Superna for VAST Data Security Bundle Installation Service
Superna Product Code (SKU): EYEGLASS-P028-INS
Overview
This service is designed for customers who have purchased the Security Bundle and need installation and configuration assistance deploying Ransomware Defender, Easy Auditor, and Security Integrations.
Service delivery: Remote sessions for audio, video, and screen sharing via Zoom, VPN, or alternate remote access to customer VAST equipment. Estimated three (3) hours over a span of 1–2 days with dedicated customer technical resources. Service scope covers a single clustered ECA agent installation and configuration, with up to two collocated VAST clusters.
Operating hours: Monday to Friday, 9 am–4 pm in your local time zone, excluding major holidays.
Terms and conditions: Subscription EULA
Exclusions
- Superna resources are not authorized to provide design recommendations for Disaster Recovery features. A purchase of the DR Design and Implementation Service is required for DR design.
- Hands-on changes to external IT components — for example, DNS, Active Directory, VAST, or other non-Superna supplied products — are not included.
- Service delivery requires customers to have hands-on knowledge of all external IT components.
Prerequisites
Complete these steps prior to the scheduled installation and configuration:
- Core Agent Appliance is installed.
- Complete a Pre-Installation Questionnaire Form.
- Send a schedule installation request to services@superna.net.
- Confirm availability of the DNS administrator on the day of installation to make changes if the above steps require debugging or were misconfigured.
- Ensure firewall ports are opened as per documentation for ECA clusters.
Service Methodology
ECA Agent Installation Phase
Remote installation with customer to accomplish the following:
- Gather and review site installation data submitted from the questionnaire.
Configuration Phase
- Apply license.
- Edit configuration file on agent startup.
- Start up clustered agent code.
- Configure VAST to audit files for testing phase.
- Verify audit messages are being processed.
Ransomware Defender Configuration Phase
Configuration and Testing:
- Configure Security Guard feature.
- Validate successful execution.
- Configure schedule.
- Knowledge transfer on log file validation for Security Guard.
- Enable monitor mode to baseline user behavior.
- Review Security assessment on the enforcement section in the admin guide.
- Schedule follow-on Health Check and Knowledge Transfer sessions two to three weeks from phase completion.
Knowledge Transfer:
- How to enable production mode.
- Operational cluster management.
- How to process security incidents workflow from the admin guide: how to respond to Security Events for Warning, Major, or Critical Events.
- How and when to make whitelist changes when introducing new server applications that write data to VAST.
- UI walkthrough.
Easy Auditor Configuration Phase
Configuration and Testing:
- Verify audit data is being stored in the analytics database with query interface.
- Run test user query report.
- Run test path-based report.
- Test Where Did My Folder Go?
- Review test wiretap functionality on a path with a test user mounting and accessing files.
Knowledge Transfer:
- How to build a query and filter on user, path, file extension, and file action.
- How to run query reports.
- Where to read documentation on Easy Auditor operations.
- Cluster operations.
Service Complete
Review and deliver final ECA Installation Report.