Command-Line Utilities

Deep Security Agent

Vulnerability Protection Agent

dsa_control

Usage

dsa_control [-a <str>] [-b] [-c <str>] [-d] [-g <str>] [-s <num>] [-m] [-p <str>] [-r] [-R <str>] [-t <num>] [--buildBaseline] [--scanForChanges] [Additional keyword:value data to send to Manager during activation/heartbeat...]

Agent-Initiated Activation ("dsa_control -a")

An Agent installed on a computer needs to be activated before the Manager can assign Rules and Policies to protect the computer. The activation process includes the exchange of unique fingerprints between the Agent and the Manager. This ensures that only one Vulnerability ProtectionDeep Security Manager (or one of its Manager Nodes) can send instructions to and communicate with the Agent.

You can manually activate an Agent from the Vulnerability ProtectionDeep Security Manager by right-clicking on the computer in the Computers screen and selecting Actions > Activate/Reactivate.

Vulnerability ProtectionDeep Security Agents can initiate the activation process using a locally-run command-line tool. This is useful when a large number of computers will be added to a Vulnerability ProtectionDeep Security installation and you want to write a script to automate the activation process.

For Agent-Initiated Activation to work, the Allow Agent-Initiated Activation option must be enabled on the Administration > System Settings > Agents tab.

The minimum activation instruction contains the activation command and the Manager's URL (including the port number):

dsa_control -a dsm://[managerurl]:[port]/

where:

The Manager URL is the only required parameter for the activation command. Additional parameters are also available (see the table of available parameters below). They must be entered as key:value pairs (with a colon as a separator). There is no limit to the number of key:value pairs you can enter but the key:value pairs must be separated from each other by a space. For example:

dsa_control -a dsm://sec-op-john-doe-3:4120/ hostname:ABCwebserver12 "description:Long Description With Spaces"

(Quotation marks are only required if your value includes spaces or special characters.)

Agent-Initiated Activation Over a Private Network Via Proxy

Agents on a private network can perform agent-initiated communication with a Vulnerability ProtectionDeep Security Manager through a proxy server.

To allow Agent-Initiated Activation over a private network via proxy:

  1. In the Vulnerability ProtectionDeep Security Manager, go to Administration > System Settings > Agents page.
  2. In the Agent-Initiated Activation area:
    • Select Allow Agent-Initiated Activation.
    • Select Allow Agent to specify hostname.
    • In the If a computer with the same name exists list, select "Activate a new Computer with the same name".
  3. Click Save.

Use the following command-line options to instruct the Agent to communicate with the Vulnerability ProtectionDeep Security Manager through a proxy server:

Syntax Notes
dsa_control -x "dsm_proxy://<proxyURL>/" Sets the address of the proxy server which the Agent uses to communicate with the Manager.
dsa_control -x "" Clears the proxy server address.
dsa_control -u "<username:password>" Sets the proxy username and password.
dsa_control -u "" Clears the proxy username and password.
Examples
dsa_control -x "dsm_proxy://172.21.3.184:808/" Proxy uses IPv4.
dsa_control -x "dsm_proxy://winsrv2k3-0:808/" Proxy uses hostname.
dsa_control -x "dsm_proxy://[fe80::340a:7671:64e7:14cc]:808/" Proxy uses IPv6.
dsa_control -u "root:Passw0rd!" Proxy authentication is "root" and password is "Passw0rd!" (basic authentication only, digest and NTLM are not supported).

When used in the context of Agent-initiated activation, the proxy commands must be issued first, followed by the Agent-initiated activation commands. The following example shows a complete sequence for setting a proxy address, setting proxy credentials, and activating the Agent:

dsa_control -x "dsm_proxy://172.21.3.184:808/"
dsa_control -u "root:Passw0rd!"
dsa_control -a "dsm://seg-dsm-1:4120/"
Required Setting in Vulnerability ProtectionDeep Security Manager

Agent-Initiated Heartbeat command ("dsa_control -m")

The Agent-Initiated heartbeat command will instruct the Agent to perform an immediate heartbeat operation to the Vulnerability ProtectionDeep Security Manager. Although this may be useful on its own, like the activation command above, the heartbeat command can be used to pass along a further set of parameters to the Vulnerability ProtectionDeep Security Manager.

The following table lists the parameters that are available to the activation and heartbeat commands. Note that some parameters can only be used with either the activation or heartbeat exclusively.

Key Description Examples Can be performed during Activation Can be performed after activation during Heartbeat Value Format Notes
description Sets description value. "description:Extra information about the host" yes yes string Maximum length 2000 characters.
displayname Sets displayname value. (Shown in parentheses next to the hostname.) "displayname:the_name" yes yes string Maximum length 2000 characters.
externalid Sets the externalid value "externalid:123" yes yes integer This value can used to uniquely identify an Agent. The value can be accessed using the SOAP Web Service API.
group Sets the computers page Group the computer belongs in. "group:Zone A/Webservers" yes yes string Maximum length 254 characters per group name per hierarchy level.

The forward slash ("/") indicates a group hierarchy. The group parameter can read or create a hierarchy of groups.
This parameter can only be used to add computers to standard groups under the main "Computers" root branch. It cannot be used to add computers to groups belonging to Directories (MS Active Directory), VMware vCenters, or Cloud Provider accounts.
groupid "groupid:33" yes yes integer
hostname "hostname:ABWebServer1" yes no string Maximum length 254 characters.

