Installing The Deep Security Manager
Installing The Deep Security Manager
Table of Contents
Introduction ................................................................................................................................ 4
About This Document ...................................................................................................................................................................... 5
About Deep Security ....................................................................................................................................................................... 7
What's New in Deep Security 9.5 .................................................................................................................................................... 10
Preparation ............................................................................................................................... 11
System Requirements ................................................................................................................................................................... 12
What You Will Need (Basic Components) ......................................................................................................................................... 14
Database Deployment Considerations.............................................................................................................................................. 17
Installation ................................................................................................................................ 19
Installing the Deep Security Manager .............................................................................................................................................. 20
Installing the Deep Security Agent .................................................................................................................................................. 27
Installing and Configuring a Relay-enabled Agent.............................................................................................................................. 35
Database Deployment Considerations.............................................................................................................................................. 17
Upgrading ................................................................................................................................. 38
Upgrading a Basic Agent-based Installation ...................................................................................................................................... 39
Appendices ................................................................................................................................ 58
Deep Security Manager Memory Usage ............................................................................................................................................ 59
Silent Install of Deep Security Manager ........................................................................................................................................... 60
Deep Security Manager Settings Properties File ................................................................................................................................ 62
Deep Security Manager Performance Features .................................................................................................................................. 67
Creating an SSL Authentication Certificate ....................................................................................................................................... 69
Protecting a Mobile Laptop ............................................................................................................................................................. 71
Introduction
This document describes the installation and configuration of the basic Deep Security 9.5 software components necessary to provide basic
agent-based protection to your computers:
1.
2.
System Requirements
2.
Preparation
3.
4.
5.
6.
Implementing Deep Security protection using Security Policies and Recommendation Scans
7.
Intended Audience
This document is intended for anyone who wants to implement Agent-based Deep Security 9.5 protection. The information is intended for
experienced system administrators who have good experience with software deployments and scripting languages.
Protection Modules
Anti-Malware
Integrates with VMware environments for agentless protection, or provides an agent to defend physical servers and virtual desktops
in local mode.
Integrates new VMware vShield Endpoint APIs to provide agentless anti-malware protection for VMware virtual machines with zero in-guest
footprint. Helps avoid security brown-outs commonly seen in full system scans and pattern updates. Also provides agent-based anti-malware
to protect physical servers, Hyper-V and Xen-based virtual servers, public cloud servers as well as virtual desktops in local mode. Coordinates
protection with both agentless and agent-based form factors to provide adaptive security to defend virtual servers as they move between the
data center and public cloud.
Web Reputation
Strengthens protection against web threats for servers and virtual desktops.
Integrates with the Trend Micro Smart Protection Network web reputation capabilities to safeguard users and applications by blocking access
to malicious urls. Provides same capability in virtual environments in agentless mode through the same virtual appliance that also delivers
agentless security technologies for greater security without added footprint.
Firewall
Decreases the attack surface of your physical and virtual servers.
Centralizes management of server firewall policy using a bi-directional stateful firewall. Supports virtual machine zoning and prevents Denial
of Service attacks. Provides broad coverage for all IP-based protocols and frame types as well as fine-grained filtering for ports and IP and MAC
addresses.
Intrusion Prevention
Shields known vulnerabilities from unlimited exploits until they can be patched.
Helps achieve timely protection against known and zero-day attacks. Uses vulnerability rules to shield a known vulnerability -- for example
those disclosed monthly by Microsoft -- from an unlimited number of exploits. Offers out-of-the-box vulnerability protection for over 100
applications, including database, web, email and FTP servers. Automatically delivers rules that shield newly discovered vulnerabilities within
hours, and can be pushed out to thousands of servers in minutes, without a system reboot.
Defends against web application vulnerabilities
Enables compliance with PCI Requirement 6.6 for the protection of web applications and the data that they process. Defends against SQL
injections attacks, cross-site scripting attacks, and other web application vulnerabilities. Shields vulnerabilities until code fixes can be
completed.
Integrity Monitoring
Detects and reports malicious and unexpected changes to files and systems registry in real time. Now available in agentless form
factor.
Provides administrators with the ability to track both authorized and unauthorized changes made to the instance. The ability to detect
unauthorized changes is a critical component in your cloud security strategy as it provides the visibility into changes that could indicate the
compromise of an instance.
Log Inspection
Provides visibility into important security events buried in log files.
Optimizes the identification of important security events buried in multiple log entries across the data center. Forwards suspicious events to a
SIEM system or centralized logging server for correlation, reporting and archiving. Leverages and enhances open-source software available at
OSSEC.
Deep Security Manager, the centralized Web-based management console which administrators use to configure security policy
and deploy protection to the enforcement components: the Deep Security Virtual Appliance and the Deep Security Agent.
Deep Security Virtual Appliance is a security virtual machine built for VMware vSphere environments that Agentlessly provides
Anti-Malware, Web Reputation Service, Firewall, Intrusion Prevention, and Integrity Monitoring protection to virtual machines.
Deep Security Agent is a security agent deployed directly on a computer which provides Anti-Malware, Web Reputation Service,
Firewall, Intrusion Prevention, Integrity Monitoring, and Log Inspection protection to computers on which it is installed.
The Deep Security Agent contains a Relay Module. A Relay-enabled Agent distributes Software and Security Updates
throughout your network of Deep Security components.
Deep Security Notifier is a Windows System Tray application that communicates information on the local computer about security
status and events, and, in the case of Deep Security Relays, also provides information about the Security Updates being distributed
from the local machine.
Policies
Policies are templates that specify the settings and security rules to be configured and enforced automatically for one or more computers.
These compact, manageable rule sets make it simple to provide comprehensive security without the need to manage thousands of rules. Default
Policies provide the necessary rules for a wide range of common computer configurations.
Dashboard
The customizable, web-based UI makes it easy to quickly navigate and drill down to specific information. It provides:
Built-in Security
Role-based access allows multiple administrators (Users), each with different sets of access and editing rights, to edit and monitor different
aspects of the system and receive information appropriate to them. Digital signatures are used to authenticate system components and verify
the integrity of rules. Session encryption protects the confidentiality of information exchanged between components.
Security for network virtualization and Software-Defined Data Center with NSX
Lightweight installer
Selective deployment of Protection Modules to Agents based on Security Policy requirements results in smaller Agent footprint
Linux Support
Note:
For a list of supported Deep Security features by software platform, see the document titled Deep Security 9.5 Supported
Features and Platforms. For a list of specific Linux kernels supported for each platform, see the document titled Deep Security
9.5 Supported Linux Kernels.
Multi-Tenant Improvements
10
Sign in as a Tenant
Preparation
System Requirements
System Requirements
Deep Security Manager
Operating System:
Windows Server 2012 (64-bit), Windows Server 2012 R2 (64-bit)
Database:
Oracle 11g, Oracle 11g Express
Microsoft SQL Server 2008 R2, Microsoft SQL Server 2008 R2 Express
Web Browser: Firefox 24+, Internet Explorer 9.x, Internet Explorer 10.x, Internet Explorer 11.x, Chrome 33+, Safari 6+. (Cookies
enabled.)
Monitor: 1024 x 768 resolution at 256 colors or higher
Memory:
with Anti-Malware protection: 512MB
12
Disk Space:
with Anti-Malware protection: 1GB
Windows:
Windows Server 2012 (64-bit), Windows Server 2012 R2 (64-bit)
Windows Server 2008 (32-bit and 64-bit), Windows Server 2008 R2 (64-bit)
System Requirements
Windows Server 2003 SP1 (32-bit and 64-bit) with patch "Windows Server 2003 Scalable Networking Pack"
Linux:
Note:
The CentOS Agent software is included in the Red Hat Agent software package. To install a Deep Security Agent on CentOS, use the
Red Hat Agent installer.
Note:
For a list of supported Deep Security features by software platform, see the document titled Deep Security 9.5 Supported
Features and Platforms. For a list of specific Linux kernels supported for each platform, see the document titled Deep Security
9.5 Supported Linux Kernels.
13
Note:
To manually confirm that you possess a legitimate version of each install package, use a hash calculator to calculate the hash
value of the downloaded software and compare it to the value published on the Trend Micro Download Center Web site.
Deep Security Agents: Once the Deep Security Manager is installed, use it to import the Deep Security Agent software packages for the
platform you are going to protect.
Note:
Any Deep Security installation, regardless of whether it is providing Agentless or Agent-based protection, requires at least one
Relay-enabled Agent to be installed to download and distribute Security and Software Updates. Any 64-bit Windows or Linux
Agent can provide Relay functionality
To import the Deep Security Agent software, see Installing the Deep Security Agent (page 27) and Installing and Configuring a Relayenabled Agent (page 35).
Other "supporting" packages (such as linux kernel support updates) are available for download as well, but these are imported to Deep Security
automatically as required if you have already downloaded the Agent software. For instructions on importing Agent software, see Installing the
Deep Security Agent.
Administrator/Root
You need to have Administrator/Root privileges on the computers on which you will install Deep Security software components.
SMTP Server
You will need an SMTP server to send alert emails. The DSM uses Port 25 by default for connection to the SMTP Server.
