All Posts

VMware AppDefense provides a RESTful HTTP API for reading and modifying data via the cloud management console. The AppDefense API uses JSON for all requests and replies and uses the GET, PUT, POS... See more...
VMware AppDefense provides a RESTful HTTP API for reading and modifying data via the cloud management console. The AppDefense API uses JSON for all requests and replies and uses the GET, PUT, POST, and DELETE HTTP verbs. All requests are over TLS / HTTPS and the AppDefense server presents a CA-signed TLS certificate. All API requests require an authorized client. Clients obtain an API key for AppDefense in the AppDefense UI at https://appdefense.vmware.com/app/console/integrations. The API key is currently a JSON Web Token (JWT), however, clients should treat API keys as opaque tokens that might be changed to a non-JWT token at some future date without notice. To authenticate, the client should include their API token in the Authorization HTTP header as a "Bearer" token. API tokens do not currently expire, but they can be manually revoked by the customer via the AppDefense UI. If an API token is incorrect or expired, the AppDefense API will return a 403 Forbidden response. Now let’s try to query the alarms in an Org using Postman – Step 1 - Navigate to the "Integrations" tab under settings and select “Provision new API Key” Step 2 – Copy the endpoint URL & API Key Step 3 – Open Postman client and under ‘Authorization’ tab select type ‘Bearer Token’ and paste API key in the Token field. Step 4 – Use the endpoint URL and the method specified for an API to query the cloud management console. In the below screenshot I have used the API to pull all the active alarms in my Org. Similarly, if you want to list the scopes in your org you execute “GET: https://appdefense.vmware.com/partnerapi/v1/orgs/{org-id}/scopes” Hope this quick how to use Partner API helps you in your day to day administration of AppDefense! How to locate the Partner REST API Documentation : https://communities.vmware.com/docs/DOC-40563 Happy AppDefending! The AppDefense Architect Team.
Whats New (October, 2019) AppDefense announces a significant feature release with version 2.3.0. Most notably, we have expanded the capabilities of the AppDefense Plugin in vCenter to include... See more...
Whats New (October, 2019) AppDefense announces a significant feature release with version 2.3.0. Most notably, we have expanded the capabilities of the AppDefense Plugin in vCenter to include vulnerability assessment, OS integrity, and behavior analysis with Machine Learning. That’s right, we’re bringing Machine Learning models on premise. On the SaaS side, we release a slew of features that have been top customer asks, including severity-based process kill (using the cloud to make prevention decisions), our first RBAC capabilities, and rebootless install/upgrade so that you can start protecting your VMs without rebooting them. Process Kill AppDefense adds the ability to retroactively kill processes that the App Verification Cloud determines are untrusted. Instead of blocking everything immediately, “process kill” enables customers to operate in a semi-restrictive state—preventing only suspected bad behavior while allowing everything else to run. Select “kill process” from the dropdown list in the service rules. Behavior Timestamps With the “behavior timestamps” feature, AppDefense now reports on when a behavior was last executed within a service. This allows customers to clean up old behaviors that an app no longer needs, as well as determine an app’s most recent executions. The “last seen” field is exposed in the AppDefense Manager at the service card-level, as well as at the individual behavior-level. Alert Classification Enhancements AppDefense now lowers the severity of an alert based on its overall similarity to the existing allowed behaviors for that service. This improvement allows the service behaviors to be more flexible and means less work for the operator. AppDefense now also defines a list of known processes that warrant further investigation. Deviations from processes in this list result in higher severity alerts. SaaS User Roles AppDefense now defines two user roles for the operation of the SaaS Manager—“Admin” and “Analyst.” Admins have full privileges, including user configuration and remediation settings (block, suspend, kill, etc). Analyst is the default user role and cannot change remediation settings. For a complete breakdown of responsibilities, consult the user guide. Rebootless Install and Upgrade The AppDefense guest module can now be upgraded without requiring a reboot. This is a major improvement in usability and operationalization for the solution. This feature is available if your guest module is 2.2.1 or higher. Domain Name Support for Allowed Behaviors AppDefense can now create allowed behaviors based on DNS records, as opposed to IP addresses. This is a major improvement in determining robust manifests for a service, resulting in fewer behaviors to monitor and fewer deviations from the manifest. Severity-based Remediations All remediation actions, except for block, now only get triggered by critical alerts. All other events (serious, minor, and info) will simply alert. This enhancement should increase comfort with deploying remediation actions, as only the most critical deviations will generate an action on the guest. Support for NSX-T AppDefense now supports integration with NSX-T for quarantine remediation. AppDefense will continue to support the existing NSX-V integration. Proxy Support AppDefense adds SOCKS4 and SOCKS5 Proxy support for the AppDefense Appliance, in addition to the existing HTTP Proxy support. Health Monitoring for AppDefense Components If a host or guest module becomes unreachable, AppDefense proactively collects host and guest logs for immediate troubleshooting. This setting is available in the Appliance UI. Upgrade Improvements AppDefense announces a number of usability improvements to make appliance upgrades simpler and more seamless. One such feature is the ability to automatically roll the appliance back to a stable state in case of failure. Automatic reversion increases comfort with turning on “auto upgrade.” This feature is available in appliance versions 2.2.1 and onward when you partition an additional 60GB of disk space for the automated snapshot. Increased Scale Targets Appliance scale targets are increased again to 250 Hosts and 3000 VMs (per vCenter). Intelligent Wildcarding With this release, AppDefense curates a list of process CLIs that have higher wildcarded thresholds. This feature gives users greater control over key software in their environment.
