Starting in NSX-T Data Center 3.2, the new design of the Security dashboard helps you to configure features to protect your network and workloads. The Security Overview dashboard displays various threat detection and response features, a visual summary of the overall security configuration, and the capacity of the various objects in the NSX-T Data Center environment.
The information displayed on this dashboard depends on the security features that are deployed and activated in your data center.
Threat Detection & Response
This tab provides key insights about the current state of various security issues in your data center. These features help security teams understand what is happening in the network and where to focus.
- Campaigns
-
A campaign is a set of related threat events that use specific MITRE tactics and techniques. The threat events can be mapped to MITRE ATT&CK stages to define an attack story. Campaigns can range from a single group of detection events over a short period of time to complex multi-pronged attacks over an extended amount of time. A campaign lets you view the full threat event timeline so you can respond and triage it quickly.
If the VMware NSX® Network Detection and Response™ feature is activated, this widget shows the following campaign statistics.- The total number of campaigns that NSX Network Detection and Response has identified during the time period and that are currently active in your network.
- The total number of high impact campaigns that are in-progress during the selected time period.
- The total number of open high impact campaigns during the selected time period.
- The total number of VMs affected by the campaigns identified during the selected time period.
Click Go to Campaigns to see more details from the Campaigns page of the NSX Network Detection and Response user interface. To learn more about the NSX Network Detection and Response feature, see NSX Network Detection and Response.
- IDS/IPS
-
- The IDS/IPS summary screen displays the following:
-
Entry Description Intrusion Events Displays the total number of intrusion events as a clickable link, and number of intrusions that resulted in alerts or prevention. Unique Intrusion Signatures Displays a graph with number of intrusions detected in each severity category. Events By Top Attack Types Displays a graph based on attack types. - Distributed IDS/IPS Summary
Entry Description Trending by Intrusion Severity Displays a graph with the trending severity with the number of intrusion events by time. Distribution Displays a radar chart to show distribution based on Attack Type, Attack Target, or Severity over a period of 48 hours to 14 days.
Top VMs Displays top VMs on which intrusion was attempted. - Gateway IDS/IPS Summary
Entry Description Trending by Intrusion Severity Displays a graph with the trending severity with the number of intrusion events by time. Distribution Displays a radar chart to show distribution based on Attack Type, Attack Target, or Severity over a period of 48 hours to 14 days.
Top IPs Displays top IPs on which intrusion was attempted.
- FQDN Analysis
-
The FQDN analysis summary screen displays:
- The total number of URLs inspected, and their severity level.
- The top URL categories that have the greatest number of inspected FQDNs.
- The highest severity URLs, with the date and the time
- URL Filtering
-
Select a specific gateway, or all gateways to view following information:
- Distribution of URLs by severity rating.
- Severity level of allowed URLS and displays the top five categories that have the greatest number of inspected URLs
- Highlights the top five URL categories that have the greatest number of blocked URLs.
- Unique site distribution displays the top five sites that have the greatest number of allowed URLs. Highlights the top five sites that have the greatest number of blocked URLs.
- Malware Prevention
-
Shows the following file events statistics for a selected time period in a graphical format:
- Total number of inspected file events, malicious file events, suspicious file events, and blocked files.
- Number of file inspections for different ranges of threat score.
- Top five recently inspected files in the data center sorted by the timestamp.
- Top five malicious files detected in the data center.
- Trend of malicious file events, suspicious file events, and suppressed file events in the data center.
- Distribution of file inspections based on the malware family to which the files belong.
- Breakdown of file inspections by the type of analysis performed (local file analysis, cloud file analysis).
- Suspicious Network Activity
-
If VMware NSX® Intelligence™ is activated, this tab displays the following statistics (in graphical format) about suspicious or anomalous events detected during the selected time period.
- A circle shows the total number of anomalies detected during the selected time period. The circle is composed of colored segments representing the number of detected anomalous events and the MITRE adversarial tactics and technique used to detect the events.