Available Ports
On the Deep Security Manager Host
You must make sure the following ports on the machine hosting Deep Security Manager are open and not reserved for other purposes:
14
Port 4120: The "heartbeat" port, used by Deep Security Agents and Appliances to communicate with Deep Security Manager
(configurable).
Port 4119: Used by your browser to connect to Deep Security Manager. Also used for communication from ESXi and requests for
Security Updates by the DSVA (configurable).
Ports 1433 and 1434: Bi-directional Microsoft SQL Server Database ports.
Ports 389, 636, and 3268: Connection to an LDAP Server for Active Directory integration (configurable).
Port 443: Communication with VMware vCloud, vCenter, vShield/NSX Manager, and Amazon AWS.
Note:
For more details about how each of these ports are used by Deep Security, see Ports Used by Deep Security in the Reference
section of the online help or the Administrator's Guide.
Port 4123: Used for internal communication. Should not be open to the outside.
Port 80, 443: connection to Trend Micro Update Server and Smart Protection Server.
The Deep Security Manager automatically implements specific Firewall Rules to open the required communication ports on machines hosting
Deep Security Relays, Agents and Appliances.
Network Communication
Communication between Deep Security Manager and Deep Security Relay-enabled Agents, Agents/Appliances and hypervisors uses DNS
hostnames by default. In order for Deep Security Agent/Appliance deployments to be successful, you must ensure that each computer can
resolve the hostname of the Deep Security Manager and a Relay-enabled Agent. This may require that the Deep Security Manager and Relayenabled Agent computers have a DNS entry or an entry in the Agent/Appliance computer's hosts file.
Note:
You will be asked for this hostname as part of the Deep Security Manager installation procedure. If you do not have DNS, enter an
IP address during the installation.
Performance Recommendations
See Deep Security Manager Performance Features (page 67).
15
The Database should be installed on hardware that is equal to or better than the specifications of the best Deep Security Manager node. For
the best performance the database should have 8-16GB of RAM and fast access to the local or network attached storage. Whenever possible a
database administrator should be consulted on the best configuration of the database server and a maintenance plan should be put in effect.
For more information, see Database Deployment Considerations (page 17).
Dedicated Servers
The Deep Security Manager and the database can be installed on the same computer if your final deployment is not expected to exceed 1000
computers (real or virtual). If you think you may exceed 1000 computers, the Deep Security Manager and the database should be installed
on dedicated servers. It is also important that the database and the Deep Security Manager be co-located on the same network with a 1GB
LAN connection to ensure unhindered communication between the two. The same applies to additional Deep Security Manager Nodes. A two
millisecond latency or better is recommended for the connection from the Manager to the Database.
16
Note:
When a Virtual Appliance is deployed in a VMware environment that makes use of the VMware Distributed Resource Scheduler
(DRS), it is important that the Appliance does not get vMotioned along with the virtual machines as part of the DRS process.
Virtual Appliances must be "pinned" to their particular ESXi server. You must actively change the DRS settings for all the Virtual
Appliances to "Manual" or "Disabled" (recommended) so that they will not be vMotioned by the DRS. If a Virtual Appliance
(or any virtual machines) is set to "Disabled", vCenter Server does not migrate that virtual machine or provide migration
recommendations for it. This is known as "pinning" the virtual machine to its registered host. This is the recommended course
of action for Virtual Appliances in a DRS environment. An alternative is to deploy the Virtual Appliance onto local storage as
opposed to shared storage. When the Virtual Appliance is deployed onto local storage it cannot be vMotioned by DRS. For further
information on DRS and pinning virtual machines to a specific ESXi server, please consult your VMware documentation.
Note:
If a virtual machine is vMotioned by DRS from an ESXi protected by a DSVA to an ESXi that is not protected by a DSVA, the
virtual machine will become unprotected. If the virtual machine is subsequently vMotioned back to the original ESXi, it will not
automatically be protected again unless you have created an Event-based Task to activate and protect computers that have been
vMotioned to an ESXi with an available DSVA. For more information, see the Event-Based Tasks sections of the online help or the
Administrator's Guide.
Version
Deep Security requires Microsoft SQL Server 2012 or 2008, or Oracle Database 11g or 10g for enterprise deployments. Deep Security Manager
comes with an embedded Apache Derby database but this is only suitable for evaluation purposes. (You cannot upgrade from Apache Derby to
SQL Server or Oracle Database.)
Location
The database must be located on the same network as the Deep Security Manager with a connection speed of 1Gb/s over LAN. (WAN
connections are not recommended.)
Dedicated Server
The database should be installed on a separate dedicated machine.
The database account used by the Deep Security Manager must have db_owner rights.
If using Multi-Tenancy, the database account used by the Deep Security Manager must have dbcreator rights.
Select the "simple" recovery model property for your database. (See http://technet.microsoft.com/en-us/library/ms189272.aspx)
Oracle Database
Start the "Oracle Listener" service and make sure it accepts TCP connections.
The database account used by the Deep Security Manager must be granted the CONNECT and RESOURCE roles and CREATE
SEQUENCE, CREATE TABLE and CREATE TRIGGER system privileges.
If using Multi-Tenancy, the database account used by the Deep Security Manager must be granted the CREATE USER, DROP USER,
ALTER USER, GRANT ANY PRIVILEGE and GRANT ANY ROLE system privileges.
Transport Protocol
The recommended transport protocol is TCP.
If using Named Pipes to connect to a SQL Server, a properly authenticated Microsoft Windows communication channel must be available
between Deep Security Manager host and the SQL Server host. This may already exist if:
17
If no such communication channel is available, Deep Security Manager will not be able to communicate to the SQL Server over named pipes.
SUSE Linux Enterprise Server 11 SP1 with Oracle RAC 11g R2 (v11.2.0.1.0)
Red Hat Linux Enterprise Server 5.8 with Oracle RAC 11g R2 (v11.2.0.1.0)
Note:
Applying the default Linux Server Deep Security Policy to the Oracle RAC nodes should not cause any communication issues with
Oracle Automated Storage Management (ASM) and cluster services. However if you experience issues, try customizing the Firewall
settings according to the port requirements found in Oracle RAC documentation, or disabling the Firewall altogether.
http://docs.oracle.com/cd/E11882_01/install.112/e41962/ports.htm#BABECFJF
High Availability
The Deep Security database is compatible with database failover protection so long as no alterations are made to the database schema. For
example, some database replication technologies add columns to the database tables during replication which can result in critical failures.
For this reason, database mirroring is recommended over database replication.
18
Installation
Note:
Depending on your environment, additional Relay-enabled Agents can be installed at a later time. (For instructions on installing
a Relay-enabled Agent, see Installing the Deep Security Agent (page 27) and Configuring a Relay (page 35). )
20
Copy the Deep Security Manager installer package to the target machine. Start the Deep Security Manager installer by doubleclicking the install package.
2.
License Agreement: If you agree to the terms of the license agreement, select I accept the terms of the Trend Micro license
agreement.
3.
Installation Path: Select the folder where Deep Security Manager will be installed and click Next.
4.
21
If your database is SQL Server and you are using a named instance, click Advanced to enter the specifics.
22
5.
Product Activation: Enter your Activation Code(s). Enter the code for All Protection Modules or the codes for the individual
modules for which you have purchased a license. You can proceed without entering any codes, but none of the Protection Modules
will be available for use. (You can enter your first or additional codes after installation of the Deep Security Manager by going to
Administration > Licenses.)
6.
Address and Ports: Enter the hostname, URL, or IP address of this computer. The Manager Address must be either a resolvable
hostname, a fully qualified domain name, or an IP address. If DNS is not available in your environment, or if some computers are
unable to use DNS, a fixed IP address should be used instead of a hostname. Optionally, change the default communication ports:
The "Manager Port" is the port on which the Manager's browser-based UI is accessible through HTTPS. The "Heartbeat Port" is the
port on which the Manager listens for communication from the Agents/Appliances.
7.
Administrator Account: Enter a username and password for the Master Administrator account. Selecting the Enforce strong
passwords (recommended) requires this and future administrator passwords to include upper and lower-case letters, nonalphanumeric characters, and numbers, and to require a minimum number of characters.
Note:
If you have admin rights on the Manager host machine, you can reset an account password using the dsm_c action unlockout -username USERNAME -newpassword NEWPASSWORD command.
8.
Automatic Updates: Selecting the Create Scheduled Task option will create a Scheduled Task to automatically retrieve the latest
Security and Software Updates from Trend Micro and distribute them to your Agents and Appliances. (You can configure Updates
later using the Deep Security Manager.) If the Deep Security Manager will need to to use a proxy to to connect to the Trend Micro
Update servers over the Internet, select Use Proxy Server when connecting to Trend Micro to check for Security Updates and
enter your proxy information.
9.
Co-Located Relay-enabled Agent: If an Agent install package is available either in the local folder or from the Trend Micro
Download Center, you will be given the option to install a co-located Relay-enabled Agent. Any Deep Security installation requires
at least one Relay to download and distribute Security and Software Updates. If you don't install a Relay-enabled Agent now, you
will need to do so at a later time.
Note:
23
24
10.