The hostname can specify an IP address, hostname or FQDN that is best used to contact the computer in the Computers list in Vulnerability ProtectionDeep Security Manager.
policy "policy:Policy Name"
yes yes string Maximum length 254 characters.

The Policy name is a case-insensitive match to the Policy list. If the Policy is not found, no Policy will be assigned.

A policy assigned by an Event-based Task will override a Policy assigned during Agent-Initiated Activation.
policyid "policyid:12" yes yes integer
relaygroup Links the computer to a specific Relay Group. "relaygroup:Custom Relay Group"
yes yes string Maximum length 254 characters.

The Relay Group name is a case-insensitive match to existing Relay Group names. If the Relay Group is not found the Default Relay Group will be used.

This does not affect Relay Groups assigned during Event-based tasks. Use either this option or Event-based tasks, not both.
relaygroupid "relaygroupid:123" yes yes integer
relayid "relayid:123" yes yes integer
tenantID and tenantPassword "tenantID:12651ADC-D4D5"

and

"tenantPassword:8601626D-56EE"
yes yes string If using Agent-Initiated Activation as a Tenant, both tenantID and tenantPassword are required. The tenantID and tenantPassword can be obtained from the deployment script generation tool.
RecommendationScan Initiate a Recommendation Scan on the computer. "RecommendationScan:true" no yes boolean
UpdateComponent Instructs the Vulnerability ProtectionDeep Security Manager to perform a Security Update operation. "UpdateComponent:true" no yes boolean
RebuildBaseline Rebuilds the Integrity Monitoring baseline on the computer. "RebuildBaseline:true" no yes boolean
UpdateConfiguration Instructs the Vulnerability ProtectionDeep Security Manager to perform a "Send Policy" operation. "UpdateConfiguration:true" no yes boolean
AntiMalwareManualScan Initiates an Anti-Malware Manual Scan on the computer. "AntiMalwareManualScan:true" no yes boolean
AntiMalwareCancelManualScan Cancels an Anti-Malware Manual Scan currently underway on the computer. "AntiMalwareCancelManualScan:true" no yes boolean
IntegrityScan Initiates an Integrity Scan on the computer. "IntegrityScan:true" no yes boolean
RebuildBaseline Rebuilds the Integrity Monitoring baseline on the computer. "RebuildBaseline:true" no yes boolean

dsa_query

The dsa_query tool provides the following information:

Usage

dsa_query [-c <str>] [-p <str>] [-r <str]

pattern: wildchar pattern to filter result, optional.

Example:
dsa_query -c "GetComponentInfo" -r "au" "AM*"

Deep Security Manager

Vulnerability Protection Manager

dsm_cvp_c

Usage

dsm_cvp_c -action actionname

Action Name Description Usage
changesetting Change a setting dsm_cvp_c -action changesetting -name NAME -value VALUE [-computerid COMPUTERID] [-computername COMPUTERNAME] [-policyid POLICYID] [-policyname POLICYNAME] [-tenantname TENANTNAME]
viewsetting View a setting value dsm_cvp_c -action viewsetting -name NAME [-computerid COMPUTERID] [-computername COMPUTERNAME] [-policyid POLICYID] [-policyname POLICYNAME] [-tenantname TENANTNAME]
createinsertstatements Create insert statements (for export to a different database) dsm_cvp_c -action createinsertstatements [-file FILEPATH] [-generateDDL] [-databaseType sqlserver|oracle] [-maxresultfromdb count] [-tenantname TENANTNAME]
diagnostic Create a diagnostic package for the system dsm_cvp_c -action diagnostic
fullaccess Give an administrator the full access role dsm_cvp_c -action fullaccess -username USERNAME [-tenantname TENANTNAME]
reindexhelp Reindex help system dsm_cvp_c -action reindexhelp
resetcounters Reset counter tables (resets back to an empty state dsm_cvp_c -action resetcounters [-tenantname TENANTNAME]
resetevents Reset the events tables (resets back to an empty state) dsm_cvp_c -action resetevents -type all|am|wrs|fw|dpi|im|li [-tenantname TENANTNAME]
setports Set Vulnerability ProtectionDeep Security Manager port(s) dsm_cvp_c -action setports [-managerPort port] [-heartbeatPort port]
trustdirectorycert Trust the certificate of a directory dsm_cvp_c -action trustdirectorycert -directoryaddress DIRECTORYADDRESS -directoryport DIRECTORYPORT [-username USERNAME] [-password PASSWORD] [-tenantname TENANTNAME]
unlockout Unlock a User account dsm_cvp_c -action unlockout -username USERNAME [-newpassword NEWPASSWORD] [-disablemfa] [-tenantname TENANTNAME]
addregion Add a private cloud provider region dsm_cvp_c -action addregion -region REGION -display DISPLAY -endpoint ENDPOINT
listregions List private cloud provider regions dsm_cvp_c -action listregions
removeregion Remove a private cloud provider region dsm_cvp_c -action removeregion -region REGION
addcert Add a trusted certificate dsm_cvp_c -action addcert -purpose PURPOSE -cert CERT
listcerts List trusted certificates dsm_cvp_c -action listcerts [-purpose PURPOSE]
removecert Remove a trusted certificate dsm_cvp_c -action removecert -id ID