 Cameron Smith Sales Engineer for IN, KS, and MO Desktop Virtualization.
Adam Duffy Edina Public Schools.  The heart of virtualization is the “virtual machine” (VM), a tightly isolated software container with an operating.
Antony Jo The University of Montana. Virtualization  The process of abstraction; making something more abstract  Many types: Server Desktop Application.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Virtual techdays INDIA │ 9-11 February 2011 Cross Hypervisor Management Using SCVMM 2008 R2 Vikas Madan │ Partner Consultant II, Microsoft Corporation.
TechNet and Community Tour - Dynamic IT Dynamic Desktop Deployment Level Advanced.
Introduction to XTMv WatchGuard Training.
SECURING AND LEVERAGING THE POWER OF VIRTUAL SERVERS AND DESKTOPS Conrado Wang Cheng Niemeyer Information Security Officer, Sacred Heart University.
European Organization for Nuclear Research Virtualization Review and Discussion Omer Khalid 17 th June 2010.
Virtualization 101.
Copyright © 2005 VMware, Inc. All rights reserved. VMware Virtualization Phil Anthony Virtual Systems Engineer
Virtual Machine Management
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 3 Desktop Virtualization McGraw-Hill.
Virtualization A way To Begin with Virtual Reality… - Rahul Khanwani.
Paper on Best implemented scientific concept for E-Governance Virtual Machine By Nitin V. Choudhari, DIO,NIC,Akola By Nitin V. Choudhari, DIO,NIC,Akola.
Virtual Desktop Infrastructure Solution Stack Cam Merrett – Demonstrator User device Connection Bandwidth Virtualisation Hardware Centralised desktops.
SUNY IT Master's Project Using Open Source Virtualization Technology In Computer Education By: Ronny L. Bull Advised By: Geethapriya Thamilarasu, Ph.D.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
1. Outline Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models 2.
XD 5.6 Overview. XenDesktop 5.6 Main Focus = Integration of personal vDisk Features Support for Microsoft SCVMM 2012 and SCCM 2012 Updated Citrix License.
Methodologies, strategies and experiences Virtualization.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Virtual Desktops and Flex CSU-Pueblo Joseph Campbell.
An Introduction to Citrix VDI-in-a-Box
Paper on Best implemented scientific concept for E-Governance projects Virtual Machine By Nitin V. Choudhari, DIO,NIC,Akola.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.

City of San Marcos Virtual Desktop Integration. State CIO Priorities for 2011 Virtualization (servers, storage, computing, data center) Cloud computing.
DIY: Your First VMware Server. Introduction to ESXi, VMWare's free virtualization Operating System.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2010 Seminar #1 VIRTUALIZATION EVERYWHERE.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2009 Seminar #1 VIRTUALIZATION EVERYWHERE.
Introduction to VMware Virtualization
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Redefining the Desktop Stu Baker AUL for Library Technology
Virtualization By Tim Ausburn & James Cantrell. Virtualization: Why? Reduce IT Costs Server consolidation Application Isolation Increase Server Utilization.
Adam Duffy Edina Public Schools.  Traditional server ◦ One physical server ◦ One OS ◦ All installed hardware is limited to that one server ◦ If hardware.
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted Module 7.
Take Confident Steps Towards Virtualization Phil Utschig Solutions Architect September 15, 2008 Springfield, IL.
Hands-On Virtual Computing
CSU-Pueblo Joseph Campbell. In the beginning… Started with the beta version of Microsoft Virtual Server – Free (Woohoo!) Purchased ESX Server.
CEG 2400 FALL 2012 Chapter 10 Virtual Networks and Remote Access 1.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
Using Virtualization in the Classroom
Network customization
Basharat Institute of Higher Education
Virtualization for Cloud Computing
Guide to Operating Systems, 5th Edition
VDI Cyber Range Technical Requirements
Installing VMware ESX and ESXi
Agenda Hardware Virtualization Concepts
Virtualizing Apps, Desktops, Servers and Everything in Between
Virtualization OVERVIEW
Building a Virtual Infrastructure
HP Client Virtualization Build on HP Converged Infrastructure
Welcome! Thank you for joining us. We’ll get started in a few minutes.
Virtualization overview
Xen Summit Spring 2007 Platform Virtualization with XenEnterprise
Network+ Guide to Networks 6th Edition
“Geek Out”: DIY vSphere 5.1 Lab
Conditions leading to the rise of virtual machines
Managing Clouds with VMM
Zero Clients and Virtual Desktops in Academic Environments
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Virtualization 101.
Guide to Operating Systems, 5th Edition
VDI Lessons Learned at DU
Vmware View Pilot at UNC
Presentation transcript:

Applying the Power of Virtual Desktops Ask who has virtualization deployed? What kind? Do we need a intro to virtualization? Conrado Wang Ke Cheng de Niemeyer <chengw (at) sacredheart (dot) edu> Information Security Officer, Sacred Heart University

Virtualization Advantages “Cheap”, fast, easy to setup Application isolation Template Deployment Disaster Recovery High Availability Forensic Analysis w/P2V & in place with memory snapshots Honeypotting