What's New In AppDefense Plug-In Release Overview 2.3 This release delivers a major update to AppDefense in vCenter. Notably, this release includes OS Integrity features, Behavior Analysis fu... See more...
What's New In AppDefense Plug-In Release Overview 2.3 This release delivers a major update to AppDefense in vCenter. Notably, this release includes OS Integrity features, Behavior Analysis functionality, and an entire suite of vulnerability assessment capabilities. In particular, the vulnerability capabilities are notable because they are available in vCenter only (not SaaS) and they are built specifically for the vAdmin. Vulnerability Enumeration AppDefense announces a full suite of capabilities around vulnerability assessment. AppDefense enumerates vulnerabilities on vSphere components, Operating Systems, as well as the applications running on top. As processes execute, AppDefense determines the vulnerabilities associated with that software. This feature requires outbound internet access. Vulnerability Prioritization In addition to enumerating the vulnerabilities in your environment, AppDefense prioritizes every vulnerability using real-time threat information collected from sensors around the world. AppDefense ingests this feed from Kenna Security, the leader in vulnerability prioritization, to determine the overall risk for your environment. OS Integrity AppDefense delivers OS Integrity and Module Integrity features to vCenter. On by default, these features prevent against major technique categories in the MITRE ATT&CK Framework, including persistence and defense evasion. Behavior Analysis AppDefense announces the ability to analyze network behavior on-premise. With assistance from the App Verification Cloud, AppDefense gathers information about the network activity of known processes and determines if the behavior is trusted. This feature requires outbound internet access but not a full SaaS subscription. Enriched Dashboard With this release, the AppDefense Plugin in vCenter is improved to include OS Integrity, Behavior Analysis, and Critical Vulnerabilities. These additional "front page" widgets provide the most important information about risk in your environment in a simple, easily consumable format. Use this page as a jumping-off point to visibility and risk information about specific virtual machines. Process Monitoring for Unclassified Machines The VM Monitor view in vCenter now includes process information for all processes, including those without network activity. This expands the Guest Monitoring capability which previously only included those processes with network connections. Globalization Support The AppDefense Plugin now supports 7 languages (Japanese, French, German, Simplified Chinese, Traditional Chinese, Spanish, Korean)
Hi AppDefenders, We just launched AppDefense version 2.3.0! This is our largest feature release to date (see features listed below). With this version we offer two ways to upgrade: Not... See more...
Hi AppDefenders, We just launched AppDefense version 2.3.0! This is our largest feature release to date (see features listed below). With this version we offer two ways to upgrade: Note: Before either step you must run a script, steps listed in the upgrade documentation below. 1. Traditional Upgrade In this option, you will need to add an additional disk to the appliance. In this case if the upgrade fails the appliance will automatically revert to the earlier version. Directions on how to add an additional disk can be found in the upgrade documentation below. 2. Fail Safe Upgrade In this option, you will need to add an additional disk to the appliance. In this case if the upgrade fails the appliance will automatically revert to the earlier version. Directions on how to add an additional disk can be found in the upgrade documentation below. Please, use these resources to help with the upgrade process: Upgrade Documentation here. Release Notes here. Quick Start Guide here. Community page here. AppDefense v2.3 Release Major Features: Process Kill Behavior Timestamps SaaS User Roles Quarantine Support for NSX-T Proxy Support Domain Name Support in Allowed Behaviors Proactive Troubleshooting / Health Monitoring Upgrade Improvements (Fail Safe and Rebootless upgrade) Plug-in: Os Integrity Features ML analysis (Windows) Vulnerability Enumeration and Prioritization Let us know if you have any questions. Happy AppDefending! Paige & The AppDefense Team  
In the past we always stressed the need to save the Manager URL, UUID and API key that was given to you when you provisioned a new appliance in AppDefense. This was because there was no way for u... See more...
