Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 110 Next »

To fully use this screen, you must have the following permissions assigned to your account:

  • Write Virtual Machines
  • View Core License
  • Read Utilization

After you sync your public cloud account with the Armor Management Portal (AMP), you can use the Virtual Machines screen to view the instances associated with your public cloud account.

Additionally, the Virtual Machines screen will display the security status of these instances. All instances for the synced public cloud account will be displayed; however, instances without the Anywhere agent will be labeled as Unprotected.

To sync your public cloud account with AMP, see Cloud Connections.

The Cloud Connection screen simply lists the synced public cloud account; the Virtual Machines screen lists all the instances listed in that public cloud account.

To learn how to install Armor Anywhere, see Install Armor Anywhere.


Review Virtual Machines


The Virtual Machines screen provides a high-level view of all of your virtual machines.

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
    • Search by Virtual Machine, Primary IP, or Tag.
    • Filter by Type, State, or Power Status.
FieldDescription
NameThis column displays the name of the instance from your public cloud account.
Primary IPThis column displays the the primary IP address associated with the instance.
Type

This column display the type of instance, specific to the offerings offered by your public cloud provider, such as EC2 instance for AWS.

  • More common types are VM and Log Relay.
Date CreatedThis column displays the date the instance was created in your public cloud account.
Security GroupsThis column displays the corresponding security group from your public cloud account.
State

This column displays the security status of the instance, in relation to the installed agent. There are three states:

  • Unprotected indicates the agent is not installed in the instance.
    • Instances without an agent will be labeled as Unprotected. All instances from the public cloud account will be displayed.
  • Needs Attention indicates that the agent is installed, but has not properly communicated (heartbeated) with Armor.
  • OK indicates that the agent is installed and has communicated (hearbeated) with Armor.
Power

This column displays the power status of the virtual machine:

  • A green icon indicates that the virtual machine is powered on.
  • A red icon indicates that the virtual machine is powered off.
  • An orange icon indicates that the virtual machine is in a different (inconsistent) power state than the other virtual machines in the same vApp.
  • An infinite loop icon indicates that the virtual machine is pending installation.
TagsThis column displays any tags that have been added to the virtual machine on the Tags + Notes screen.



Review Details for a Specific Virtual Machine


From the Virtual Machines screen, you can access detailed information for each virtual machine.

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Locate and select the desired instance.


Overview

This section displays detailed information for the virtual machine.

ColumnDescription
Type

This entry displays the type of instance, specific to the offerings offered by your public cloud provider, such as EC2 instance for AWS.

  • More common types are VM and Log Relay.
ProviderThis entry displays the public cloud provider for the instance.
Instance IDThis entry displays the ID associated with the instance or virtual machine.
Instance State

This entry displays the security status of the instance or virtual machine.

Original OS VersionThis entry displays the original operating system for the instance or virtual machine.
Current OS VersionThis entry displays the current operating system for the instance or virtual machine.
Public IPThis entry displays the public IP address associated with the instance or virtual machine.
Agent ID

This entry displays the unique ID associated with the Armor Agent.

Agent VersionThis entry displays the version of the Armor Agent.
Last Heartbeat

This entry displays the date and time of the last successful heartbeat.


Sub-Agent Health Table

This section displays the sub-agent health related to your Armor-protected virtual machines.

COLUMNDESCRIPTION
Name

This entry displays the specific service that is being checked.

ProductThis column displays the product name associated with the sub-agent.
Sub-Agent VersionThis column displays the sub-agent version.
State

This entry displays the status of the service, either OK, Needs Attention, or Pending.

  • The status will reflect Pending for up to two hours from the time the virtual machine or Armor agent is initially registered.
MessageIf the status is Needs Attention, then this entry will display additional details on the service check results.



Review Sub-Agent Health Details for a Virtual Machine


For each of your virtual machines, you can view sub-agent health details. You can use this information to troubleshoot agents that may be in a bad state.

