Software Secure Workload
Activity Configure

Set Up Microsegmentation for Workloads Running on Bare Metal or Virtual Machines

Procedure

1

Gather the IP addresses of workloads on your network.

For each workload, you will also want the application name, application owner, environment (production or non-production), and other information such as geographical region that will determine the policies to be applied..

If you do not have a Configuration Management Database (CMDB), you can collect this information in a spreadsheet.

To get started, choose a single application that you can focus on.

2

Install agents on supported bare-metal-based or virtual workloads.

For more information, see Deploying Software Agents.

3

Upload labels that describe these workloads.

For more information, see Workload Labels and Importing Custom Labels.

Optionally, you can run the quick start wizard to create labels and the first branch of your scope tree. For more information about the wizard, see Quick Start Wizard.

4

If needed, create or update your scope tree based on your labels.

For more information, see Scopes and Inventory.

5

Create a workspace for each scope for which you want to apply policies.

For more information, see Workspaces.

6

Create manual policies that apply across your network.

For more information, see Manually Create Policies.

7

For more information on platform-specific policies, see Platform-Specific Policies.

8

Automatically discover policies in workspaces associated with lower-level scopes.

For more information, see Automatic Policy Discovery and subtopics.

9

Review and analyze the suggested policies.

For more information, see Review and Analyze Policies and subtopics.

10

Iteratively discover policies as needed.

For more information, see Iteratively Revise Policies and subtopics.

11

When you are ready, enforce the policies.

You can enforce policies when you are satisfied with the behavior of the policies in each workspace.

You must enforce policies both in the workspace and in the agent configuration.

For more information, see Enforce Policies.