In the past we always stressed the need to save the Manager URL, UUID and API key that was given to you when you provisioned a new appliance in AppDefense. This was because there was no way for us to get a new API key for that appliance and if it was lost a new appliance would have to be deployed. Now with a recent update we allow you to regenerate the API key for a given appliance in case your forgot to save it or lost the one you saved. This will save some time and headache of having to deploy a whole new appliance in case of needing to re register the appliance. Step 1: Navigate to the "Appliances" tab under settings and select the appliance you wish to regenerate the API key for. Step 2: Click on "ACTIONS" and then click on "Regenerate API Key". Step 3: A popup will appear with the information you need to copy to take to your AppDefense appliance to register it with the SaaS manager Step 4: Re-register the appliance using the newly generated API Key following these directions: Step 1C: Register AppDefense Appliance With vCenter Server  Hope this quick how to helps you in your day to day administration of AppDefense! Happy AppDefending! The AppDefense Architect Team.
We cannot share links to software for which you have no entitlement. As a vExpert, you should well know this. You may possibly have licenses for you in your vExpert portal.
Is anyone using VMware appdefense? I would like to download the AppDefense for demo/lab purpose please let me now the link if you have any. Thanks
Working with VMware AppDefense without SaaS subscription | Security & Compliance Blog | VMware You do not need a SaaS subscription of VMware AppDefense to leverage this technology in your data... See more...
Working with VMware AppDefense without SaaS subscription | Security & Compliance Blog | VMware You do not need a SaaS subscription of VMware AppDefense to leverage this technology in your data center today. You can access many of the benefits of AppDefense on-prem by upgrading to the Platinum version of vSphere. Read this post by AppDefense Solution Architect at, nishus to learn more about the AppDefense plug-in available in vCenter. Get started here > To learn more about VMware AppDefense visit: www.vmware.com/appdefense, or start a free test drive today.
Hey KevBot​ just checking to see if you had any additional questions? If so I'd also be happy to setup a call with you as that might be a little easier than continuing via the forum but I want to... See more...
Hey KevBot​ just checking to see if you had any additional questions? If so I'd also be happy to setup a call with you as that might be a little easier than continuing via the forum but I want to make sure you get all the questions you need answered Thanks!
Happy to help KevBot​! As with the first post, please find my response in-line below. My current understandings: On-Prem AppDefense can function normally without NSX, the only requiremen... See more...
