Update the "Hostname" entry if an IP is used as a hostname and a change in IP is detected on the computer after Agent/Appliance-initiated communication or discovery: Updates the IP address displayed in the computer's "Hostname" property field if an IP change is detected. (Vulnerability ProtectionDeep Security Manager always identifies computers by using a unique fingerprint, not their IP addresses or hostnames.)
Update the "Hostname" entry if an IP not is used as a hostname and a change in hostname is detected on the computer after Agent/Appliance-initiated communication or discovery: Updates the hostname displayed in the computer's "Hostname" property field if a hostname change is detected. (Vulnerability ProtectionDeep Security Manager always identifies computers by using a unique fingerprint, not their IP addresses or hostnames.)
The standard method of installing and activating an Agent on a computer is to install the Agent on a computer and then to use the Vulnerability ProtectionDeep Security Manager to "activate the Agent". This activation sends a unique encrypted fingerprint from the Manager to the Agent and the Agent will now refuse any instructions that are not identified as coming from the Manager by that fingerprint.
There may be circumstances, however, where it is desirable for the activation to be initiated by the Agent rather than by the Manager. (Large, distributed installations, for example.) In this case the Manager must be configured to allow Agents to communicate with it and initiate activation. Use the Agent-Initiated Activation panel to set restrictions on which computers can initiate their own Agent activations.
Agent-initiated activation is performed from the command-line. The following are the Agent's activation-related command-line options:
Usage: dsa_control [-a <str>] [-g <str>] [-c <str>] [-r] |
Notes | |
-a <str> |
Activate Agent with Manager at specified URL. URL format must be "dsm://hostOrIp:port/" | "port" is the Manager's Heartbeat port. (4120 by default.) |
-g <str> |
Agent URL. Defaults to "https://127.0.0.1:4118/" | |
-c <str> |
Certificate file. Default is "ds_agent.crt". | dsa_control will use the correct certificate automatically. There is no need to use this option unless you have multiple Agents installed in different directories, or you are trying to control an Agent on another computer. |
-r |
Reset Agent configuration | |
If you allow Agent-Initiated Activated Activation, there are several further options you can configure:
Specify on which computers you will allow Agent-Initiated Activation:
Policy to assign (if Policy not assigned by activation script): The security Policy to assign to the computer if no Policy has been specified in the activation script.
If a computer with the same name already exists: If an computer with the same hostname is already listed on the Computers page the Vulnerability ProtectionDeep Security Manager can take the following actions:
Allow reactivation of cloned VMs: When a new VM clone which is running an already activated Vulnerability ProtectionDeep Security Agent sends a heartbeat to the Vulnerability ProtectionDeep Security Manager, the Vulnerability ProtectionDeep Security Manager will recognize it as a clone and reactivate it as a new computer. No Policies or Rules that may have been in place on the original VM will be assigned to the new VM. It will be just a like a newly activated computer.
Allow reactivation of unknown VMs: This setting allows previously activated VMs which have been removed from their cloud environment and deleted from the Vulnerability ProtectionDeep Security Manager to be reactivated if they are added back to the inventory of VMs. Vulnerability ProtectionDeep Security Manager will recognize a valid certificate on VM and allow it to be reactivated. No Policies or Rules that may have been in place on the original VM will be assigned to the new VM. It will be just a like a newly activated computer.
Agent activation secret: When a value is specified here, the same value must be provided when Agents activate themselves in the Deep Security Manager. You can provide this Agent activation secret in the tenantPassword parameter in the Agent activation script. For example, the script for Agent-Initiated Activation on a Linux machine might look like this:
/opt/ds_agent/dsa_control -a dsm://172.31.2.247:4120/ "tenantPassword:secret"
Allow packet data capture on encrypted traffic (SSL): The Intrusion Prevention module allows you to record the packet data that triggers Intrusion Prevention Rules. This setting lets you turn on data capture when Intrusion Prevention rules are being applied to encrypted traffic.
Allow Appliance protection of vCloud VMs: Allow virtual machines in a vCloud environment to be protected by a Vulnerability ProtectionDeep Security Virtual Appliance and let the security of those virtual machines be managed by Tenants in a Multi-Tenancy Vulnerability ProtectionDeep Security environment.