ESET Virtualization Security Appliance (SVM) deployment

1.In your vSphere Web Client, click Networking & Security > Installation > Service Deployments and then click ADD_ICON to add new service deployment.

2.Select the check box next to ESET Virtualization Security and then click Next.


3.Select the applicable cluster(s) and then click Next. ESET Virtualization Security will be installed on all hosts in the cluster.


4.Select storage and assign a network for ESET Virtualization Security to use and click Next. DHCP IP assignment is selected by default. To assign a static IP addresses to EVS service appliances, in NSX Manager, click Change an IP assignment > Use IP Pool.



This feature strictly requires that the whole infrastructure of virtualization security (ERA server, Virtual Agent host) hostnames during deployment were set to FQDN and are resolvable by configured DNS servers.

When creating IP pools make sure that selected IP addresses are available to be used. Check this on your DHCP server.


5.Select the radio button next to Use IP pool and then select the applicable IP pool below or create a new one.




We recommend you leave the DNS Suffix option empty..

6.Review settings and click Finish. After processing and successful deployment, wait a few minutes and you should see that Unknown status is changed to Succeeded and Up in status columns.




When installation fails, click here.

When you see Warning in Service status it means, that ESET Virtualization Security Appliance (SVM) is not able to access vAgent Host virtual machine. Firstly ensure that ESET Virtualization Security has correct policy where to find vAgent Host in ERA settings. For more information read the following ESET Knowledgebase article.

7.After you have successfully installed ESET Virtualization Security, continue to Activate Virtual Agent Host from ESET Remote Administrator and then Automatic activation of all EVS VMs for how to activate all of ESET Virtualization Security virtual machine and also dynamic group for ESET Virtualization Security machines that are not activated.