Happy to help KevBot​! As with the first post, please find my response in-line below. My current understandings: On-Prem AppDefense can function normally without NSX, the only requirements is vCenter. The only functional benefit to NSX is for VM quarantine. This is correct. AppDefense can monitor Inbound/Outbound Communications of applications whitelisted, and take action against deviations from the whitelisted applications. I want to make sure that we understand that the term "Whitelist" purely means to Classify Down. Meaning classify alerts from a hash with a lower severity. Whitelisting does NOT mean "Allow". AppDefense can monitor inbound/outbound connections from Processes within a VM. It also has the ability to monitor processes on a VM even if they don't make an inbound/outbound connection. AppDefense has the ability to take action on process and inbound/outbound connections that deviate from the learned behavior. The Guest Module is an endpoint agent that monitors OS integrity, processes, and applications. This is partially correct. The Guest Module is a feature of VMtools. This is how we can claim that AppDefense is agentless because the feature lives in VMtools. You are correct that the AppDefense module monitors processes and network behavior. OS Integrity is a separate driver in the latest version of VMtools (VMtools 11) but shares a driver with the guest module in prior versions of VMtools. Remediation functions for On-Prem include: Alert, Report, Block, Suspend, Snapshot, and Shut-down. You are correct that these remediation actions are the ones available in AppDefense. On-prem might be a little misleading. You can only manage the remediation actions from within the AppDefense SaaS Manager. AppDefense integrates with CB Defense for threat reputation only, currently. CB Defense is a separate product with it's own features. This is mostly correct. We integrate with Carbon Blacks threat database to assign threat/trust scores to hashes. We also integrate specifically with CB Defense to ingest their alerts. So, if CB Defense throws an alert then it will also show up in the AppDefense SaaS manager. Clarification/Additional Questions: What I mean by Application Inventory function is that it is a function that collects a list of applications and files on the endpoint and compares them through their respective vendor's machine learning intelligence (McAfee's GTI/TIE, Symantec AML/Insight, etc). Once inventory has been established for endpoints and trusted/blocked, that trusted whitelisted policy can be applied to other endpoints in their respective groups. There's also a feature for Image Deviation. Which reports/responds to, as the name suggests, deviations from the gold image configured. Does AppDefense work in a similar fashion to the above? AppDefense performs similar but not in the same way as what you're describing above. AppDefense has the ability to compare the learned behaviors (process/network connections) with all of the data that we gather from every AppDefense customer and validate if that behavior is a verified behavior. What we don't do is automatically allow that behavior on that endpoint or any other endpoint. Your answer about memory protection suggested in monitors the pagefile. Does AppDefense monitor the RAM on the endpoint and respond to fileless malware threats? This I will have to defer to ​ CB Defense, being a separate product, requires it's own Agent to be installed on the endpoint. It cannot be ran agentless? or does it have an agentless version? Today, I do not believe they have an agentless solution but you would have to check with Carbon Black on that particular question. What are the features/function loss when moving to an Agentless AppDefense? I will follow nishus for the blog post and read up on that blog post, for sure. Thank you for that. Still, it's worth it to me to ask these questions anyway. Never hurts to ask, right? AppDefense is always agentless. There is never an agent with AppDefense. There are two different versions of AppDefense. AppDefense SaaS and AppDefense Offline. There's actually a third version as well but for the intent of this conversation we'll focus on these two. AppDefense SaaS is the fully featured AppDefense product. This gets you access to the AppDefense SaaS manager hosted in the cloud. This is where you manage your AppDefense environment including creation of scopes and services, seeing alerts and events, setting remediation actions and more. AppDefense Offline only works with vSphere 6.7u1 and higher and only allows you to see process information plus a couple of other items directly from within vCenter. I see monitoring Inbound/Outbound communication the primary vector for identifying process behavior? We can see all process behavior whether that process makes a network connection or not. We also see the Command Line Arguments (CLI) that that process is executing to perform a specific behavior. I'm still unclear as to how the Agentless AppDefense version monitors Applications from the Hypervisor level. Does On-Prem Agentless match functionality of SaaS? This is where I think there's some confusion regarding agentless and on-prem. As mentioned above, AppDefense is always agentless. We are able to use the hypervisor for communication with VMs via the VMCI channel and thus do not need any networking requirements to communicate with VMs. This is also how we can be agentless because the ESXi host has visibility into the VMs that are running on it. I hope this helped answer your additional questions! I'm sure there will be more but what I highly recommend is following the VMware Security Blog space where myself and my colleagues regularly post content. Also check out our youtube channel here: VMware AppDefense - YouTube​. There's also a quickstart guide that our team developed here: VMware AppDefense - VMware AppDefense Quick Start Guide​. That quickstart guide has a page with helpful links with a lot of content to review that should also help in understanding how AppDefense works Thanks so much for your interest in AppDefense
Thank you ephuber​! I appreciate your detailed responses. I have some additional questions and some clarifications for you: Again I appreciate everything, this has been very helpful. I'm excit... See more...