Smart Protection Network: Select whether you want to enable Trend Micro Smart Feedback (recommended). (You can enable or
configure Smart Feedback later using the Deep Security Manager). Optionally enter your industry by selecting from the drop-down
list.
11.
Installation Information: Verify the information you entered and click Install to continue.
Select Launch the Deep Security Manager console to open web a browser to the Deep Security Manager URL when setup is
complete. Click Finish to close the Setup wizard.
The Deep Security Manager service will start when setup is complete. The installer places a shortcut to Deep Security Manager in the program
menu. You should take note of this URL if you want to access the Manager from a remote location.
Note:
If you are installing Deep Security Manager on Linux with iptables enabled, you will need to configure the iptables to allow traffic
on TCP ports 4119 and 4120.
Note:
The Deep Security Manager creates a 10-year self-signed certificate for the connections with Agents/Appliances, Relays, and Users'
web browsers. However, for added security, this certificate can be replaced with a certificate from a trusted certificate authority
(CA). (Such certificates are maintained after a Deep Security Manager upgrade.) For information on using a certificate from a CA,
see Creating an SSL Authentication Certificate (page 69).
25
Download the software from the Trend Micro Download Center web site to a local directory.
2.
In the Deep Security Manager, go to Administration > Updates > Software > Local and click Import... in the toolbar to display the
Import Software wizard.
3.
Use the Browse... option to navigate to and select your downloaded software.
4.
26
In Deep Security Manager, go to Administration > Updates > Software > Download Center. The Download Center page displays
the latest versions all Agent software available from Trend Micro.
2.
Select your Agent software package from the list and click Import in the menu bar. Deep Security will begin to download the
software from the Trend Micro Download Center to the Deep Security Manager.
3.
When the software has finished downloading, a green check mark mark will appear in the Imported column for that Agent.
In Deep Security Manager, go to Administration > Updates > Software > Local.
2.
Select your Agent from the list and select Export > Export Installer... from the menu bar.
Note:
If you have older versions of the Agent for the same platform, the latest version of the software will have a green check
mark in the Is Latest column.
27
3.
Note:
The Deep Security Agent "zip" files are made available on the Trend Micro Download Center for users who need to manually import the Agents
into their Deep Security environment because their Deep Security Manager is air-gapped and cannot connect directly to the Download Center
web site. Users whose Deep Security Manager is able to connect to the Download Center are strongly encouraged to import their Agent software
packages using the Deep Security Manager interface. Attempting to install an Agent when the corresponding software package has not been
imported to Deep Security Manager can lead to serious issues.
28
1.
Copy the Agent installer file to the target machine and double-click the installation file to run the installer package. At the Welcome
screen, click Next to begin the installation.
2.
End-User License Agreement: If you agree to the terms of the license agreement, select I accept the terms of the license
agreement and click Next.
3.
Destination Folder: Select the location where you would like Deep Security Agent to be installed and click Next.
4.
Ready to install Trend Micro Deep Security Agent: Click Install to proceed with the installation.
5.
The Deep Security Agent is now installed and running on this computer, and will start every time the machine boots.
Note:
During an install, network interfaces will be suspended for a few seconds before being restored. If you are using DHCP, a new
request will be generated, potentially resulting in a new IP address for the restored connection.
Note:
Installing the Deep Security Agent over Windows Remote Desktop is NOT recommended because of the temporary loss of
connectivity during the install process. However, using the following command line switch when starting Remote Desktop will
allow the install program to continue on the server after the connection is lost. On Windows Server 2008 or Windows Vista SP1
and later or Windows XP SP3 and later, use:
mstsc.exe /admin
On earlier versions of Windows, use:
mstsc.exe /console
29
The following instructions apply to Red Hat, SuSE, and Oracle Linux. To install on SuSE or Oracle Linux, substitute the SuSE or
Oracle Linux RPM name in place of Red Hat.
Note:
You must be logged on as "root" to install the Agent. Alternatively, you can use "sudo".
1.
2.
3.
30
Start the Deployment Script generator by clicking Deployment Scripts... from the Deep Security Manager's Help menu (at the top
right of the Deep Security Manager window).
2.
Note:
Platforms listed in the drop-down menu will correspond to the software that you have imported into the Deep Security
Manager.
3.
Select Activate the Agent Automatically. (Optional, but Agents must be activated by the Deep Security Manager before a
protection Policy can be implemented.)
4.
5.
6.
As you make the above selections, the Deployment Script Generator will generate a script which you can import into your deployment tool of
choice.
Note:
The Deployment Script Generator can also be started from the menu bar on the Administration > Updates > Software > Local
page.
Note:
The deployment scripts generated by Deep Security Manager for Windows Agents must be run in Windows Powershell version 2.0
or later. You must run Powershell as an Administrator and you may have to run the following command to be able to run scripts:
Set-ExcecutionPolicy RemoteSigned
Note:
On windows machines, the deployment script will use the same proxy settings as the local operating system. If the local operating
system is configured to use a proxy and the Deep Security Manager is accessible only through a direct connection, the deployment
script will fail.
Iptables on Linux
Iptables on linux are supported and remains enabled with 9.5 only. If you have an older agent you must proceed as described below:
To run the Deep Security Agent without affecting iptables, create the following empty file:
/etc/use_dsa_with_iptables
If the Deep Security Agent detects the presence of the file, iptables will not be affected when the ds_filter service starts.
31
For SuSE 11, on the target machine before beginning the installation procedure:
in:
/etc/init.d/jexec
after
# Required-Start: $local_fs
add the line:
# Required-Stop:
32
1.
In the Deep Security Manager, go to the Computers page and click New > New Computer... to display the New Computer Wizard.
2.
Enter the hostname or IP address of the computer. If you want to use the Agent to provide protection for the host computer as well
as function as a Relay, select a Deep Security Policy from the Policy menu. Otherwise leave Policy set to "None".
3.
The wizard will confirm that it will activate the Agent on the computer and apply a Security Policy (if one was selected).
4.
On the final screen, de-select "Open Computer Details on 'Close'" and click Close.
5.
The Agent is now activated. In the Deep Security Manager, go to the Computers screen and check the computer's status. It should
display "Managed (Online)".
Note:
In the Deep Security Manager, go to the Computers page, double-click the computer with the newly-activated Agent to display its
Details editor window.
2.
In the computer editor, go to the Overview > Actions > Software area and click Enable Relay. Click Close close the editor window.
3.
In the Deep Security Manager on the Computers page, the computer's icon will change from ordinary computer (
) to computer
33
34
2.
In the menu bar, click New > New Computer... to display the New Computer Wizard.
3.
For Hostname, enter the hostname or IP address of the computer on which you just installed the Agent.
4.
For Policy, select a Policy based on the operating system of your computer.
5.
For Download Security Updates From, leave the default setting (Default Relay Group).
6.
Click Finish. Deep Security Manager will import the computer to its Computers page and activate the Agent.
The Adding a new computer and activation process should have finished by opening the Computer's Editor window. If it hasn't,
follow step two (below) to open the window.
2.
In the Deep Security Manager, go to the Computers screen, find the Agent on which you want to enable Relay functionality and
double-click it to open its Computer Editor window.
3.
In the Computer Editor window, go to Overview > Actions > Software and click Enable Relay.
Note:
If you do not see the Enable Relay button, go to Administration > Updates > Software > Local to check whether the
corresponding package has been imported. Also ensure that the computer running a 64-bit version of the Agent.
Deep Security Manager will install the plug-ins required by the Relay Module, and the Agent will begin to function as a Deep Security Relay.
Note:
If you are running Windows Firewall or iptables, you also need to add a Firewall Rule that allows TCP/IP traffic on port 4122 on
the Relay.
Note:
Relays are organized into Relay Groups. New Relays are automatically assigned to the Default Relay Group. The Default Relay
Group is configured to retrieve Security and Software Updates from the Primary Security Update Source defined in the Deep
Security Manager on the Administration > System Settings > Updates tab. (The Primary Update Source by default is Trend
Micro's Update Servers, but this configurable.)
35
Version
Deep Security requires Microsoft SQL Server 2012 or 2008, or Oracle Database 11g or 10g for enterprise deployments. Deep Security Manager
comes with an embedded Apache Derby database but this is only suitable for evaluation purposes. (You cannot upgrade from Apache Derby to
SQL Server or Oracle Database.)
Location
The database must be located on the same network as the Deep Security Manager with a connection speed of 1Gb/s over LAN. (WAN
connections are not recommended.)
Dedicated Server
The database should be installed on a separate dedicated machine.
The database account used by the Deep Security Manager must have db_owner rights.
If using Multi-Tenancy, the database account used by the Deep Security Manager must have dbcreator rights.
Select the "simple" recovery model property for your database. (See http://technet.microsoft.com/en-us/library/ms189272.aspx)
Oracle Database
Start the "Oracle Listener" service and make sure it accepts TCP connections.
The database account used by the Deep Security Manager must be granted the CONNECT and RESOURCE roles and CREATE
SEQUENCE, CREATE TABLE and CREATE TRIGGER system privileges.