- A list of detected suspicious events categorized in the same MITRE tactics and techniques used in their detection, and the number of times they occurred during the selected time period.
- A bar graph showing the number of anomalies detected, categorized by their severity.
Click View All to see more information about the detected suspicious events using the Suspicious Traffic page. To learn more about the NSX Suspicious Traffic feature, see the Using and Managing VMware NSX Intelligence documentation for version 3.2 and later at https://docs.vmware.com/en/VMware-NSX-Intelligence/index.html.
- TLS Inspection
-
TLS inspection and decryption provides a secure way to target the influx of threats present in Enterprise web traffic. The feature uses TLS proxy to intercept encrypted traffic transparently over TLS connections and allow NSX security services such as layer 7 firewalls, IDS, and URL filtering to inspect content and enforce your security policies. You can use a wizard or manually follow the workflow to set your policy and rules. Starting in NSX-T Data Center 3.2.1 this feature is available in production environments and has full support. In NSX-T Data Center 3.2.0 this feature was available only in tech preview mode. For details, see TLS Inspection and the NSX-T Data Center Release Notes.
The Security Overview dashboard shows the following TLS connection and certificate details when activated.- The donut chart shows the TLS Connection Summary details including:
- Bypassed due to failures
- Decrypted
- Connection failures
- Bypassed due to rules
- Connections & Rules
- Total connections
- Open connections
- CPS
- Rule hits
- The donut chart shows the Certificate Caching details including:
- Cache hits
- Cached certificates
- Cache misses
- Traffic
- Throughput details including Client to server and Server to Client
- Total traffic details including Client to server and Server to Client
- The donut chart shows the TLS Connection Summary details including:
Configuration
- Firewall Policies
- Endpoint Policies
- IDS/IPS Policies
- Malware Prevention Policies
- Network Introspection policies
- TLS Inspection Policies
This page also provides detailed views of security settings for:
- Gateway Firewall widget
-
Highlights gateway firewall security settings. Click the links to view the gateways on which the following security features are activated:
- IDS/IPS
- Malware Prevention
- TLS Inspection
To view the gateways with these security features, at least one of the above security features must be deployed in your data center.
- Distributed Firewall widget
- Endpoint Protection widget
-
Shows a summary of the configuration of endpoint protection for virtual machines. You can view VM distribution by service profile, components having issues, and configured VMs running file introspection.
- Malware Prevention widget
-
This UI widget shows issues when any of the components for the NSX Distributed Malware Prevention service is down or not working.
For example:- The Bar chart shows an issue when the Security Hub on the NSX Malware Prevention service virtual machine (SVM) is down. Point to the bar to view the following details:
- Number of NSX Malware Prevention SVMs that are impacted.
- Number of workload VMs on the host that have lost malware security protection due to the Security Hub going down.
- The Donut chart shows the following details:
- Number of workload VMs where the NSX File Introspection driver is running.
- Number of workload VMs where the NSX File Introspection driver is not running.
For both these metrics, only the workload VMs on the host clusters that are activated for NSX Distributed Malware Prevention are considered.
- The Bar chart shows an issue when the Security Hub on the NSX Malware Prevention service virtual machine (SVM) is down. Point to the bar to view the following details:
Capacity
- Introspection Rules N-S Tier-1
- Active Directory Domains (Identity Firewall)
- Service Chains
- Introspection Policies E-W
- Saved Firewall Rules Configuration
- Introspection Policies N-S Tier-0
- Introspection Service Paths
- System-wide Firewall Rules
- Introspection Rules N-S Tier-0
- Introspection Rules E-W
- System-wide Endpoint Protection Enabled Virtual Machines
- Introspection Policies N-S Tier-1
- Distributed Firewall Sections
- System-wide Firewall Sections
- Active Directory Domains (Identity Firewall)
- System-wide Endpoint Protection Enabled Hosts
- Distributed Firewall Rules