Viewing information about virtual machines protected by an SVM
In the properties of the application installed on each SVM, you can view information about virtual machines that are protected by this SVM.
The virtual machine is under the protection of an SVM if the NSX File Introspection Driver installed on the virtual machine is connected to the SVM. In this case, the virtual machine can still be unprotected. The SVM with the File Threat Protection component protects only those virtual machines that meet all conditions for protection of virtual machines from file threats. The SVM with the Network Threat Protection component protects only those virtual machines that meet all conditions for protection of virtual machines from network threats.
To view information about the virtual machines protected by an SVM:
In the Kaspersky Security Center Administration Console, open the SVM properties window as follows:
Select the administration group containing the KSC cluster that includes the relevant SVM.
In the workspace, select the Devices tab.
In the list, select the SVM and open the SVM properties window by double-clicking or by selecting Properties in the context menu.
The Properties: <SVM name> window opens.
In the SVM properties window in the list on the left, select the Applications section.
A list of applications that are installed on this SVM appears in the right part of the window.
Select Kaspersky Security for Virtualization 6.0 Agentless and open the application settings window by double-clicking or by selecting Properties in the context menu.
The Kaspersky Security for Virtualization 6.0 Agentless settings window opens.
In the application settings window in the list on the left, select the List of protected virtual machines section.
The right part of the window displays a table containing information about the virtual machines protected by the SVM.
The table displays the following information for each virtual machine:
Virtual machine name.
Name of the virtual Administration Server of Kaspersky Security Center that is used to manage the protection of the tenant organization that owns the virtual machine. If the virtual machine does not belong to any tenant organization, No is displayed in the column.
IP address of the virtual machine.
Version of the operating system installed on the virtual machine.
Type of operating system installed on the virtual machine: server operating system or desktop operating system.
ID of the virtual machine (vmID).
Path to the virtual machine within the virtual infrastructure.
In the table containing a list of virtual machines, you can do the following:
Sort the list by any column of the table.
Search for a virtual machine in the list.
Update information about virtual machines by clicking the Refresh button.