Thank you ephuber​! I appreciate your detailed responses. I have some additional questions and some clarifications for you: Again I appreciate everything, this has been very helpful. I'm excited for the product, but want to make sure it's functional for customers environment before I start uprooting existing vendors My current understandings: On-Prem AppDefense can function normally without NSX, the only requirements is vCenter. The only functional benefit to NSX is for VM quarantine. AppDefense can monitor Inbound/Outbound Communications of applications whitelisted, and take action against deviations from the whitelisted applications. The Guest Module is an endpoint agent that monitors OS integrity, processes, and applications. Remediation functions for On-Prem include: Alert, Report, Block, Suspend, Snapshot, and Shut-down. AppDefense integrates with CB Defense for threat reputation only, currently. CB Defense is a separate product with it's own features. That's my take away so far. Is this correct? Clarification/Additional Questions: What I mean by Application Inventory function is that it is a function that collects a list of applications and files on the endpoint and compares them through their respective vendor's machine learning intelligence (McAfee's GTI/TIE, Symantec AML/Insight, etc). Once inventory has been established for endpoints and trusted/blocked, that trusted whitelisted policy can be applied to other endpoints in their respective groups. There's also a feature for Image Deviation. Which reports/responds to, as the name suggests, deviations from the gold image configured. Does AppDefense work in a similar fashion to the above? Your answer about memory protection suggested in monitors the pagefile. Does AppDefense monitor the RAM on the endpoint and respond to fileless malware threats? CB Defense, being a separate product, requires it's own Agent to be installed on the endpoint. It cannot be ran agentless? or does it have an agentless version? What are the features/function loss when moving to an Agentless AppDefense? I will follow nishus​ for the blog post and read up on that blog post, for sure. Thank you for that. Still, it's worth it to me to ask these questions anyway. Never hurts to ask, right? I see monitoring Inbound/Outbound communication the primary vector for identifying process behavior? I'm still unclear as to how the Agentless AppDefense version monitors Applications from the Hypervisor level. Does On-Prem Agentless match functionality of SaaS?
As the current AppDefense user who administers the product, you may wish to add additional members of your team to the AppDefense SaaS Org. To accomplish this you need to first check if you have ... See more...
As the current AppDefense user who administers the product, you may wish to add additional members of your team to the AppDefense SaaS Org. To accomplish this you need to first check if you have been setup as an “Admin” user in your organization. Step 1: Log into the SaaS Portal with your email and password that you have already used to access appdefense.vmware.com Step 2: Click on the gear icon next to your email address in the bottom right hand corner of the welcome screen. If there is a “Users” button visible (see screenshot below), you have been setup as an Admin of your Org. Click on “Users” and proceed to “Step 3”. If you have not been setup as an Admin of your Org, you’ll need to email appdefense_support@vmware.com to request Admin privileges. Once you have received Admin privileges, you should see the “Users” button referenced below. Step 3: In this screen you’ll be able to see all the users that have access to your Org. To invite a new user, click on the “Invite Users” button in the top right hand corner. Step 4: Enter the email addresses, comma separated, of your colleagues that you’d like to add to AppDefense and click “Invite”. Once you've performed the above steps the additional users will receive an invite to join your AppDefense org. They'll need to create a password upon first login but that's it! Your additional users now have access to AppDefense. We hope this quick “How To” helps in your day to day administration of AppDefense! Happy AppDefending, The AppDefense Architect Team.
AppDefense can natively integrate with numerous third-party products for ease of administration and ingestion of alerts. What about third-party tools that we don't natively integrate with? Many a... See more...
AppDefense can natively integrate with numerous third-party products for ease of administration and ingestion of alerts. What about third-party tools that we don't natively integrate with? Many admins don’t know is that there is REST API documentation available for coding integrations with other third-party applications that support REST API endpoint development. It’s real easy to obtain this documentation directly from within the AppDefense SaaS Manager. Step 1: Log into the AppDefense SaaS Manager using your credentials previously set up. Step 2: Click the gear icon next to your email address in the bottom left hand corner and select, “Integrations”. Step 3: Click the link, “Partner API Documentation”. This will download the document in PDF format for your consumption. Once downloaded you can review samples of API calls available as well as the JSON format that you can expect to receive or require for POST calls. We hope this quick, “How To”, post helps you in your day to day administration of AppDefense and we are excited to see you integrating AppDefense with other products through our REST API. Happy AppDefending, The AppDefense Architect Team.
Hello KevBot​ Thanks for your questions surrounding AppDefense I will outline the answers to your question in-line below but first I wanted to clarify something. AppDefense and CB are two diff... See more...