If using Multi-Tenancy, the database account used by the Deep Security Manager must be granted the CREATE USER, DROP USER,
ALTER USER, GRANT ANY PRIVILEGE and GRANT ANY ROLE system privileges.
Transport Protocol
The recommended transport protocol is TCP.
If using Named Pipes to connect to a SQL Server, a properly authenticated Microsoft Windows communication channel must be available
between Deep Security Manager host and the SQL Server host. This may already exist if:
36
If no such communication channel is available, Deep Security Manager will not be able to communicate to the SQL Server over named pipes.
SUSE Linux Enterprise Server 11 SP1 with Oracle RAC 11g R2 (v11.2.0.1.0)
Red Hat Linux Enterprise Server 5.8 with Oracle RAC 11g R2 (v11.2.0.1.0)
Note:
Applying the default Linux Server Deep Security Policy to the Oracle RAC nodes should not cause any communication issues with
Oracle Automated Storage Management (ASM) and cluster services. However if you experience issues, try customizing the Firewall
settings according to the port requirements found in Oracle RAC documentation, or disabling the Firewall altogether.
http://docs.oracle.com/cd/E11882_01/install.112/e41962/ports.htm#BABECFJF
High Availability
The Deep Security database is compatible with database failover protection so long as no alterations are made to the database schema. For
example, some database replication technologies add columns to the database tables during replication which can result in critical failures.
For this reason, database mirroring is recommended over database replication.
37
Upgrading
2.
Install at least one Deep Security 9.5 Agent with Relay functionality enabled.
3.
Upgrade your Deep Security Agents and Relays to 9.5 (as required)
Note:
The upgrade process does not delete or overwrite any data but backing up your system before an upgrade is always a good idea.
To back up your 9.0 Deep Security data, see "Database Backup and Recovery" in the your Deep Security 9.0 online help or
Administrator's Guide.
Download the Deep Security Manager 9.5 install package from the Trend Micro Download Center web site
(http://downloadcenter.trendmicro.com/) to a local directory.
2.
Run the installer package following the steps as for a new installation, described in Installing Deep Security Manager (page 20)
except when given the option choose Upgrade instead of Overwrite.
9.5 Agents cannot be updated by 9.0 Relays (and therefore a 9.5 Relay-enabled Agent is required)
9.0 Relays and 9.5 Relay-enabled Agents cannot be in the same Relay Group
The recommended procedure is to replace your Deep Security 9.0 Relays with 9.5 Relay-enabled Agents. Windows Relays can upgraded from
the Deep Security Manager. Linux Relays must be manually uninstalled and replaced with a fresh install of a 9.5 Linux Agent.
To perform a fresh install of a 9.5 Deep Security Agent and enable it as a Relay, see Installing the Deep Security Agent (page 27).
Note:
If you want to test the functionality of the 9.5 Relay-enabled Agent before replacing all your 9.0 Relays you can install a single
9.5 Relay-enabled Agent, place it in its own Relay Group (because 9.0 Relays cannot be with 9.5 Relay-enabled Agents in the same
Relay Group) , and assign a few VMs to the new Relay Group.
39
Deep Security Agents and Relays must be of the same version or less than the Deep Security Manager being used to manage it. The
Deep Security Manager must always be upgraded before the Deep Security Agents and Relays.
Note:
When planning the upgrade of your Agents and Relays from 9.0 to 9.5, ensure that your 9.5 Agents are assigned to Relay Groups
that contain only 9.5 Relays. You should upgrade all Relays in a Group to 9.5 (or create a new 9.5 Group) before configuring any
9.5 Agents to receive updates from the group.
Deep Security 9.0 Agents can be upgraded using the Deep Security Manager interface (or by manual local upgrade), but the Agent software
must first be imported into the Deep Security Manager.
Deep Security 9.0 Windows Relays can be upgraded to 9.5 Relay-enabled Agents using the Deep Security Manager interface (or by manual local
upgrade). Deep Security 9.0 Linux Relays cannot be upgraded. They must be uninstalled and replaced with a fresh install of a 9.5 Linux Agent.
(See Upgrade a Relay on Linux, below, for instructions.)
To import Agent software packages to Deep Security:
1.
In Deep Security Manager, go to Administration > Updates > Software > Download Center. The Download Center page displays
the latest versions all Agent software available from Trend Micro.
2.
Select your Agent software package from the list and click Import in the menu bar. Deep Security will begin to download the
software from the Trend Micro Download Center to the Deep Security Manager.
3.
When the software has finished downloading, a green check mark mark will appear in the Imported column for that Agent.
To Upgrade Deep Security Agents and Windows Deep Security Relays using the Deep Security Manager:
Note:
40
1.
2.
find the computer on which you want to upgrade the Agent or Relay.
3.
Right-click the computer and select Actions > Upgrade Agent software.
4.
The new Agent software will be sent to the computer and the Agent or Relay will be upgraded.
You can manually upgrade the any Agents or Relays locally on a computer. To do this, follow the instructions in Installing the
Deep Security Agent (page 27).
Feature
Windows
Linux
AM
No change
Uninstalled
IM
Uninstalled
Uninstalled
WRS/FW/IPS
Uninstalled
Uninstalled
LI
Uninstalled
Uninstalled
2.
3.
Deactivate the Relay that you want to upgrade and then uninstall it.
4.
5.
2.
3.
4.
5.
6.
7.
In Deep Security Manager, add the computer (Computers > New > New Computer).
41
Quick Start
2.
3.
4.
The Relay is responsible for retrieving Security Updates from Trend Micro and distributing them to your protected computers. If
you did not install a co-located Relay-enabled Agent during the installation of the Deep Security Manager, you need to install a
Relay-enabled Agent before proceeding. (See Installing and Configuring a Relay-enabled Agent (page 35).)
Start the Deep Security Manager management console and navigate to the Computers page. Your Relay-enabled Agent should appear on the
Computers list identified by a "computer" icon with a Relay badge on it (
43
Relays are always organized into Relay Groups, even if it's only the one "Default Relay Group" to which all new Relays are assigned. You can
create multiple Relay Groups if you have a large number of computers and want to create a hierarchical Relay structure or if your computers
are spread out over large geographical areas. For more information on Relay Groups, see Relay Groups in the online help.
To view your Deep Security Relays, go to the Administration > Updates > Relay Groups.
This will display your current Relay Groups on the Relay Groups page. Usually you will only have the single Default Relay Group.
Double-click the Default Relay Group to display its Relay Group Properties window:
In the Members area of the Relay Group Properties window you'll see the Relays that are members of the group.
Note:
If there are no computers in the Members area see Configuring the Deep Security Relay in the Installation Guide.
44
This will display the Download Patterns Wizard which contacts the Trend Micro Update Servers and downloads the latest Anti-Malware
Pattern Updates and distributes them to your computers. (This is the default behavior. You can configure the automatic distribution of Security
Updates on the Administration > System Settings > Updates tab.) If upon completion the wizard displays the success message it means your
Relay-enabled Agent can communicate with the Update servers:
45
Notice that (in this case) the Daily Check For Security Updates Task is set to perform a Security Update every day at 12:55.
Note:
If you don't have a Daily Check For Security Updates Task in your list, you can create one by clicking on New on the Scheduled
Task page toolbar and following the instructions in the New Scheduled Task wizard.
In the Security Updates area you can configure the following options (although the default settings are recommended):
46
Primary Update Source: this is the source that the Relays in all Relay Groups go to for Deep Security Rule and Pattern Updates
which they can then distribute to Agents and Virtual Appliances. (Only change this if you have been instructed to do so by your
support provider.)
Patterns: Patterns are used by the Anti-malware Module. The default settings permits Agents and Virtual Appliances to download
Pattern Updates directly from the Primary Security Update Source (above) if for some reason they cannot contact a Relay or the
Deep Security Manager. (For example because of local connectivity issues, or if the computer is a roaming laptop.)
Rules: Updates to the Deep Security Rules used by the Firewall, Intrusion Prevention, Log Inspection, and Integrity Monitoring
Protection Modules must be integrated into Policies at the Deep Security Manager level before they can be sent out to Agents
and Virtual Appliances. This setting (on by default) automatically integrates Rule Updates with the Policies in the Deep Security
Manager.
Note:
In each Security Policy, there is a further setting (also on by default) to automatically update computers when there
has been a change to the Security Policy that is in use. This setting is found in the Policy/Computer Editor (the Details
window) in Settings > Computer > Send Policy Changes Immediately.
Relays: The two settings under Relays determine if Deep Security will import updates for older 9.0 and earlier versions of the
Agents and Appliances. Security Update architecture has changed substantially since 9.0 and the formats of the Updates for 9.0 and
9.5 are different. Do not download Updates for older Agents if you do not them as this would consume unnecessary bandwidth
and storage space. Similarly, only download Patterns for all "Regions" (determined by language) if you have Agents or Appliances
running in multiple Regions. Leaving this option unchecked will distribute only the package designed for the Region in which your
Deep Security Manager is installed.
