FIELD: information technology.
SUBSTANCE: invention relates to methods of creating a set of virtual protection machines (VPM) for automatic selection of VPM with subsequent connection to a virtual machine agent based on limiting area of automatic selection of virtual protection machines. Forming a list of known VPM by executing the corresponding security policy, in which a list of addresses of the VPM in the network is given, with subsequent polling of each VPM to obtain associated with the corresponding VPM well marks and level of the interaction area relative to the VM agent. Excluding from the generated list those VPM, which do not correspond to the agent interaction area according to the restrictive requirements for interaction with the VPM, where the interaction area defines the boundaries in which the VPM for connection should be located, wherein the boundaries are characterized by the location in the virtual infrastructure. Survey remaining VPM in said list to determine compliance of marks of VPM and agent, and determination of network accessibility to VPM, after which exception is made from said list of those VPM which are not available or labels do not correspond to agent marks.
EFFECT: automation of limitation of interaction of virtual machines.
12 cl, 5 dwg
Authors
Dates
2020-01-14—Published
2019-02-07—Filed