Recent updates
-
Section 4: Infrastructure Overview
Updated onArticleThis section will cover AVI Infrastructure
Edited for Discovery (Pathfinder) TDX-2463-01-NET Infrastructure
-
Section 2: Virtual Services, Analytics and Logging Overview
Updated onArticleIn this section, we will cover Virtual Services, Analytics and Logging in more detail.
Edited for Discovery (Pathfinder) TDX-2463-01-NET Virtual Services, Analytics and Logging
-
Section 1: About this experience and Accessing the Lab
Updated onArticleVMware NSX Advanced Load Balancer (Avi Networks) uses a software-defined architecture that separates the central control plane (Avi Controller) from the distributed data plane (Avi Service Engines). NSX Advanced Load Balancer is 100% REST API based, making it fully automatable and seamless with the CI/CD pipeline for application delivery. The Avi Controller is the “brain” of the entire system and acts as a single point of intelligence, management, and control for the distributed data plane. The Avi SE represent full-featured, enterprise-grade load balancers, web application firewall (WAF), and analytics that provide traffic management and application security while collecting real-time analytics from the traffic flows. The Avi Controller provides comprehensive observability based on closed-loop telemetry and presents actionable insights to make decisions based on application monitoring, end-to-end timing, searchable traffic logs, security insights, log insights, client insights, and more.
Follow the steps below for a quick start of the VMware NSX Advanced Load Balancer TestDrive environment.
Edited for Discovery (Pathfinder) TDX-2463-01-NET About this Experience
-
Attack Stages
Updated onArticleIn this section, we will go through the different attack stages that are part of our demo.
Edited for Discovery (Pathfinder) TDX-2436-06-SEC Generating Attack
-
Overview: Threat Hunting with Carbon Black XDR
Updated onArticleNow let us learn a bit more about Threat Hunting with Carbon Black.
Edited for Discovery (Pathfinder) TDX-2436-06-SEC Carbon Black XDR
-
Attack Lab Detonation
Updated onArticleOur prevention is enabled through context and controls to disrupt and defend - it doesn’t matter if it's ransomware or a zero day attack.
Edited for Discovery (Pathfinder) TDX-2436-02-SEC Section 3: Attack Approach
-
Additional Support
Updated onArticleEdited for Discovery (Pathfinder) TDX-2463-01-NET Support
-
Introduction to Carbon Black Workload
Updated onArticleVMware Carbon Black Workload Protection provides vulnerability assessment and inventory management for workloads hosted on vSphere. The Carbon Black Workload vulnerability solution provides shared information on vulnerabilities that is available in Carbon Black Cloud as well as in the native VMware vCenter administration client.
Carbon Black Workload is offered in different packages to suit your organization’s needs
Knowledge Base Networking and Intrinsic Security Walkthroughs VMware Carbon Black Cloud
-
Threat Hunting with Carbon Black XDR (Phishing turned into ransomware)
Updated onArticleThreat hunting is the practice of proactively searching for security threats and vulnerabilities in an environment before they can be exploited by attackers. It involves analyzing data from various sources, such as process events, network traffic, and user behavior, to identify signs of malicious activity that may have evaded traditional security measures such as firewalls and antivirus software.
Carbon Black XDR extends endpoint detection and response by enabling security operations teams to visualize and analyze across network, endpoint, workload, and user data in context. Carbon Black XDR surfaces new results by preserving and extending the endpoint, network, workload, and user contexts during analysis and display, giving you all the information you need to proactively hunt threats, uncover suspicious behavior and lateral movement, disrupt attacks in progress, repair damage quickly, manage vulnerability and address gaps in defenses.
Knowledge Base Networking and Intrinsic Security Walkthroughs VMware Carbon Black Cloud
-
TestDrive Customer Invitations & Account Extensions
Updated onArticleThis brief guide shows you how to invite your customers to TestDrive and extend a customer's TestDrive account.
Invite Process
- Using TestDrive's "Invite Users" function, a VMware employee or partner invites the user.
- TestDrive sends an email invitation to the user.
- User clicks the invite link and completes their TestDrive user profile.
- TestDrive sends an account verification email to the user.
- User clicks the account verification link and the account is confirmed in TestDrive.
- User account displays active in TestDrive portal.
Knowledge Base TestDrive Fundamentals TestDrive Portal & Ready-To-Use (RTU) Environment