In the Software Updates area you can configure the following options (although the default settings are recommended):
Trend Micro Download Center: By default, Deep Security will "Automatically download updates to imported software." Trend
Micro will periodically issue updated builds of already released Agent and Appliance software. Setting this option will automatically
download updates to any software that you have already imported to Deep Security (visible on the Administration > Updates >
Software > Local page) from the Trend Micro Download Center (the software available from the Trend Micro Download Center can
be see on the Administration > Updates > Software > Download Center page.)
Note:
The installation of the software once it has been downloaded must be initiated manually. This last step cannot be
automated.
In the Virtual Appliance Version Control section, you can control the versions of the Protection Modules are installed on a newly activated
Virtual Appliance. The Deep Security Virtual Appliance is shipped with basic versions of the Protection Module plug-ins. The Appliance relies
on the plug-ins that are shipped with the 64-bit Red hat Agent software package for Updates. By default, the Appliance will use the latest version
of the Red Hat package that has been imported to Deep Security (on the Updates > Software > Local page.) However you may wish to control
over the version of the Protection Modules get installed and you can do using this setting.
Note:
For more information about the configuration options available on this page, see the associated online help for it in the Deep
Security Manager.
47
Double-click on an Alert see its Properties window where you can you can set the Alert options for email notification:
Now you need to configure your User account to receive the email notifications Deep Security will send out. Go to Administration > User
Management > Users and double-click on your User account to display its Properties window. Go to the Contact Information tab and enter
an email address and select the Receive Alert Emails option:
48
In order for Deep Security to send email notification it has to be able to communicate with an SMTP server (access to an SMTP server is a
requirement for email notifications). To connect the Deep Security Manager to your SMTP server, go to the Administration > System Settings
> SMTP tab:
Complete the required fields in the SMTP area press test SMTP Settings at the bottom of the page when you're done. you should see a Test
connection to SMTP server succeeded message:
49
Note:
If you unable to connect with your SMTP server, make sure the Manager can connect with the SMTP server on port 25.
50
2.
3.
4.
5.
Note:
We will assume that you have already installed the Deep Security Manager on the computer from which you intend to manage
the Deep Security Agents throughout your network. We will also assume that you have installed (but not activated) Deep
Security Agent on the computer you wish to protect. And finally, we will assume that you have a Deep Security Relay available
from which Deep Security can download the latest Security Updates. If any of these requirements are not in place, consult the
Installation Guide for instructions to get to this stage.
Adding computers individually from a local network by specifying their IP addresses or hostnames
VMware vCloud
For the purposes of this exercise, we will add a computer from a local network but once a computer is added to the Manager, the protection
procedures are the same regardless of where the computer is located.
To add a computer from a local network:
1.
In the Deep Security Manager console, go to the Computers page and click New in the toolbar and select New Computer... from
the drop-down menu.
51
2.
In the New Computer wizard, enter the hostname or IP address of the computer and select an appropriate security Policy to apply
from the Policy tree in the drop-down menu. (In this case we will select the Windows Server 2008 Policy.) Click Next.
3.
The wizard will contact the computer, add it to the Computers page, detect the unactivated Agent, activate it, and apply the selected
Policy. Click Finish.
Note:
An Agent can be configured to automatically initiate its own activation upon installation. For details, see CommandLine Utilities in the Reference section of the online help.
4.
When the computer has been added the wizard will display a confirmation message:
5.
Deselect the Open Computer Details on 'Close' option and click Close.
The computer now appears in the Deep Security Manager's list of managed computers on the Computers page.
Deep Security will automatically download the latest Security Updates to the computer after activation. As well, the Windows Server 2008
Policy that was assigned to the computer has Integrity Monitoring enabled and so it will start to Build an Integrity Monitoring baseline for the
computer. You can see activities currently being carried out in the status bar of the Manager window:
52
Once Deep Security Manager has completed its initial post-activation tasks, the computer's Status should display as Managed (Online).
Note:
More information is available for each page in the Deep Security Manager by clicking the Help button in the menu bar.
Intrusion Prevention
Integrity Monitoring
Log Inspection
Go to the Computers page in the main Deep Security Manager console window.
2.
Right-click on your computer and select Actions > Scan for Recommendations:
53
During the Recommendation Scan, your computer's Status will display Scanning for Recommendations. When the scan is finished, if Deep
Security has any recommendations to make, you will see an Alert on the Alerts screen:
Open the computer editor for your computer (Details... in the Computers page menu bar or from the right-click menu.)
2.
In the Recommendations area of the General tab, you'll see the results of the scan:
The Current Status tells us that there are currently 179 Intrusion Prevention Rules assigned to this computer.
Last Scan for Recommendations tells us that the last scan took place on December 18th, 2012, at 09:14.
Unresolved Recommendations tells us that as a result of the scan, Deep Security recommends assigning an additional 28 Intrusion Prevention
Rules and unassigning 111 currently assigned Rules.
The Note informs us that 111 of the Rules recommended for unassignment (all of them as it turn out) have been assigned at the Policy level
(rather than directly here on the computer level). Rules that have been assigned at a level higher up the Policy tree can only be unassigned
in the Policy where they were assigned -- in this case, the Windows Server 2008 Policy. (If we had opened the Windows Server 2008 Policy
editor, we would have seen the same recommendations and we could have unassigned them from there.)
We are also told that 7 of the Rules that are recommended for assignment can't be automatically assigned. Usually these are either Rules
that require configuration or Rules that are prone to false positives and whose behavior should be observed in detect-only mode being being
54
enforced in prevent mode. To see which Rules have been recommended for assignment, click Assign/Unassign... to display the IPS Rules rule
assignment modal window. Then select Recommended for Assignment from the second drop-down filter list:
Rules that require configuration are identified by an icon with a small configuration badge (
). To see the configurable options for a Rule,
double-click the Rule to open its Properties window (in local editing mode) and go to the Configuration tab. To Assign a Rule, select the
checkbox next to its name.
To view Rules that are recommended for unassignment, filter the list of Rules by selecting Recommended for Unassignment from the same
drop-down list. To unassign a Rule, deselect the checkbox next to its name.
Note:
Rules that are in effect on a computer because they have been assigned in a Policy higher up the policy tree can't be unassigned
locally. The only way to unassign such Rules is to edit the Policy where they were originally assigned and unassign them from
there. For more information on this kind of Rule inheritance, see Policies, Inheritance and Overrides in the Reference section of
the online help.
In the main Deep Security Manager window, go to Administration > Scheduled Tasks
2.
In the menu bar, click New to display the New Scheduled Task wizard.
55
3.
Select Scan Computers for Recommendations as the scan type and select Weekly recurrence. Click Next.
4.
Select a start time, select every 1 week, and select a day of the week. Click Next.
5.
When specifying which computers to Scan, select the last option (Computer) and select the Windows Server 2008 computer we
are protecting. Click Next.
6.
Type a name for the new Scheduled Task. Leave the Run task on 'Finish' unchecked (because we just ran a Recommendation Scan).
Click Finish.
The new Scheduled task now appears in the list of Scheduled Tasks. It will run once a week to scan your computer and make recommendations
for you computer. If you have set Automatically implement Recommendations for each of the three protection modules that support it, Deep
Security will assign and unassign Rules are required. If Rules are identified that require special attention, an Alert will be raised to notify you.
Select the checkbox beside each of the three widgets, and click OK. The widgets will appear on the dashboard. (It may take a bit of time to
generate the data.)
56
The Firewall Activity (Prevented) widget displays a list of the most common reasons for packets to be denied (that is, blocked
from reaching a computer by the Agent on that computer) along with the number of packets that were denied. Items in this list will
be either types of Packet Rejections or Firewall Rules. Each "reason" is a link to the corresponding logs for that denied packet.
Note:
The Firewall IP Activity (Prevented) widget displays a list of the most common source IPs of denied packets. Similar to the
Firewall Activity (Prevented) widget, each source IP is a link to the corresponding logs.
The Firewall Event History [2x1] widget displays a bar graph indicating how many packets were blocked in the last 24 hour
period or seven day period (depending on the view selected). Clicking a bar will display the corresponding logs for the period
represented by the bar.
Note the trend indicators next to the numeric values in the Firewall Activity (Prevented) and Firewall IP Activity (Prevented)
widgets. An upward or downward pointing triangle indicates an overall increase or decrease over the specified time period, and a
flat line indicates no significant change.
Note:
For the meaning of the different packet rejection reasons, see Firewall Events and Intrusion Prevention Events in the Reference
section of the online help.
Reports
Often, a higher-level view of the log data is desired, where the information is summarized, and presented in a more easily understood format.
The Reports fill this Role, allowing you to display detailed summaries on computers, Firewall and Intrusion Prevention Event Logs, Events,
Alerts, etc. In the Reports page, you can select various options for the report to be generated.
We will generate a Firewall Report, which displays a record of Firewall Rule and Firewall Stateful Configuration activity over a configurable
date range. Select Firewall Report from the Report drop-down. Click Generate to launch the report in a new window.
By reviewing scheduled reports that have been emailed by the Deep Security Manager to Users, by logging into the system and consulting the
dashboard, by performing detailed investigations by drilling-down to specific logs, and by configuring Alerts to notify Users of critical events,
you can remain apprised of the health and status of your network.
57
Appendices
2.
3.