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.

  3. Locate and select the desired instance.
  4. Locate and hover over the sub-agent that you want to view.
  5. Click the name of the desired sub-agent. Or, click the vertical ellipses, then click View Details.
  6. On the left-side of the screen, select the sub-agent that you want to view.
    1. The information that displays on the right-side of the screen will change based on the sub-agent that is selected.

Armor Agent

Review specific information and troubleshooting steps for the Armor Agent service.

SECTIONDESCRIPTION
Details

This section displays the following information for the Armor agent:

Heartbeat

  • Last Heartbeat
  • Heartbeat Window
  • Steps to Remediate

Agent Version

  • Installed Version
  • Current Version
  • Steps to Remediate


File Logging

Review specific information and troubleshooting steps for the File Logging service.

SECTIONDESCRIPTION
Details

Logs

  • Last Log Received
  • Log Received Window
  • Steps to Remediate

Log Version

  • Installed Version
  • Current Version
  • Steps to Remediate
Connectivity

This section displays the script to check connectivity, along with steps to remediate.


File Integrity Monitoring

Review specific information and troubleshooting steps for the File Integrity Monitoring (FIM) service.

SECTIONDESCRIPTION
Trend to Armor Sync

Trend

  • Host ID
  • Status
  • Last Communication

Armor

  • Host ID
  • Status
  • Last Communication

Steps to Remediate

ConnectivityThis section displays the script(s) to check connectivity, along with steps to remediate.
Errors

This section displays any known errors, along with steps to remediate.


Intrusion Detection System

Review specific information and troubleshooting steps for the Intrusion Detection System (IDS) service.

SECTIONDESCRIPTION
Trend to Armor Sync

Trend

  • Host ID
  • Status
  • Last Communication

Armor

  • Host ID
  • Status
  • Last Communication

Steps to Remediate

ConnectivityThis section displays the script(s) to check connectivity, along with steps to remediate.
Errors

This section displays any known errors, along with steps to remediate.


Malware Protection

Review specific information and troubleshooting steps for the Malware Protection service.

SECTIONDESCRIPTION
Trend to Armor Sync

Trend

  • Host ID
  • Status
  • Last Communication

Armor

  • Host ID
  • Status
  • Last Communication

Steps to Remediate

ConnectivityThis section displays the script(s) to check connectivity, along with steps to remediate.
Errors

This section displays any known errors, along with steps to remediate.


Vulnerability Scanning

Review specific information and troubleshooting steps for the Vulnerability Scanning service.

SECTIONDESCRIPTION
Registered

This section displays the following information for the Armor agent that is registered:

  • Agent ID
  • Asset ID
  • Status
  • Steps to Remediate
Scan Import

This section displays the following scan import information for the Armor agent:

  • Report Date
  • Expected Window
  • Status
  • Steps to Remediate
ConnectivityThis section displays the script(s) to check connectivity, along with steps to remediate.
Last Scan Time

This section displays the following information regarding the most recent scan:

  • Scan Time
  • Expected Window
  • Status
  • Steps to Remediate



Add Tags and Notes to a Virtual Machine


You can use the Tags + Notes section to add tags to your instance, to improve categorization and search capabilities. You can also add notes to help track changes and tasks related to an instance.

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Locate and select the desired virtual machine.
  4. Click Tags + Notes.
    1. In the Tags section, enter the desired tag, then click the ( + ) symbol to add.
      1. Multiple tags may be added.

    2. In the Notes section, enter the desired note.
  5. Click Save Changes.



Remove Tags and Notes from a Virtual Machine


  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Locate and select the desired virtual machine.
  4. Click Tags + Notes.
    1. In the Tags section, click the "X" next to the tag that you want to remove.
    2. In the Notes section, delete or edit the note.
  5. Click Save Changes.



Enable Auto-Removal of Inactive Virtual Machines


The auto-remove feature allows you to remove your virtual machines from AMP that are no longer communicating with Armor.