Hello KevBot​ Thanks for your questions surrounding AppDefense I will outline the answers to your question in-line below but first I wanted to clarify something. AppDefense and CB are two different products and as such will perform independently of each other as well as have different architectural requirements. Just keep this in mind as answer your questions below. One thing to keep in mind is I'm sure you've heard our intent to acquire CB. As that deal has not gone through we are two separate companies with two separate product offerings. Once we get to close on that deal, we look forward to being able to share some more details on thoughts about integration. Take a look at the answers below and let me know if you have any additional questions. You can also hit us up in our slack channel #appdefense for questions. I'm one of the Solution Architects on the AppDefense team and that slack channel also has the PMs for AppDefense in it as well. Thanks! Can AppDefense+CB Defense run on vCenter alone? AppDefense does have an offline version that can work without SaaS but you do require vSphere Platinum for this functionality to prove beneficial as you'll only get the vCenter plugin with that version of vSphere. You also lose out on certain functionalities when running in purely offline mode in vSphere Platinum. Keep an eye out on VMware's Security Blog for an upcoming post by my colleague ​ on exactly what functionalities you lose out by running in purely on-prem mode. Can AppDefense+CB Defense run agentless without NSX? AppDefense is able to run agentless without NSX. AppDefense is a completely separate product than NSX and is thus agnostic to NSX being present. The only added functionality you get today with NSX integration is the ability to quarantine a VM as a remediation action in AppDefense. AppDefense has the ability to see, report, alert and take remediation actions all without the presence of NSX. How effective is application whitelisting on an agentless endpoint? Could you provide some more clarity on this question? The way whitelisting works in AppDefense is to assist in the classification of alerts that are generated. AppDefense is a Zero Trust product which means it learns the intended state (all the behaviors) of a VM/Application and then locks down the manifests of those behaviors and alerts on any deviation. When an alert is generated it goes through a classification process to assign a severity to that alerts. Whitelisting a hash in AppDefense serves the purpose to help classify an alert associated with that hash down to a lower severity. How does AppDefense+CB Defense handle unknown file reputations? Does it have self-approval? AppDefense integrated with CB to provide a Trust or Threat score to a process. This is indicated by a number value ranging from 0-10 for both scores. If a process shows up that has no reputation score associated with it, AppDefense takes that into consideration when classifying that alert. That is to say if there are no scores at all for a particular process and we have not verified that process through our own social assurance (Machine Learning), AppDefense may assign a higher severity to an alert associated with that hash. How does it handle Windows Patch Weekend? Windows Updater likes to spawn unsigned powershell scripts in different directories. Making it really hard to isolate to whitelist the process stream. AppDefense has built in logic to detect if a process is changing as a result of a patch or upgrade. It might trigger alerts at the moment but AppDefense will know after classification that it was a change in behavior due to an upgrade and then take appropriate measures to ensure that it's not alerted on again. Does it offer Memory Protection? We have the ability to detect Guest OS Integrity issues and one of the checks we are looking for is page file tampering. If we detect any kind of tampering at all we automatically throw a critical alert. Is there an inventory function? Could you elaborate on this a little more? In the AppDefense SaaS manager, you have the ability to see all the ESXi hosts and VMs that are part of the vCenter that you registered AppDefense with. This is how you install the ESXi host module and add VMs to Scopes and Services. How effective is AppDefense+CB Defense agentless with NSX vs vCenter + Guest Module Agent? AppDefense + CB Defense provides great coverage and together can effectively protect against the majority of threats out there. Threats are constantly evolving and we are evolving with them. AppDefense by providing that Zero Trust protections is the most effective solution to protect against said threats and with the addition of CB Defense you just add that additional layer of protection! I should note that today CB Defense is not an agentless solution because it's a completely different product and it requires an agent to be installed if I remember correctly. The guest module you refer to is part of VMware tools and is a feature that is just enabled but is included by default in VMtools 10.3.2 and above. Does the AppDefense SaaS offering run agentless? Does it require NSX?' AppDefense is agentless both on-prem and SaaS. The feature which provides network and process attestation is built directly into VMtools. It's disabled by default and has to be enabled but it's already built into VMtools. AppDefense does NOT require NSX to function. How does the effectiveness/performance compare to other vendors such as Symantec EP, McAfee ENS/App Control, Trend Micro Deep Security? AppDefense is not an EDR replacement today and such comparing it to these over vendors is not black and white. AppDefense is a zero trust application which protects the known good rather than chasing bad (known signatures). It's inherently different than these products above. CB Defense on the other hand is an EDR/Endpoint protection tool which compares very highly and favorably to the above programs and it does integrate with AppDefense so that alerts coming from CB defense get piped into AppDefense for a single management interface.