Edit the file by adding the line: "-Xmx800m" (in this example, 800MB of memory will be made available to the installer.)
4.
Go to the Deep Security Manager install directory (the same directory as Deep Security Manager executable).
2.
Create a new file. Depending on the platform, give it the following name:
Windows: "Deep Security Manager.vmoptions".
Linux: "dsm_s.vmoptions".
3.
Edit the file by adding the line: " -Xmx10g " (in this example, "10g" will make 10GB memory available to the Deep Security
Manager.)
4.
5.
You can verify the new setting by going to Administration > System Information and in the System Details area, expand Manager
Node > Memory. The Maximum Memory value should now indicate the new configuration setting.
59
-q
-console
-Dinstall4j.language=<ISO
code> -varfile
Linux
To initiate a silent install on Linux:
Manager-Linux-<Version>.x64.sh -q -console -Dinstall4j.language=<ISO code> -varfile <PropertiesFile>
Parameters
The "-q" setting forces install4j to execute in unattended (silent) mode.
The "-console" setting forces messages to appear in the console (stdout).
The -Dinstall4j.language=<ISO code> options lets you override the default installation language (English) if other languages are
available. Specify a language using standard ISO language identifiers:
Japanese: jp
The <PropertiesFile> argument is the complete/absolute path to a standard Java properties file. Each property is identified by its equivalent
GUI screen and setting in the Windows Deep Security Manager installation (described above). For example, the Deep Security Manager address
on the "Address and Ports" screen is specified as:
AddressAndPortsScreen.ManagerAddress=
Most of the properties in this file have acceptable defaults and may be omitted. The only required values for a simple installation using an
embedded database are:
LicenseScreen.License
CredentialsScreen.Administrator.Username
CredentialsScreen.Administrator.Password
For a complete description of available settings, see Deep Security Manager Settings Properties File (page 62).
60
DatabaseScreen.DatabaseName=XE
DatabaseScreen.Username=DSM
DatabaseScreen.Password=xxxxxxx
AddressAndPortsScreen.ManagerPort=4119
AddressAndPortsScreen.HeartbeatPort=4120
CredentialsScreen.Administrator.Username=masteradmin
CredentialsScreen.Administrator.Password=xxxxxxxx
CredentialsScreen.UseStrongPasswords=False
SecurityUpdateScreen.UpdateComponents=True
SecurityUpdateScreen.UpdateSoftware=True
RelayScreen.Install=True
SmartProtectionNetworkScreen.EnableFeedback=False
61
Note:
For optional entries, supplying an invalid value will result in the default value being used.
Required Settings
LicenseScreen
Property
Possible Values
Default Value
LicenseScreen.License.-1=<value>
blank
Notes
OR
Property
Possible Values
Default Value
LicenseScreen.License.0=<value>
blank
LicenseScreen.License.1=<value>
blank
LicenseScreen.License.2=<value>
blank
LicenseScreen.License.3=<value>
blank
Notes
CredentialsScreen
Property
Possible Values
Default Value
CredentialsScreen.Administrator.Username=<value>
blank
CredentialsScreen.Administrator.Password=<value>
blank
Optional Settings
LanguageScreen
Property
Possible Values
Default Value
Notes
<null>
<null>
Dinstall4j.language=<value>
jp
zh_CN
62
Notes
UpgradeVerificationScreen
Note:
Property
Possible Values
UpgradeVerificationScreen.Overwrite=<value>
Note:
Default Value
True
Notes
False
False
Setting this value to True will overwrite any existing data in the database. It will do this without any further prompts.
DatabaseScreen
This screen defines the database type and optionally the parameters needed to access certain database types.
Note:
The interactive install provides an "Advanced" dialog to define the instance name and domain of a Microsoft SQL server, but
because the unattended install does not support dialogs these arguments are included in the DatabaseScreen settings below.
Property
Possible Values
Embedded
DatabaseScreen.DatabaseType=<value>
DatabaseScreen.Hostname=<value>
database host
Any string
Named Pipes
DatabaseScreen.Transport=<value>
Server
Current host
name
Microsoft SQL
TCP
dsm
Named Pipes
DatabaseScreen.Username=<value>
DatabaseScreen.Password=<value>
blank
DatabaseScreen.SQLServer.Instance=<value>
DatabaseScreen.SQLServer.Domain=<value>
DatabaseScreen.SQLServer.UseDefaultCollation=<value>
True
False
False
AddressAndPortsScreen
This screen defines the hostname, URL, or IP address of this computer and defines ports for the Manager. In the interactive installer this screen
also supports the addition of a new Manager to an existing database, but this option is not supported in the unattended install.
Property
Possible
Values
Default
Notes
Value
<hostname,
URL or IP
AddressAndPortsScreen.ManagerAddress=<value> address of
the Manager
<current
host
name>
host>
AddressAndPortsScreen.ManagerPort=<value>
AddressAndPortsScreen.HeartbeatPort=<value>
<valid port
number>
<valid port
number>
4119
4120
True indicates that the current install is a new node. If the installer finds existing data in
AddressAndPortsScreen.NewNode=<value>
True
False
False
the database, it will add this installation as a new node. (Multi-node setup is always a
silent install). Note: The "New Node" installation information about the existing database
to be provided via the DatabaseScreen properties.
63
CredentialsScreen
Property
CredentialsScreen.UseStrongPasswords=<value>
Possible Values
true
False
SecurityUpdateScreen
Property
SecurityUpdateScreen.UpdateComponents=<value>
SecurityUpdateScreen.UpdateSoftware=<value>
Possible
Values
True
Default
Value
True
False
True
True
False
Notes
True indicates that you want Deep Security Manager to automatically retrieve the
latest Components
True indicates that you want to setup a task to automatically check for new
software.
SmartProtectionNetworkScreen
This screen defines whether you want to enable Trend Micro Smart Feedback and optionally your industry.
Property
SmartProtectionNetworkScreen.EnableFeedback=<value>
Possible Values
True
False
blank
Not specified
Banking
Communications and media
Education
Energy
Fast-moving consumer goods (FMCG)
Financial
Food and beverage
Government
Healthcare
SmartProtectionNetworkScreen.IndustryType=<value>
Insurance
Manufacturing
Materials
Media
Oil and gas
Real estate
Retail
Technology
Telecommunications
Transportation
Utilities
Other
64
DatabaseScreen.Transport=TCP
DatabaseScreen.DatabaseName=XE
DatabaseScreen.Username=DSM
DatabaseScreen.Password=xxxxxxx
AddressAndPortsScreen.ManagerPort=4119
AddressAndPortsScreen.HeartbeatPort=4120
CredentialsScreen.Administrator.Username=masteradmin
CredentialsScreen.Administrator.Password=xxxxxxxx
CredentialsScreen.UseStrongPasswords=False
SecurityUpdateScreen.UpdateComponents=True
SecurityUpdateScreen.UpdateSoftware=True
RelayScreen.Install=True
SmartProtectionNetworkScreen.EnableFeedback=False
Installation Output
The following is a sample output from a successful install, followed by an example output from a failed install (invalid license). The [Error] tag
in the trace indicates a failure.
Successful Install
Stopping Trend Micro Deep Security Manager Service...
Detecting previous versions of Trend Micro Deep Security Manager...
Upgrade Verification Screen settings accepted...
Database Screen settings accepted...
License Screen settings accepted...
Address And Ports Screen settings accepted...
Credentials Screen settings accepted...
All settings accepted, ready to execute...
Uninstalling previous version
Stopping Services
Extracting files...
Setting Up...
Connecting to the Database...
Creating the Database Schema...
Updating the Database Data...
Creating MasterAdmin Account...
Recording Settings...
Creating Temporary Directory...
Installing Reports...
Creating Help System...
Setting Default Password Policy...
Importing Example Security Profiles...
Applying Security Update...
Assigning IPS Filters to Example Security Profiles...
Correcting the Port for the Manager Security Profile...
Correcting the Port List for the Manager...
Creating IP List to Ignore...
Creating Scheduled Tasks...
Creating Asset Importance Entries...
Creating Auditor Role...
Auditing...
Optimizing...
Recording Installation...
Creating Properties File...
Creating Shortcut...
Configuring SSL...
Configuring Service...
65
Failed Install
This example shows the output generated when the properties file contained an invalid license string:
Stopping Trend Micro Deep Security Manager Service...
Detecting previous versions of Trend Micro Deep Security Manager...
Upgrade Verification Screen settings accepted...
Database Screen settings accepted...
Database Options Screen settings accepted...
[ERROR] The license code you have entered is invalid.
[ERROR] License Screen settings rejected...
Rolling back changes...
66
Agentless Protection
Scan Caching
Scan Caching improves the efficiency of on-demand scans performed by the Virtual Appliance. It eliminates the unnecessary scanning of
identical content across multiple VMs in large VMware deployments.
In addition,
Integrity Monitoring scan caching speeds up Integrity Monitoring scans by sharing Integrity Monitoring scan results
67
Concurrent Scan feature allows further overall scan time improvement by allowing multiple VMs to be scanned concurrently
68
Note:
When a Virtual Appliance is deployed in a VMware environment that makes use of the VMware Distributed Resource Scheduler
(DRS), it is important that the Appliance does not get vMotioned along with the virtual machines as part of the DRS process.