This feature does not remove your virtual machines from your cloud provider.

This setting is limited to users in the Admin role only.

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Hover over the plus ( + ) icon, and then click the Virtual Machine Settings icon.
  4. Click the Auto remove VMs setting to enable the auto-remove feature.
    1. Click the setting again to disable the feature.
  5. In Remove VMs after, select the desired time frame for when your virtual machines should be removed - 7 Days, 14 Days, or 30 Days.
  6. Click Save.



Export Usage Data


  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Click Export Usage.
  4. In the drop-down menu, select a file type to download.
  5. Select the range of data to download.
  6. Click Export Usage.
    • A file will download to your local machine.
OptionDescription
All Usage + Summaries - 1 month maxThis option will download a .zip file every available file type:
  • Usage by Host
  • Usage by Hour
  • Usage Details
Usage Details - 1 month max

This option downloads a .zip file with the following information:

ColumnDescription
AccountIdThe ID for the Armor Account
AccountNameThe name of the Armor account
ProviderNameThe public cloud provider
ResourceNameThe name of the virtual machine (asset)
AgentIdThe ID for the Armor Anywhere agent
UsageDateTimeThe time and date for the usage, on an hourly rate
Summary Usage by Host - 6 months max

This option exports the following information:

ColumnDescription
AccountIdThe ID for the Armor Account
AccountNameThe name of the Armor account
ProviderNameThe public cloud provider
ResourceNameThe name of the virtual machine (asset)
TotalHoursThe total number of hours that the virtual machine (asset) was powered on.
Summary Usage by Hour - 6 months max

This option exports the following information:

ColumnDescription
UsageDateTimeThe hour-long interval for the selected date frame
AccountIdThe ID for the Armor Account
AccountNameThe name of the Armor account
Quantity The total usage for your hosts for the indicated hour


View CLI Results


Users running commands using either Command Line Interface (CLI) or the Armor Toolbox can review the results of commands invoked on a given machine using the CLI Results tab.

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Click the desired Virtual Machine name.
  4. Click CLI Results.

The CLI Results table provides information on commands run on a VM.

Column NameDescription
Time StampDate and time of when the command was invoked
Product NameName of the Armor feature or subagent for which the command was invoked
Product OperationThe operation invoked by the command
ConfigurationDesignation of the configuration determined by the command
STDOUTOutput of the command
STDERRError output of the command
DurationRuntime duration measured in milliseconds
Result Code

Indicates if the command execution was successful

  • Success will display a 0 (zero)
  • Failures will result in an error code (provided below)

If an error code is returned, please contact support.


Clicking the Expand icon next to the Time Stamp of a result will display the output stream, which can be collapsed or expanded using the + Show More and - Show Less toggle on the far right of the stream window.


CLI Error Codes

Error codeEventsDescriptionCustomer Fix
-1Script timed outScript timed outContact support.
201Download Failed

Unable to download files this

may cause due to invalid

download path

Check firewall ports. Ensure running as admin.
202

Path Not Found/Error

in locating file

File is not avaliable in the given locationCheck firewall ports. Ensure running as admin. Check disk space and permissions to temp directories.
203

API Error/Unable to

complete operation

Error occurs while calling or

getting result from API

Check firewall ports. Ensure correct command was executed.
204Installation FailedInstallation of software failedEnsure running as admin. Check disk space. Check directory permissions.
205Uninstallation FailedUnInstallation of software failedEnsure running as admin. Check directory permissions.
206

Error while uploading

to S3 bucket

Error while uploading files

to S3 bucket

Contact Support
207Service Failed to Start

Failed to start subagent's

services on VM

Ensure service exists. Ensure install command worked correctly.
208

Invalid operation configuration

Invalid opertation added

in command

Use valid operation in command check
209

Timeout waiting for

trend service to start

Timeout waiting for trend

service to start while done clone

Run "trend clone" command
210

Unable to unlink Malware

Protection Support

Unable to unlink Malware

Protection Support while clone

Run "trend clone" command
211

Unable to register Malware

Protection Support

Unable to register Malware

Protection Support while clone

Run "trend clone" command
212Subagent is not availableSubagent is not available on the boxExecute appropriate command to install subagent
213Invalid installation package

