Configure activation

Topics:

Prepare for activation

You must now prepare for activation. You can use Method 1, 2, or 3:

Method 1: Create a 'Computer Created' event-based task

Method 2: Create an 'NSX Security Group Change' event-based task

Method 3: Synchronize your Deep Security policies to NSX-T 3.x

Trigger an activation and policy assignment

You must now trigger an activation and policy assignment.

If you chose Method 1, you can trigger an activation and policy assignment manually. For instructions, see below.

If you chose Method 2 or 3, all VMs should be activated and assigned policy automatically now. They are protected.

To activate and assign a policy through the Actions button:

  1. Go to Deep Security Manager, click Computers at the top, and click your vCenter on the left. Your guest VMs appear on the right.
  2. Shift+click a set of VMs, right-click them and then select Actions > Assign Policy. Select a policy and click OK. A Deep Security policy is assigned to your VMs.
  3. Shift+click the same set of VMs, right-click them and then select Actions > Activate/Reactivate.Your VMs are activated in Deep Security Manager. They are now protected.
  4. If you have additional, existing VMs you want to protect, repeat the procedure in this section to assign a policy and activate them.

You have now triggered an activation and policy assignment.

Check that VMs are activated and assigned a policy

You must now check that VMs were activated and assigned a policy successfully.

To check:

  1. In Deep Security Manager, click Computers at the top.
  2. On the left, expand Computers > <your_vCenter> > Virtual Machines.
  3. Check the TASK(S) and STATUS and columns. (Click Columns at the top to add them if they are not visible.) The TASK(S) column should indicate Activating, and your VMs should move from the Unmanaged (Unknown) status, to the Unmanaged (No Agent) status, to the Managed (Online) status. You may see the VMs move into the VMware Tools Not Installed status, but this is temporary.
  4. Check the POLICY column to make sure the correct Deep Security policy was assigned.

You have now deployed Deep Security Virtual Appliance and protected your VMs with it.