Virtual Appliances must be "pinned" to their particular ESXi server. You must actively change the DRS settings for all the Virtual
Appliances to "Manual" or "Disabled" (recommended) so that they will not be vMotioned by the DRS. If a Virtual Appliance
(or any virtual machines) is set to "Disabled", vCenter Server does not migrate that virtual machine or provide migration
recommendations for it. This is known as "pinning" the virtual machine to its registered host. This is the recommended course
of action for Virtual Appliances in a DRS environment. (An alternative is to deploy the Virtual Appliance onto a local store as
opposed to a shared store. When the Virtual Appliance is deployed onto a local store it cannot be vMotioned by DRS.) For further
information on DRS and pinning virtual machines to a specific ESXi server consult your VMware documentation.
Note:
If a virtual machine is vMotioned by HA from an ESXi protected by a DSVA to an ESXi that is not protected by a DSVA, the
virtual machine will become unprotected. If the virtual machine is subsequently vMotioned back to the original ESXi, it will not
automatically be protected again unless you have created an Event-based Task to activate and protect computers that have been
vMotioned to an ESXi with an available DSVA. For more information, see "Event-Based Tasks" in the Deep Security Manager Help.
Go to the Deep Security Manager installation directory (for the purpose of these instructions, we will assume it's "C:\Program
Files\Trend Micro\Deep Security Manager") and create a new folder called Backupkeystore
2.
3.
From a command prompt, go to the following location: C:\Program Files\Trend Micro\Deep Security Manager\jre\bin
4.
Run the following command which will create a self signed certificate:
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -genkey -alias tomcat keyalg RSA -dname cn=dsmserver
5.
Note:
NOTE: -dname is the common name of the certificate your CA will sign. Some CAs require a specific name to sign the
Certificate Signing Request (CSR). Please consult your CA Admin to see if you have that particular requirement.
6.
There is a new keystore file created under the user home directory. If you are logged in as "Administrator", You will see the
.keystore file under C:\Documents and Settings\Administrator
7.
8.
9.
10.
Send the certrequest.csr to your CA to sign. In return you will get two files. One is a "certificate reply" and the second is the CA
certificate itself.
Run the following command to import the CA cert in JAVA trusted keystore:
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -import -alias root trustcacerts -file cacert.crt -keystore "C:\Program Files\Trend Micro\Deep Security Manager\
jre\lib\security\cacerts"
11.
69
Run the following command to import the certificate reply to your keystore:
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -import -alias tomcat file certreply.txt
13.
Run the following command to view the certificate chain in you keystore:
C:\Program Files\Trend Micro\Deep Security Manager\jre\bin>keytool -list -v
14.
Copy the .keystore file from your user home directory C:\Documents and Settings\Administrator to C:\Program Files\ Trend
Micro \Deep Security Manager\
15.
Open the configuration.properties file in folder C:\Program Files\Trend Micro\Deep Security Manager. It will look something
like:
keystoreFile=C\:\\\\Program Files\\\\Trend Micro\\\\Deep Security Manager\\\\.keystore
port=4119
keystorePass=$1$85ef650a5c40bb0f914993ac1ad855f48216fd0664ed2544bbec6de80160b2f
installed=true
serviceName= Trend Micro Deep Security Manager
16.
70
17.
18.
19.
Connect to the Deep Security Manager with your browser and you will notice that the new SSL certificate is signed by your CA.
2.
3.
3.
4.
Assigning Firewall Rules (including some with Location Awareness) and enabling Firewall Stateful Configuration
5.
6.
7.
3.
4.
We will assume that you have already installed the Manager on the computer from which you intend to manage the Deep Security Agents
throughout your network. We will also assume that you have installed (but not activated) Deep Security Agents on the mobile laptops
you wish to protect. If you have not done so, consult the installation instructions for the steps to get to this stage.
2.
3.
4.
Connecting to a VMware vCenter and importing a list of computers (not covered in this section because we are dealing with mobile
laptops.)
71
1.
2.
3.
Type a range of IP addresses you want to scan for computers. If you wish, you can enter a masked IP address to do the same thing.
4.
Select Automatically resolve IPs to hostnames to instruct the Manager to automatically resolve hostnames as it performs the
discovery.
5.
You have the option to add discovered computers to a computer group you have created. For now, leave the Add Discovered
Computers to Group drop-down list choice set to "Computers".
6.
Finally, clear the Automatically perform a port scan of discovered computers checkbox. (Port scanning detects which ports are
open on the discovered computers.)
7.
Click OK. The dialog box will disappear and "Discovery in progress..." will appear in the Manager's status bar at the bottom of your
browser. (The discovery process can be cancelled by clicking the "X".)
In a few minutes, all visible computers on the network will have been detected and the Manager will have identified those with
Deep Security Agents installed. These Agents now need to be activated.
8.
Activate the Agents by right-clicking an Agent (or multiple selected Agents), and select "Activate/Reactivate" from the shortcut
menu. Once the Agents are activated, their status light will turn green and "Managed (Online)" will appear in the status column.
Click the down arrow next to "New" in the Computers page toolbar and select Add Directory.... to start the Add Directory wizard.
Note:
2.
Synchronization of computers from other LDAP-based directories may be possible but would require some
customization. For assistance contact your support provider.
Type the Active Directory server name, a name and description for your imported directory as it will appear in the Manager (it
doesn't have to match that of the Active Directory), the IP and port of the Active Directory server, and finally your access method
and credentials. Click Next.
Note:
You must include your domain name with your username in the User Name field.
3.
If you select SSL or TLS as the Access method, the wizard will ask you to accept a security certificate. You can view the certificate
accepted by the Deep Security Manager by going to Administration > System Settings > Security and clicking "View Certificate
List..." in the Trusted Certificates area. Click Next.
4.
The second page of the New Directory wizard asks for schema details. (Leave the default values). Click Finish.
5.
The next page will tell you if there were any errors. Click Next.
6.
The final page will let you create a Scheduled Task to regularly synchronize the Manager's Computers page with the Active
Directory. Leave option this cleared for now. Click Close.
The directory structure now appears under Computers in the navigation panel.
72
Remove Directory
2.
Synchronize Now
Remove Directory
When you remove a directory from the Deep Security Manager, you have the following options:
Remove directory and all subordinate computers/groups from DSM: removes all traces of the directory.
Remove directory, but retain computer data and computer group hierarchy: turns the imported directory structure into
identically organized regular computer groups, no longer linked with the Active Directory server.
Remove directory, retain computer data, but flatten hierarchy: removes links to the Active Directory server, discards directory
structure, and places all the computers into the same computer group.
Synchronize Now
Synchronizes the directory structure in the Deep Security Manager with the Active Directory Server. (Remember that you can automate this
procedure as a Scheduled Task.)
Now that the Agents are active, they can be assigned Firewall Rules and Intrusion Prevention Rules. Although all the individual security objects
can be assigned individually to an Agent, it is convenient to group common security objects into a Policy and then assign the Policy to one or
more Agents.
Note:
More information is available for each page in the Deep Security Manager by clicking the Help button in the menu bar.
Note:
An Agent can be configured to automatically initiate its own activation upon installation. For details, see Command-Line Utilities
in the Reference section of the online help.
To manually activate an Agent on a computer, right-click one or more selected computers and select Actions > Activate/Reactivate.
2.
3.
4.
Assigning Firewall Rules (including some with location awareness) and enable Stateful Inspection
5.
6.
7.
73
Go to the Policies section, click on Policies in the navigation panel on the left to go to the Policies page.
2.
3.
Name the new Policy "My New Laptop Policy" and select Base Policy from the Inherit from: menu. Click Next.
4.
The next page asks if you would like to base the Policy on an existing computer's current configuration. If you were to select Yes,
you would be asked to pick an existing managed computer and the wizard would take all the configuration information from that
computer and create a new Policy based on it. This can be useful if, for instance, you have fine-tuned the security configuration of
an existing computer over a period of time and now wish to create a Policy based on it so that you can apply it to other functionally
identical computers. For now, select No and click Next.
5.
The last page confirms that the new Policy has been created. Select the Open Policy Details on 'Close' option and click Close.
Because you set the Open Policy Details on 'Close' option, the new Policy editor window is displayed.
2.
The laptops to which this Policy will be assigned are equipped with two network interfaces (a local area connection and a wireless
connection) and we intend to tune the security configuration to take into account which interface is being used. Click Interface
Types in the navigation panel and select the Rules can apply to specific interfaces option. Enter names for the interfaces and
strings (with optional wildcards) which the Agent will use to match to interface names on the computer: "LAN Connection" and
"Local Area Connection *", and "Wireless" and "Wireless Network Connection *" in the first two Interface Type areas. Click Save at
the bottom right of the page.
Still in the My New Laptop Policy editor, go to Settings and click on the Network Engine tab.
2.
Set the Network Engine Mode to Inline. By default, the setting should already be set to "Inherited (Inline)" since the Base policy
default mode is Inline and your new Policy inherits its settings from there.
Assigning Firewall Rules (including some with location awareness) and turn on Stateful
Inspection
To assign Firewall Rules:
1.
