5.1

Table Of Contents
n
vShield Endpoint Module: Log in to the vShield Manager and select a host from the inventory. The
Summary tab displays the vShield Endpoint build number.
Check vShield Endpoint Health and Alarms
The vShield Endpoint components should be able to communicate with the vShield Manager.
Procedure
1 In the vSphere Client, go to Inventory > Hosts and Clusters.
2 Select a datacenter, cluster, or ESX host from the resource tree.
3 Click the vShield App tab.
4 Click Endpoint.
5 Confirm that the security virtual machine (SVM), the ESX host-resident vShield Endpoint module, and
the protected virtual machine-resident thin agent are normal.
6 If the virtual machine-resident thin agent is not normal, check that the version of VMware Tools is 8.6.0
(released with ESXi 5.0 Patch 1).
7 If an alarm is displayed, take appropriate action. For more information, see “vShield Endpoint Alarms,”
on page 174.
Troubleshooting vShield Data Security Issues
Since vShield Data Security uses the vShield Endpoint technology, troubleshooting is very similar for both
components.
When you come across any vShield Data Security issue, first ensure that the Data Security appliance is reported
as enabled. Then verify that a data security scan was started.
Review Scan Start and Stop Timestamp
vShield Data Security only scans those virtual machines that are powered on. The first step in troubleshooting
vShield Data Security issues is to confirm that the virtual machine was scanned.
Procedure
1 In the vSphere Client, go to Inventory > Hosts and Clusters.
2 Select a datacenter, ESX host, or virtual machine from the resource tree.
3 Select the Tasks and Events tab.
4 Look for Scan in the Name column and confirm that it completed successfully.
About Accuracy in Detecting Violations
Accuracy is measured by two factors: recall and precision. Taken together, the ideal mix of recall and precision
will ensure that you get the content that you need to secure and nothing else. Any content detection is evaluated
in two ways: positive or negative, and true or false (e.g., did I identify what I was looking for, and was my
identification correct?).
There are four possible outcomes that have the following meanings.
vShield Administration Guide
226 VMware, Inc.