Virtualization Disadvantages Using a template image One vulnerability is shared by all Same admin/root passwords??!! Possibly sequential IP range Single file Servers & Workstations Just copy one file and you’re done! Poor multimedia support Many eggs in fewer baskets Virtual Machine Sprawl

Virtualization Vulnerabilities Guest to Guest Attacks Guest to Host Attacks Guest Client Vulnerabilities Management Console/Host OS Vulnerabilities Hypervisor Vulnerabilities Not well developed and widespread, YET…

VM Security Best Practices Security Best Practices (Firewalls, IPS, Patching, Patching, Patching, Patching) Secure your VMs as you would physical machines Secure the Network Use Separate Private backup and SAN network Use Separate Private Management Console network Favor Type 1 Hypervisors for Production and Testing Servers VMWare ESX Server, Citrix XenServer, MS Hyper-V, etc. Favor Type 2 use in Security applications Disable Hardware Acceleration Use QEmu (full emulation mode w/out kqemu) Disable all sharing features Favor Type 2 for Development environments Run different security zones VMs on separate physical hosts Use separate physical switches or VLANs in physical switches Run different Management stations Disable/remove unnecessary virtual hardware

Monitoring in a vSwitch

VMWare ESX Specific VMWare Update (ESX 3.5 & VC 2.5) Fix maximum size and rotation for Log Files Use Resource Management Secure the VI Console Access Verify the ESX Console Firewall rules Use SSL Certificates Encrypt Access to Virtual Center Secure Console’s Linux environment

Virtualization Applications Setting up Development Environments Setting up Testing Environments Setting up Research Environments Honeypotting Consolidate Physical Servers Virtual Secure Desktops… Provide a desktop environment for users Quickly deployed Secured Easily maintained Provide access from those environments to all work tools, systems, and services

Virtual World at Sacred Heart Univ VMware VI3 & vSphere 4 65 Virtual Servers 255 Virtual Desktops Running on 15 Physical blade servers Virtual Desktop Infrastructure (VDI) Secure Desktop Virtual HDD Streaming Thin Clients in our Labs Virtual Test Environments

Secure Desktop (VDI) Architecture

Secure Gateway Architecture

HDD Streaming Architecture

Secure Desktop Backend at SHU Hardware Software HP c7000 Blade Enclosure HP BL460c 2 x Quad Core 2.3Ghz (Intel E5450) 32 GB RAM 4 x 1Gb Ethernet (on 2 separate boards) Netapp 3040 Filers 1TB for VM and vDisk Images 12TB for User/Department Data NFS & iSCSI Cisco Catalyst 3750 Switches 1Gb Ethernet (Copper) 4 x 10Gb Uplink VMware VI3 Quest vWorkspace 7.0 SSL Gateway Connection Broker Citrix Provisioning Server 5.1 PXE Boot HDD Streaming Microsoft Windows XP sp3 Yes it’s Windows 7 Ready  NetApp FlexClone

Secure Desktop Advantages Low learning curve for users Secured access to sensitive data Business data vs. User data Fast Deployment & Scalability Stand new VMs in under 2mins Policy Enforcement Local administrator privileges Anywhere, anytime access Image management Patch 1 image, update everyone Currently ERP (Datatel Colleague R17, R18) Registrar’s Human Resources Business Office Admissions (Recruitment Plus) Financial Aid (PowerFAIDS, EDConnect) Institutional Advancement (Raiser’s Edge) Health Systems (Titanium) Public Safety (ARMS) ImageNow Document Imaging w/USB scanners

Secure Desktop Disadvantages Ok Multimedia Support Now w/Flash Video ACL/Firewall Rule Maintenance Increased Complexity SSL Gateway Connection Broker Provisioning Server ESX Servers SAN & Blade Infrastructure “Quality of Life” Issues Cannot browse the web Cannot persist software changes Cannot connect certain USB devices Coming Soon Cannot access unsafe shares Cannot copy & paste to/from client Cannot connect any USB devices except sanctioned

Physical vs. Virtual Hardware Dell OptiPlex 780 Intel Core2 2.4Ghz 4GB RAM 160GB HDD Integrated Graphics 1Gb Ethernet ~$1,000 VMWare ESX 3.5 Virtual Dual to Quad Core 2.3Ghz 512MB RAM 1MB HDD RDP Graphics 1Gb Ethernet ~$290 w/existing hardware

Getting Buy-in Explain that security is important and they should just listen to IT… (HA! Just kidding… ) Initial deployment for test environments No other alternatives with new version of software Anywhere Anytime Access Ability to access legacy environments with new simultaneously Make no effort to fix the fact that VPN sucks (at least PPTP does…)

New Developments Embedded Hypervisors VMSafe VDI SAN Snapshot Clones ESXi, XenServer OEM, etc. VMSafe VDI SAN Snapshot Clones Netapp FlexClone Sophisticated Virtual Machine Detection

Demo https://securedesk.sacredheart.edu/

Resources, Q & A http://www.cisecurity.org/ http://www.securityfocus.com/ http://www.vmware.com/resources/techresources/c at/91 http://www.citrix.com/ http://www.provisionnetworks.com/