74
Click Firewall in the navigation panel and in the Firewall area of the General tab, select On from the Firewall State drop-down
menu.
Note:
2.
Selecting "Inherit" will cause this setting on this Policy to be inherited from its parent Policy. This setting in the parent
Policy may already be "On" but for now you will enforce the setting at the level of this Policy regardless of any parent
Policy settings. For information on Inheritance, see Policies, Inheritance and Overrides in the Reference section of
the online help.
Now we will assign some Firewall Rules and Firewall Stateful Configuration rules to this Policy. Click Assign/Unassign to display
the list of available predefined Firewall Rules. (You can create your own Firewall Rules, but for this exercise we will select from the
list of existing ones.) Select the following set of Firewall Rules to allow basic communication:
Allow Solicited ICMP replies
ARP
Wireless Authentication
Windows File Sharing (This is a force-allow rule to permit incoming Windows File Sharing traffic.)
Notice the gray down-arrow next to the Firewall Rule checkboxes. These appear if you have defined multiple interfaces in the
previous step. They allow you to specify whether the Firewall Rule will apply to all interfaces on the computer or just to interfaces
that you specify. Leave these at the default setting for now. Click the Save button.
We assigned a Firewall Rule that permitted Windows File Sharing. Windows File Sharing is a very useful feature in Windows but it has had
some security issues. It would better to restrict this ability to when the laptop is in a secure office environment and forbid it when the laptop is
out of the office. We will apply Location Awareness to the Firewall Rule when used with this Policy to implement this policy.
To implement location awareness:
1.
In the My New Laptop Policy Policy editor, go to Firewall > General > Assigned Firewall Rules, right-click the "Windows File
Sharing Firewall" Rule and select Properties.... This will display the Properties window for the Firewall Rule (but the changes we
make to it will only apply to the Firewall Rule when it is applied as part this new Policy).
2.
3.
In the Rule Context area, select New... from the drop-down list. This displays the New Context Properties window. We will create
a Rule Context that will only allow the Firewall Rule to be active when the laptop has local access to its Domain Controller. (That is,
when the laptop is in the office.)
4.
Name the new Rule Context "In the Office". In the Options area, set the Context applies when connection is: option and select
Locally Connected to Domain below it. Then click Ok.
5.
Now the Windows File Sharing Firewall Rule will only be in effect when the laptop has local access to its Windows Domain Controller. The
Windows File Sharing Firewall Rule is now displayed in bold letters in the Policy Details window. This indicates that the Firewall Rule has had
its properties edited for this Policy only.
Note:
Still in the My New Laptop Policy Policy editor window, go to Firewall > General > Firewall Stateful Configurations.
2.
For the Global (All Interfaces) setting, select Enable Stateful Inspection.
3.
75
Still in the My New Laptop Policy editor window, click Intrusion Prevention in the navigation panel.
2.
On the General tab, in the Intrusion Prevention area, set the Intrusion Prevention State to On.
Note:
Intrusion Prevention can be set to either Prevent or Detect mode when the Network Engine is operating Inline (as
opposed to Tap Mode). Detect mode is useful if you are trying out a new set of Intrusion Prevention Rules and do not
want to risk dropping traffic before you are sure the new rules are working properly. In Detect Mode, traffic that would
normally be dropped will generate events but will be allowed to pass. Set Intrusion Prevention to "On".
Note:
Note the Recommendations area. The Deep Security Agent can be instructed to run a Recommendation Scan.
(On the Manager's Computers page, right-click a computer and select Actions > Scan for Recommendations.)
The Recommendation engine will scan the computer for applications and make Intrusion Prevention Rule
recommendations based on what it finds. The results of the Recommendation Scan can be viewed in the computer
editor window by going to Intrusion Prevention > Intrusion Prevention Rules > Assign/Unassign... and selecting
Recommended for Assignment from the second drop-down filter menu.
3.
For now, leave the Recommendations > Automatically implement Intrusion Prevention Recommendations (when possible):
option set to Inherited (No).
4.
In the Assigned Intrusion Prevention rules area, click Assign/Unassign... to open the rule assignment window.
5.
Intrusion Prevention Rules are organized by Application Type. Application Types are a useful way of grouping Intrusion Prevention
Rules; they have only three properties: communication direction, protocol, and ports. For our new laptop Policy, assign the
following Application Types:
Mail Client Outlook
6.
Malware
Malware Web
Microsoft Office
Note:
Make sure the first two drop-down filter menus are showing All and that the third sorting filter menu is sorting
By Application Type. It's easier to page through the Application Types if you right-click in the Rules list and select
Collapse All. There are many Application Types (and Intrusion Prevention Rules), so you will have to have to use the
pagination controls at the bottom right of the page to find them all, or use the search feature at the top right of the
page. Select an Application Type by putting a check next to the Application Type name.
Note:
Some Intrusion Prevention Rules are dependent on others. If you assign a rule that requires another rule to also be
assigned (which has not yet been assigned) a popup window will appear letting you assign the required rule.
Note:
When assigning any kinds of Rules to a computer, do not let yourself be tempted to be "extra secure" and assign
all available rules to your computer. The Rules are designed for a variety of operating systems, applications,
vulnerabilities and may not be applicable to your computer. The traffic filtering engine would just be wasting CPU
time looking for patterns that will never appear. Be selective when securing your computers!
Click OK and then Save to assign the Application Types to the Policy.
76
1.
Still in the My New Laptop Policy editor window, click Integrity Monitoring in the navigation panel.
2.
3.
4.
5.
In the Search box at the top right of the page type the word "Windows" and press Enter. All the rules that apply to Microsoft
Windows will be displayed in the rules list. Right-click one of the rules and choose "Select All", then right-click again and choose
"Assign Rule(s)". This will assign all the rules that came up in the search result to the Policy.
Still in the My New Laptop Policy editor window, click Log Inspection in the navigation panel.
2.
3.
Set Automatically implement Log Inspection Rule Recommendations (when possible): to No.
4.
5.
Select the "1002792 - Default Rules Configuration" Rule (required for all other Log Inspection Rules to work), and the "1002795 Microsoft Windows Events" rule. (This will log events any time Windows auditing functionality registers an event on the laptop.)
6.
We are now finished editing the new Policy. You can now close the My New Policy Details window.
In the main window of the Deep Security Manager console, go to the Policies > Common Objects > Lists > IP Lists.
2.
3.
4.
Click OK.
2.
Right-click the computer to which you will assign the Policy and select Actions > Assign Policy....
3.
Choose "My New Laptop Policy" from the drop-down list in the Assign Policy dialog box.
4.
click OK
After clicking OK, the Manager will send the Policy to the Agent. The computer Status column and the Manager's status bar will display
messages that the Agent is being updated.
Once the Agent on the computer has been updated, the Status column will read "Managed (Online)".
77
2.
Type the configuration information and click the Test SMTP Settings to confirm Deep Security Manager can communicate with the
mail server.
3.
4.
In the Alert Event Forwarding (From the Manager) section, type the default email address to which you want notifications sent.
5.
Click Save.
Note:
Whether a User gets emailed Alerts can be configured on that User's Properties window (Administration > User Management
> Users). Whether a particular Alert generates emailed notifications can be configured on that Alert's Properties window.
Select the checkbox beside each of the three widgets, and click OK. The widgets will appear on the dashboard. (It may take a bit of time to
generate the data.)
Note:
78
The Firewall Computer Activity (Prevented) widget displays a list of the most common reasons for packets to be denied (that
is, blocked from reaching a computer by the Agent on that computer) along with the number of packets that were denied. Items in
this list will be either types of Packet Rejections or Firewall Rules. Each "reason" is a link to the corresponding logs for that denied
packet.
The Firewall Event History [2x1] widget displays a bar graph indicating how many packets were blocked in the last 24 hour
period or seven day period (depending on the view selected). Clicking a bar will display the corresponding logs for the period
represented by the bar.
The Firewall IP Activity (Prevented) widget displays a list of the most common source IPs of denied packets. Similar to the
Firewall Activity (Prevented) widget, each source IP is a link to the corresponding logs.
Note the trend indicators next to the numeric values in the Firewall Computer Activity (Prevented) and Firewall IP Activity
(Prevented) widgets. An upward or downward pointing triangle indicates an overall increase or decrease over the specified time
period, and a flat line indicates no significant change.
Reports
Often, a higher-level view of the log data is desired, where the information is summarized, and presented in a more easily understood format.
The Reports fill this Role, allowing you to display detailed summaries on computers, Firewall and Intrusion Prevention Event Logs, Events,
Alerts, etc. In the Reports page, you can select various options for the report to be generated.
We will generate a Firewall Report, which displays a record of Firewall Rule and Firewall Stateful Configuration activity over a configurable
date range. Select Firewall Report from the Report drop-down. Click Generate to launch the report in a new window.
By reviewing scheduled reports that have been emailed by the Deep Security Manager to Users, by logging into the system and consulting the
dashboard, by performing detailed investigations by drilling-down to specific logs, and by configuring Alerts to notify Users of critical events,
you can remain apprised of the health and status of your network.
79