Part 3: HyTrust DataControl Policy Agent Installation and Encryption – Windows Server 2016
j

Written by Sashi Ranjan

August 8, 2021

Please review the Windows Boot Drive Encryption and Windows Policy Agent Installationtopics in the HyTrust DataControl administration guide which covers the pre-requisites and process in further detail.

Note: At the time this document was produced the HyTrust DataControl Policy Agent for Windows did not support EFI, therefore the following Windows Server 2016 VM is using “BIOS” as the firmware for the Boot Option. HyTrust DataControl version 5.0 will support EFI and is tentatively scheduled for Q3 2019.

Edit Setting

From the Windows VM that you need to encrypt, open the HyTrustKeyControl web GUI running at: https://<KeyControl IP> and navigate to the “CLOUD” tab. Under “Actions” click “Download Policy Agent”.

Follow the on-screen instructions to install the Agent and then when prompted select the option to Reboot the machine after the installation completes.

Installation Step 1: Download the Policy Agent from the KeyControl UI as shown below:

KeyControl UI

Installation Step 2: Click “Download” next to “hcs-client-agent-4.3.2-15373.exe”.

Download

Installation Step 3: Click “Run” to begin the installation process.

Run

Installation Step 4: Click “Next” on the Welcome Screen.

Next

Installation Step 5: Accept the License Agreement by clicking “I Agree”.

I Agree

Installation Step 6: Select the location where the Agent will be installed and click “Next”.

Location

Installation Step 7: Please make sure that “HT Bootloader” component is selected in order to ensure that the C drive is encrypted. Click “Next”.

HT Bootloader

Installation Step 8: If the VM is configured with DHCP assignment of IP address then select “DHCP” or enter the IP address manually and click “Install”.

DHCP

Select the option “Reboot Now” after the installation succeeds.

Now we will create a New VM Set and change the policies to auto encrypt all the VMs that are part of this VM Set.

Navigate to CLOUD -> VM Sets and then from the Actions drop down menu select “Create Cloud VM Set”. Leave all the defaults and then click “Create”.

Create Cloud VM Set

Once the VM Set is created, select the VM Set “Windows” and then scroll down to the bottom of the page and click “Disabled” next to “Auto Encryption”. In the pop-up window, select “Enabled” from the drop-down menu and click save next to it.

Auto Encryption

The field “Auto Encryption Policy Type” appears and here we need to select “Encrypt All Devices” from the drop-down menu. Click save. Again click “save” at the bottom of the pop-up.

Encrypt All Devices

Another window pops-up. Click “Yes”.

Yes

Now we have the VM Set created with Auto Encryption enabled.

Enabled

Open a PowerShell prompt in the Windows VM that needs to be encrypted and type the command below to Register the VM with the KeyControl Server.

C:\Users\Administrator> hcl register -a 10.148.112.5

Enter the username secroot and the password.

Enter the VM Set name as Windows and hit Enter. Please note that the name is case sensitive.

For Mapping enter 1 and hit Enter. This will complete the registration of the VM with HyTrust KeyControl Server and since Auto Encryption is enabled for this VM Set, the encryption will start automatically.

Mapping

From the start menu on the Windows VM, open the application HyTrust DataControl. The application console shows that the encryption is in progress and also shows the percentage progress.

Percentage Progress

On the HyTrust KeyControl UI, click “DASHBOARD” tab on top. The screen shows the progress of the encryption task as shown below.

DASHBOARD

After we had all the VM’s encrypted we tested the migration of VMs to VMC on AWS cloud SDDC using HCX (Hybrid Cloud Extension/NSX Hybrid Connect). HCX is capable of migrating VM’s with zero downtime as well as in Bulk. HCX also can extend networks from on-prem to cloud.

HCX

In our case we extended two VXLANs to VMC SDDC as shown below. The gateways for both the networks remained on-prem in the NSX Edge Gateway.

NSX Edge Gateway

We had two encrypted VM’s running CentOS 7 and two encrypted VM’s running Windows 2016. We migrated one CentOS 7 and one Windows VM using HCX vMotion and one each of CentOS 7 and Windows VM using Bulk migration to VMC.

During the entire migration we ensured that the HyTrust appliance was running in the subnet 192.168.148.1/24 and was accessible from both the subnets.

Subnets
Subnets

In each of these cases we observed that the migration completed successfully and the encryption was preserved in all the cases. Also, all the VM’s came up successfully in VMC with all the disks attached. We also tried a reverse migration with vMotion and this test was successful as well and encryption was preserved and the VM was accessible.

0 Comments

Submit a Comment

Your email address will not be published.

Related Articles