My customer refuses to purchase NSX, but insists on solutions in the hypervisor for AV, Application Whitelisting, and whatever else they can get their hands on. Currently On-Prem, but will be mov... See more...
My customer refuses to purchase NSX, but insists on solutions in the hypervisor for AV, Application Whitelisting, and whatever else they can get their hands on. Currently On-Prem, but will be moving to Azure next year. My overarching question is: WIthout NSX, is AppDefense+CB Defense worth spending money on? Consider On-Prem, SaaS, and Cloud (Azure/AWS). The Doc page has a lot of information, but there are gaps in information or there weren't answers. I apologize for the litany of questions, but it's a new product and I want to make sure it will do what my customer expects it to do. Thanks everyone! I know the CB Defense Connector uses threat reputation and can stop processes. My questions are: Can AppDefense+CB Defense run on vCenter alone? Can AppDefense+CB Defense run agentless without NSX? How effective is application whitelisting on an agentless endpoint? How does AppDefense+CB Defense handle unknown file reputations? Does it have self-approval? How does it handle Windows Patch Weekend? Windows Updater likes to spawn unsigned powershell scripts in different directories. Making it really hard to isolate to whitelist the process stream. Does it offer Memory Protection? Is there an inventory function? How effective is AppDefense+CB Defense agentless with NSX vs vCenter + Guest Module Agent? Does the AppDefense SaaS offering run agentless? Does it require NSX? How does the effectiveness/performance compare to other vendors such as Symantec EP, McAfee ENS/App Control, Trend Micro Deep Security?
Hey AppDefenders! The wait is over and VMworld 2019 is finally here! We are excited to bring AppDefense to the heart of San Francisco from August 25 th -29 th and share with you all of its ... See more...
Hey AppDefenders! The wait is over and VMworld 2019 is finally here! We are excited to bring AppDefense to the heart of San Francisco from August 25 th -29 th and share with you all of its amazing capabilities. Throughout VMworld, there will be a variety of AppDefense demos, workshops, and keynotes! Trust me, you don’t want to miss any of these, so we’ve highlighted a few to heighten the excitement! Showcase Keynote: Intrinsic Security- How your VMware infrastructure can turn the tide in Cybersecurity. Time and Location: Tuesday, August 27, 5:30-6:30 pm, Moscone West, Level 2 Room 2020. Watch and learn from industry best, Chris Corde, VP of Product Management, Shawn Bass VP, CTO, and Tom Corn, Senior VP as they reveal the latest advancements in the VMware portfolio! You will also get to see a live attack demo that shows how various components are coming together to solve the security problem. Don’t miss it! Want to experience all the AppDefense glory firsthand? Be sure to visit our Test Environments! Throughout VMworld, the Hands-On Labs Room will be located on level three of Moscone West. Hands-On Labs are a great and dynamic way to try VMware products! Check out more information on Hands-On Labs Here: https://blogs.vmware.com/vsphere/2019/08/test-drive-vsphere-platinum.html Additionally, we highly recommend you take advantage of the VMware Test Drive Program! Test Drive gives you access to VMware products in a preconfigured, easy-to-use hosted environment with as much or as little guidance as you’d like! Check out more information on our Test Drive Program here: https://pathfinder.vmware.com/activity/introduction_to_vsphere_platinum_with_appdefense You will also want to check out more VMworld AppDefense sessions! Deploying AppDefense: Customer Use Cases and Examples      Time and Location: Tuesday, Aug 27, 3:30 PM, Moscone South, Esplanade, Room 158      Speakers: Eric Huber, AppDefense Solution Architect, VMware      Mark Fournier, Systems Architect, United States Senate Federal Credit Union Ensure Good App Behavior with AppDefense      Time and Location: Wednesday, Aug 28, 12:30 PM, Moscone South, Esplanade, Room 158      Speakers: Vijay Ganti, Head of Product and ML/AI Research, VMware We can’t wait to see you at VMworld! For a full list of all VMworld 2019 events for AppDefense and beyond, visit the 2019 content catalog: https://my.vmworld.com/widget/vmware/vmworld19us/us19catalog?search=•  Ensure Good App Behavior with AppDefense Happy AppDefending!
Hey AppDefenders! Thanks for reading our weekly blogs! Today we are excited to announce that we have launched our Quick Start Guide/Resource Hub to help Customers: Install, Deploy and use A... See more...
