Recent updates
-
Deploy CBC Security
Updated onArticleThis section walks through deploying CBC Container Security on your K8s cluster
Edited for Discovery (Pathfinder) SPL-TD-CB-04 Deploy CBC Container Security
-
Deploy your Tanzu Kubernetes Cluster
Updated onArticleThis section will guide you through the process to create a Tanzu Kubernetes Cluster using Tanzu Mission Control (TMC) and preparing it for app-deployment.
Edited for Discovery (Pathfinder) SPL-TD-CB-04 Deploy Tanzu Kubernetes Cluster
-
CBC Cloud Walkthrough
Updated onArticleIn this section, we will take a look at the CBC Cloud Console in detail
Edited for Discovery (Pathfinder) SPL-TD-CB-04 Quick Walkthrough of Carbon Black Cloud
-
Intro
Updated onArticleGet hands-on with VMwares solution to securing Kubernetes clusters with CBC Container Security. Upon login you will have access to create a Tanzu Kubernetes Cluster with instructions on how to secure it with CBC Container Security.
Throughout this walkthrough you will be exposed to VMwares solution to securing Kubernetes clusters with CBC Container Security. Upon login, instructions provided will detail how to deploy and secure a new cluster with vSphere with Tanzu and CBC Container Security.
Edited for Discovery (Pathfinder) SPL-TD-CB-04 Introduction
-
Enabling Secure and Optimized Access for Remote Workers with SASE for Anywhere Workspace
Updated onArticleWith VMware SASE for Anywhere Workspace, VMware has combined the consistent, secure cloud application access functionality of VMware SD-WAN, Secure Access, and Cloud Web Security with the capability of Workspace ONE to allow only trusted devices and users to access applications hosted on-premises or in the cloud.
This guide will walk you through demonstrating SASE for Anywhere Workspace in the ready to use TestDrive environment.
Knowledge Base Digital Workspace Anywhere Workspace
-
NSX 4.x Security Lab Walkthrough (Haas-DMZ)
Updated onArticleYour enterprise can now deploy VMware NSX Security as a standalone security product, deploying it in an existing environment with no changes to your network. NSX 4.0.1 provides strong, multi-cloud, easy-to-operationalize network defenses that secure application traffic within and across clouds. NSX 4.0.1 makes it easier for you to enable Zero Trust application access across multi-cloud environments—so you can secure traffic across applications and individual workloads with security controls that are consistent, automated, attached to the workload, and elastic in scale.
Knowledge Base Networking and Intrinsic Security Walkthroughs VMware NSX-T
-
Accessing the Horizon Console
Updated onArticleYour TestDrive account has a Read-Only access Administrator role in the Horizon Console. To access the console, use the Horizon Console desktop shortcut after logging into a Windows 10 or RDSH desktop to bring up the web page
Knowledge Base Digital Workspace Horizon
-
Threat Hunting with Carbon Black EEDR (Phishing turned into ransomware)
Updated onArticleThreat hunting is the pursuit of indicators of compromise (IOCs) within public and private cloud servers, endpoints, and networks that may be symptomatic of a compromise, intrusion, or data exfiltration. Though the concept of threat hunting isn’t new, the practice of threat hunting is for many organizations.
Carbon Black EDR continuously collects comprehensive data, giving you all the information you need to proactively hunt threats, uncover suspicious behavior, disrupt attacks in progress, repair damage quickly, manage vulnerability and address gaps in defenses. It allows you to search through raw unfiltered endpoint data by using a powerful query language, even if the endpoint is offline.
Knowledge Base Networking and Intrinsic Security Walkthroughs VMware Carbon Black Cloud
-
Android - Retail Kiosk
Updated onArticleIn this quick walkthrough we're going show you how to enroll and configure your Android device for a kiosk walkthrough in a point of sale (POS) use case.
Knowledge Base Industry-Specific Walkthroughs Retail
-
Remotely Manage and Monitor Desktops for Disaster Recovery and Continuity of Operations
Updated onArticleKnowledge Base Industry-Specific Walkthroughs Government