dsa_control [-a <str>] [-b] [-c <str>] [-d] [-g <str>] [-s <num>] [-m] [-p <str>] [-r] [-R <str>] [-t <num>] [--buildBaseline] [--scanForChanges] [Additional keyword:value data to send to Manager during activation/heartbeat...]
An Agent installed on a computer needs to be activated before the Manager can assign Rules and Policies to protect the computer. The activation process includes the exchange of unique fingerprints between the Agent and the Manager. This ensures that only one Vulnerability ProtectionDeep Security Manager (or one of its Manager Nodes) can send instructions to and communicate with the Agent.
You can manually activate an Agent from the Vulnerability ProtectionDeep Security Manager by right-clicking on the computer in the Computers screen and selecting Actions > Activate/Reactivate.
Vulnerability ProtectionDeep Security Agents can initiate the activation process using a locally-run command-line tool. This is useful when a large number of computers will be added to a Vulnerability ProtectionDeep Security installation and you want to write a script to automate the activation process.
The minimum activation instruction contains the activation command and the Manager's URL (including the port number):
dsa_control -a dsm://[managerurl]:[port]/
where:
The Manager URL is the only required parameter for the activation command. Additional parameters are also available (see the table of available parameters below). They must be entered as key:value pairs (with a colon as a separator). There is no limit to the number of key:value pairs you can enter but the key:value pairs must be separated from each other by a space. For example:
dsa_control -a dsm://sec-op-john-doe-3:4120/ hostname:ABCwebserver12 "description:Long Description With Spaces"
(Quotation marks are only required if your value includes spaces or special characters.)
Agents on a private network can perform agent-initiated communication with a Vulnerability ProtectionDeep Security Manager through a proxy server.
To allow Agent-Initiated Activation over a private network via proxy:
Use the following command-line options to instruct the Agent to communicate with the Vulnerability ProtectionDeep Security Manager through a proxy server:
| Syntax | Notes |
|---|---|
dsa_control -x "dsm_proxy://<proxyURL>/" |
Sets the address of the proxy server which the Agent uses to communicate with the Manager. |
dsa_control -x "" |
Clears the proxy server address. |
dsa_control -u "<username:password>" |
Sets the proxy username and password. |
dsa_control -u "" |
Clears the proxy username and password. |
| Examples | |
dsa_control -x "dsm_proxy://172.21.3.184:808/" |
Proxy uses IPv4. |
dsa_control -x "dsm_proxy://winsrv2k3-0:808/" |
Proxy uses hostname. |
dsa_control -x "dsm_proxy://[fe80::340a:7671:64e7:14cc]:808/" |
Proxy uses IPv6. |
dsa_control -u "root:Passw0rd!" |
Proxy authentication is "root" and password is "Passw0rd!" (basic authentication only, digest and NTLM are not supported). |
When used in the context of Agent-initiated activation, the proxy commands must be issued first, followed by the Agent-initiated activation commands. The following example shows a complete sequence for setting a proxy address, setting proxy credentials, and activating the Agent:
dsa_control -x "dsm_proxy://172.21.3.184:808/"
dsa_control -u "root:Passw0rd!"
dsa_control -a "dsm://seg-dsm-1:4120/"
Required Setting in Vulnerability ProtectionDeep Security Manager
The Agent-Initiated heartbeat command will instruct the Agent to perform an immediate heartbeat operation to the Vulnerability ProtectionDeep Security Manager. Although this may be useful on its own, like the activation command above, the heartbeat command can be used to pass along a further set of parameters to the Vulnerability ProtectionDeep Security Manager.
The following table lists the parameters that are available to the activation and heartbeat commands. Note that some parameters can only be used with either the activation or heartbeat exclusively.
