Users
"Users" refers to all Vulnerability ProtectionDeep Security Manager account holders. Use this section to create, modify, and delete User accounts. From the Users page, you can:
- Create New User accounts (
)
- Examine or modify the Properties of an existing User account (
)
- Set (or change) the Password for a User account (
)
- Delete a User account (
)
- Search (
) for a particular User
- Synchronize (
) with a Directory list of Users
- View System Events (
) associated with this User
- Set or change the Role (
) for this User
Clicking New (
) or Properties (
) displays the User Properties window.
General
General Information
- Username: The username associated with this User's password.
- Name: The name of the account holder.
- Description: a description of the account holder.
- Role: Use the drop-down list to assign a pre-defined Role to this User. (Assigning Roles can also be done using the right-click menu when in List View mode.)
The Vulnerability ProtectionDeep Security Manager comes pre-configured with two Roles: Full Access and Auditor. The "Full Access" Role grants the User all possible privileges in terms of managing the Vulnerability ProtectionDeep Security system such as creating, editing and deleting computers, computer groups, Policies, Rules, etc. The "Auditor" Role gives the User the ability to view all the information in the Vulnerability ProtectionDeep Security system but not the ability to make any modifications except to his personal settings
(password, contact information, view preferences, etc.) Roles with various levels of system access rights can be created and modified in the Roles page or by selecting "New..." in the Roles drop-down list.
- Language: The language that will be used in the interface when this User logs in.
- Time zone: Time zone where the user is located. This time zone is used when displaying dates and times in the Deep Security Manager.
- Time format: Time format used to display time in the Deep Security Manager. You can use 12-hour or 24-hour format.
Sign-In Credentials
- Set password: Click this button to change your password. You will be prompted for your old password and new password.
- Password never expires: When this option is selected, the user's password will never expire.
- Locked Out (Denied permission to sign in): Checking this will keep this User from being able to sign in to the Manager. (If a User enters the wrong password too many times when trying to sign in, he will be locked out automatically. Clear this if you have resolved this situation.) (Locking or unlocking a User can also be done from the right-click menu when in List View Mode.)
Multi-Factor Authentication (MFA)
To enable multi-factor authentication (MFA), click Enable MFA. If MFA is already enabled for this user, you can select Disable MFA to disable it. For details, see Multi-Factor Authentication (MFA).
Contact Information
This User's contact information. Checking the Receive Notifications checkbox will include this User in the list of Users who receive email notifications when Alerts are triggered.
Settings
Module
- Hide Unlicensed Modules: determines whether unlicensed modules will be hidden rather than simply grayed out for this User. (This option can be set globally on the Administration > System Settings > Advanced tab)
Refresh Rate
List Views
- Remember last Tag filter on each page: Events pages let you filter displayed events by Tag(s). This List Views setting determines if the "Tag" filter setting is retained when you navigate away from and return to an Events page.
- Remember last Time filter on each page: Events pages let you filter displayed events by Time period and computer(s). These List Views settings determine if the "Period" and "Computer" filter settings are retained when you navigate away from and return to an Events page.
- Remember last computer filter on each page: Events pages let you filter displayed events by Time period and computer(s). These List Views settings determine if the "Period" and "Computer" filter settings are retained when you navigate away from and return to an Events page.
- Remember last Advanced Search on each page: If you have performed an "Advanced Search" on an Events page, this setting will determine if the search results are kept if you navigate away from and return to the page.
- Optimal number of items to show on a single page: Screens that display lists of items will display a certain number of items per "Page". To view the next page, you must use the pagination controls. Use this setting to change the number of list-items displayed per page.
- Maximum number of items to show on a single page: Many lists on the Vulnerability ProtectionDeep Security Manager are grouped into categories. For example, Intrusion Prevention Rules can be grouped according to Application Type. The Vulnerability ProtectionDeep Security Manager will try to avoid splitting these groups when paginating and can override the "Optimal" setting (above) to keep items in the same group together. Use this setting to set a firm maximum on the number of items to display per page. If the
number of items in a group exceeds this number, the group will be split and the group title will display information that this has been done.
- Maximum number of items to retrieve from database: This setting limits the number of items that can retrieved from the database for display. This prevents the possibility of the Vulnerability ProtectionDeep Security Manager getting bogged down trying to display an excessive number of results from a database query. If a query produces more than this many results, a message will appear at the top of the display informing you that only a portion of the results are being displayed.
Increasing these values will affect Vulnerability ProtectionDeep Security Manager performance.
Reports
- Enable PDF Encryption: Determines if Reports exported in PDF format are password protected.
Reset to Default Settings: Reset all settings on this page to their defaults.
Synchronizing with a Directory
The User list can be synchronized with an Active Directory, allowing Users to sign in with the password stored in the directory. Clicking Synchronize with Directory in the toolbar will display the Synchronize with Directory wizard. Type the name of the directory server and your access credentials. You will then be prompted to select which Active Directory Group of Users to import and whether they will be Users or Contacts. Once they've been imported, you are
given the option to create a Scheduled Task to periodically synchronize with the directory to keep your list up to date. The imported list of Users are locked out of the Vulnerability ProtectionDeep Security Manager by default. You will have to modify their Properties to allow them to sign in to the Manager.
To successfully import an Active Directory user account into Vulnerability ProtectionDeep Security as a Vulnerability ProtectionDeep Security User or Contact, the Active Directory user account must have a userPrincipalName attribute value. (The userPrincipalName attribute corresponds to an Active Directory account holder's "User logon name".)
If you delete a User from Vulnerability ProtectionDeep Security Manager who was added as a result of synchronizing with an Active Directory and then re-synchronize with the directory, the User will reappear in your User list (if they are still in the Active Directory).
Filtering the Active Directory
The first page of the Synchronize with Directory wizard has an area called Search Options where you can write filters to specify a subset of Users to import into the Vulnerability ProtectionDeep Security Manager. The filter language follows the Internet Engineering Task Force "Lightweight Directory Access Protocol (LDAP): String Representation of Search Filters RFC 4515".
The default filter, "(objectClass=group)", imports all Users.
The RFC 4515 filter syntax can be used to filter for specific Users and/or Groups in a directory. For example, the following filter would import only Users who are members of an Active Directory group called "DeepSecurityUsers": "(&(objectClass=group)(cn=DeepSecurityUsers))".
The RFC 4515 definition is available at http://datatracker.ietf.org/doc/rfc4515/.
The new Users, although being in the "locked out" state, are given the "Full Access" User Role.