Category: Non Windows



Today in this Post we will  talk about the installation  of Vmware Vcenter 5.5 step by step . Somehow , I found that there was a lack of a simple guide on Installing Vcenter. Basically Vcenter offers two  types of installation .One is Simple and other is Customized. If you opt for Simple  installation then the set up will  install all the Mandatory components itself and if you  opt for Customized Installation then  you will  have to install  each  component manually.

Vmware VCenter 5.5 Installation Step by Step

In  this post I  will walk you through the Simple Installation Process :

Vmware Vcenter Installation 1

Click next to Proceed :

Vmware Vcenter Installation 2

Accept the agreement

Vmware Vcenter Installation 3

click  Next:

Vmware Vcenter Installation 4

Enter Password which will be used to login:

Vmware Vcenter Installation 6

Keep as Default

Vmware Vcenter Installation 7

You  may change the default location of Installation  of SSO :

Vmware Vcenter Installation 8

Click  Next

Vmware Vcenter Installation 9

Vmware Vcenter Installation 10

Vmware Vcenter Installation 11

Vmware Vcenter Installation 12

If you already have your Port 80 being used you may look to change it

Vmware Vcenter Installation 13

Click  ok..

The  Set up will run for time before  completing Successfully .

Advertisements

GFI Languard and SCCM


Today in this post we will have a look at the software product Named GFI Languard . GFI Languard is a product of GFI and can be used for Patch Management , Vulnerability Assessment , Patch Management of Third party Applications Like Adobe , Tracking of Server Vulnerability and Network Vulnerability . Although GFI claims that the tool can be used for Patch Management ( Which it surely can do ) , but there are better products in the market for Patch Management ( Like SCCM ) .

GFI Languard

GFI Languard

One Area where I think GFI Languard can be used is to track Vulnerabilities and close them using Better Patch Management tools like SCCM . GFI provides you a very handsome console where you can check for Vulnerabilities basis Server , Networks . It lets you scan your Network basis a number of criterion like Ip Range , Sinlge Ip Address , Domain wise . GFI has a handsome reporting feature which can be used to make sure that your network is secure .

gfi-languard-2012

The Above figure shows a typical GFI Languard Dashboard where it shows you the Missing Patches and Vulnerability Classification .

 

Websense Working


How does Websense Work and What is Websense ?

In this Post we will talk about Websense Server and Its Working . As we all know that websense Filtering is used for Filtering Websites , Contents , Files , Downloads etc from the Internet . Today , Almost all the companies use Websense or some other product of its Category to Filter Web Traffic . The tools become all the more handy to provide different kind of Inter Access Rights to a different set of users .

 

Let us consider an Example , Let us say that your organization has 200 Users . 10 Users are from HR Department . Now , as a System Admin you are being asked to set up the system in such a way that only HR users can have access to Job Portals and No other user can access and Job portal . This is where Websense as a Tool becomes handy . You can use Websense Filtering Categories to create rules so that only HR people can access Job Portals .

 

With Websense you may also pull reports and see which user has accessed blocked websites , you can create Email alerts when a specific users uses a specific website n number of times .

 

Now to explain how does Websense Work , Have a look at the Diagram below . Fig 1 :

Websense Working

 

Your Local Websense Server is Connected to the Enterprise Websense Server and it gets live feeds from the Enterprise server to keep it self updated with the changes that have been made at the External Websense Centralized server . Your Users when they access Internet , All their requests pass through Websense and websense through its filtering criteria checks if this particular user has access to this website or not . Basis this you are allowed to access the website .