| Key | Description | Examples | Can be performed during Activation | Can be performed after activation during Heartbeat | Value Format | Notes |
| description | Sets description value. | "description:Extra information about the host" | yes | yes | string | Maximum length 2000 characters. |
| displayname | Sets displayname value. (Shown in parentheses next to the hostname.) | "displayname:the_name" | yes | yes | string | Maximum length 2000 characters. |
| externalid | Sets the externalid value | "externalid:123" | yes | yes | integer | This value can used to uniquely identify an Agent. The value can be accessed using the SOAP Web Service API. |
| group | Sets the computers page Group the computer belongs in. | "group:Zone A/Webservers" | yes | yes | string | Maximum length 254 characters per group name per hierarchy level. The forward slash ("/") indicates a group hierarchy. The group parameter can read or create a hierarchy of groups. This parameter can only be used to add computers to standard groups under the main "Computers" root branch. It cannot be used to add computers to groups belonging to Directories (MS Active Directory), VMware vCenters, or Cloud Provider accounts. |
| groupid | "groupid:33" | yes | yes | integer | ||
| hostname | "hostname:ABWebServer1" | yes | no | string | Maximum length 254 characters. The hostname can specify an IP address, hostname or FQDN that is best used to contact the computer in the Computers list in Vulnerability ProtectionDeep Security Manager. |
|
| policy | "policy:Policy Name" |
yes | yes | string | Maximum length 254 characters. The Policy name is a case-insensitive match to the Policy list. If the Policy is not found, no Policy will be assigned. A policy assigned by an Event-based Task will override a Policy assigned during Agent-Initiated Activation. |
|
| policyid | "policyid:12" | yes | yes | integer | ||
| relaygroup | Links the computer to a specific Relay Group. | "relaygroup:Custom Relay Group" |
yes | yes | string | Maximum length 254 characters. The Relay Group name is a case-insensitive match to existing Relay Group names. If the Relay Group is not found the Default Relay Group will be used. This does not affect Relay Groups assigned during Event-based tasks. Use either this option or Event-based tasks, not both. |
| relaygroupid | "relaygroupid:123" | yes | yes | integer | ||
| relayid | "relayid:123" | yes | yes | integer | ||
| tenantID and tenantPassword | "tenantID:12651ADC-D4D5" and "tenantPassword:8601626D-56EE" |
yes | yes | string | If using Agent-Initiated Activation as a Tenant, both tenantID and tenantPassword are required. The tenantID and tenantPassword can be obtained from the deployment script generation tool. |
|
| RecommendationScan | Initiate a Recommendation Scan on the computer. | "RecommendationScan:true" | no | yes | boolean | |
| UpdateComponent | Instructs the Vulnerability ProtectionDeep Security Manager to perform a Security Update operation. | "UpdateComponent:true" | no | yes | boolean | |
| RebuildBaseline | Rebuilds the Integrity Monitoring baseline on the computer. | "RebuildBaseline:true" | no | yes | boolean | |
| UpdateConfiguration | Instructs the Vulnerability ProtectionDeep Security Manager to perform a "Send Policy" operation. | "UpdateConfiguration:true" | no | yes | boolean | |
| AntiMalwareManualScan | Initiates an Anti-Malware Manual Scan on the computer. | "AntiMalwareManualScan:true" | no | yes | boolean | |
| AntiMalwareCancelManualScan | Cancels an Anti-Malware Manual Scan currently underway on the computer. | "AntiMalwareCancelManualScan:true" | no | yes | boolean | |
| IntegrityScan | Initiates an Integrity Scan on the computer. | "IntegrityScan:true" | no | yes | boolean | |
| RebuildBaseline | Rebuilds the Integrity Monitoring baseline on the computer. | "RebuildBaseline:true" | no | yes | boolean |
The dsa_query tool provides the following information:
dsa_query [-c <str>] [-p <str>] [-r <str]
pattern: wildchar pattern to filter result, optional.
Example:
dsa_query -c "GetComponentInfo" -r "au" "AM*"
dsm_cvp_c -action actionname
| Action Name | Description | Usage |
|---|---|---|
| changesetting | Change a setting | dsm_cvp_c -action changesetting -name NAME -value VALUE [-computerid COMPUTERID] [-computername COMPUTERNAME] [-policyid POLICYID] [-policyname POLICYNAME] [-tenantname TENANTNAME] |
| viewsetting | View a setting value | dsm_cvp_c -action viewsetting -name NAME [-computerid COMPUTERID] [-computername COMPUTERNAME] [-policyid POLICYID] [-policyname POLICYNAME] [-tenantname TENANTNAME] |
| createinsertstatements | Create insert statements (for export to a different database) | dsm_cvp_c -action createinsertstatements [-file FILEPATH] [-generateDDL] [-databaseType sqlserver|oracle] [-maxresultfromdb count] [-tenantname TENANTNAME] |
| diagnostic | Create a diagnostic package for the system | dsm_cvp_c -action diagnostic |
| fullaccess | Give an administrator the full access role | dsm_cvp_c -action fullaccess -username USERNAME [-tenantname TENANTNAME] |
| reindexhelp | Reindex help system | dsm_cvp_c -action reindexhelp |
| resetcounters | Reset counter tables (resets back to an empty state | dsm_cvp_c -action resetcounters [-tenantname TENANTNAME] |
| resetevents | Reset the events tables (resets back to an empty state) | dsm_cvp_c -action resetevents -type all|am|wrs|fw|dpi|im|li [-tenantname TENANTNAME] |
| setports | Set Vulnerability ProtectionDeep Security Manager port(s) | dsm_cvp_c -action setports [-managerPort port] [-heartbeatPort port] |
| trustdirectorycert | Trust the certificate of a directory | dsm_cvp_c -action trustdirectorycert -directoryaddress DIRECTORYADDRESS -directoryport DIRECTORYPORT [-username USERNAME] [-password PASSWORD] [-tenantname TENANTNAME] |
| unlockout | Unlock a User account | dsm_cvp_c -action unlockout -username USERNAME [-newpassword NEWPASSWORD] [-disablemfa] [-tenantname TENANTNAME] |
| addregion | Add a private cloud provider region | dsm_cvp_c -action addregion -region REGION -display DISPLAY -endpoint ENDPOINT |
| listregions | List private cloud provider regions | dsm_cvp_c -action listregions |
| removeregion | Remove a private cloud provider region | dsm_cvp_c -action removeregion -region REGION |
| addcert | Add a trusted certificate | dsm_cvp_c -action addcert -purpose PURPOSE -cert CERT |
| listcerts | List trusted certificates | dsm_cvp_c -action listcerts [-purpose PURPOSE] |
| removecert | Remove a trusted certificate | dsm_cvp_c -action removecert -id ID |