Invalid installation package

downloaded on the box

Check firewall ports. Ensure there isn't a WAF blocking the download.]
214

You are not running as

an Administrator

command requires admin

privilege

Run as Administrator
215Failed to get HOST_ID

HostId was not available

in the box

Wait some time. We will eventually pick up the HOST_ID via backend jobs.
216Checksums do not matchChecksums do not matchCheck firewall ports. Ensure there isn't a WAF blocking the download.
217

Enable of file beat module

and component Failed

Enabling of file beat module

and its component Failed

Ensure you're running the latest version. Reinstall logging if needed.
218

Disable of file beat module

and component Failed

Disable of file beat module

and its component Failed

Ensure you're running the latest version. Reinstall logging if needed.
219Error in creating directory

Error in creating folders

lib,etc,log

Check permissions. Ensure running as admin.
220Extract Failed

Extraction file from any

extractable file failed

example tar.gz file

Check powershell version on windows. Ensure unzip exists for windows.
221Invalid uninstall code

The command expect valid

Uninstall code

Contact Support
222Invalid ConfigThe config file received is invalidContact Support
223Service Restart Failed

Failed to restart Subagent's

services

Check service exists. Start manually and check for errors
224Service Stop Failed

Failed to stop subagent's

services

Check service exists. Start manually and check for errors
225

Logging module commands

are not supported

Logging module commands

are not supported

Ensure you're running the latest version. Reinstall logging if needed.
226

The config value was not

retrieved

Expected config for logging

module not received from api

Run "logging sync-config"
227

Unable to backup the current

filebeat config

Unable to backup the current

filebeat config

Run "logging sync-config"
228

Unable to update the current

filebeat config

Unable to update the current

filebeat config

Run "logging sync-config"
229

Error occurred in retrieving

the panopta manifest

Error occurred in retrieving

the panopta manifest from api

Contact Support
230

openssl is not installed

openssl is not installed. We need openssl to check TLS connectivityInstall openssl and Re-Run tls-check command


View Vulnerabilities


Users wanting to assess vulnerabilities on an asset can do so through the Vulnerabilites tab in the Asset detail screen within the Virtual Machines section the portal.

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Click the desired Virtual Machine name.
  4. Click Vulnerabilities.

The Vulnerabilities table provides information on vulnerabilities detected on a VM.

Column NameDescription
Vulnerability Name

Name of the vulnerability detected

CVSS Score

This columns displays the Common Vulnerability Scoring System (CVSS) score assigned to the vulnerability.

The breakdown of CVSS Scores aligns with the Severity types.

Severity

This column displays the severity level of the vulnerability.

There are four severity types, based on the vulnerability's CVSS:

  • Critical vulnerabilities receive a score of 10.
  • High vulnerabilities receive a score of 7-10.
  • Medium vulnerabilities receive a score of 4-7.
  • Low vulnerabilities receive a score of 0-4.

    There is an additional severity type called Info. Although Info is listed as a severity type, in reality, Info simply displays activity information for corresponding plugins from third-party vendors.
Vulnerability TypeDesignation of the vulnerability
CategoryThe category of the vulnerability
First FoundTime stamp of the first detection of the vulnerability
Last Foundtime stamp of the last detection of the vulnerability


In some instances, a solution is provided below the vulnerability. For example, vulnerabilities from the Internet Explorer category will provide a link to Microsoft's Security Update Guide. Clicking the name of the vulnerability will take the user to the Vulnerability detail screen in AMP



Was this helpful?



Topics Discussed

  • No labels