Hey AppDefenders! Thanks for reading our weekly blogs! Today we are excited to announce that we have launched our Quick Start Guide/Resource Hub to help Customers: Install, Deploy and use AppDefense! This guide will be managed by the AppDefense Customer Success Architect team and will be updated whenever there is a new feature added or product change.   Check out the video below to learn more about what is included in our new Quick Start Guide: http://https//www.youtube.com/watch?v=GRhmYjGVyO0  The AppDefense Quick Start Guide is divided up into six sections containing the following information: What is AppDefense?: Refresher of what AppDefense is and how the technology works. Installation steps. Deploying AppDefense: Technical Pre-Reqs for deployment. Overview of the deployment timeline. Appliance, host, and guest deployment steps and video tutorial. Scopes and Services: Overview of what Scopes and Services in AppDefense are. How to create Scopes and Services. Discovery Mode: Overview of what Discovery mode is, how it works and what its purpose is. Review of processes and behaviors, and how to view them in AppDefense. How to properly move from Discovery Mode to Protected mode. Protected Mode: Overview of what Protected Mode is and how it works. Review of deviations, Alerts and Event types. How Alerts and Events are classified in AppDefense. Review of Blacklist and Whitelist. Rule Enforcement (optional step): Introduction to Rule Enforcement in AppDefense. Overview of each Remediation action, and how to apply them. In addition, there are sections for: Useful links- a full list of blogs around AppDefense deployment, features, and tips/best practices. FAQ – Common questions around AppDefense answered here. Helpful videos- Deployment and Feature review videos and demos. We hope this guide can be of great assistance to our AppDefense Customers! Please check it out: http://http://www.vmware.com/go/appdefense-quick-start Happy AppDefending!
Hey AppDefenders! Thanks for reading our weekly posts. Today’s post will cover the Blacklisting and Whitelisting feature in AppDefense and how to use it. To review, AppDefense allo... See more...
Hey AppDefenders! Thanks for reading our weekly posts. Today’s post will cover the Blacklisting and Whitelisting feature in AppDefense and how to use it. To review, AppDefense allows you to view and manage processes in the service layer (one or a group of VMs) which will make up the verified behavior list. In the AppDefense manager you have the ability to “Blacklist” or “Whitelist” processes, but what does this mean? Blacklisting or Whitelisting a process provides another layer of process management not only for the service , but for the entire org. This feature allows you to control what processes should be allowed or given a high severity alert. Once you have Blacklisted a process, that process will be removed from every service in every scope, ensuring that any Blacklisted process will not be added into any service. If this process runs again it will also trigger a critical Alert. The opposite is true for Whitelisting, as once you Whitelist a process it will be added to every scope and service in the Org. How to Blacklist and Whitelist a process from the Events or Alerts page: Login to your AppDefense manager. Navigate to the Events page (using the gear button at the bottom of the page) Click on the Process you would like to Blacklist or Whitelist. (This can only be done from the monitoring events and upgrade events) Next, click on the “Manage Process” button in the top right of the page and select Blacklist or Whitelist. Repeat the same steps for Alerts (in the Alerts tab) Blacklist or Whitelist a process from Behaviors Page in the service tab within in a scope: Login to your AppDefense manager. Select a scope -> select a service and then select a behavior from the verified behavior list you would like to Blacklist or Whitelist. Next, click on the “Manage Process” button in the top right and select Blacklist or Whitelist. There are a few things to remember when Blacklisting or Whitelisting a process: The blacklisted processes will never be able to be learned in any scope and service moving forward When in protected mode, a blacklisted process will always be a critical alert (this is the highest severity) A Whitelisted process will be added to all of the services in all scopes in the Org. Even though a process is Whitelisted, the behaviors are not. Therefore, when in protected mode a Whitelisted process may show up as an info event because of a new behavior within the process (i.e inbound/outbound connection) You have now Blacklisted or Whitelisted a process! Happy AppDefending! VMware AppDefense is hypervisor-native workload protection platform for virtual infrastructure and security teams that delivers secure virtualization by providing deep application visibility and control. To learn more, visit www.vmware.com/appdefense or contact us.  
Hi! The main reason to keep your antivirus solution in conjunction with AppDefense is for compliance. Paige
Hi , I had a doubt if i installed Vsphere platinum editions and using App defense then need of use traditional Antivirus or not