Communication between the Vulnerability ProtectionDeep Security Manager and the database is not encrypted by default. This is for performance reasons and because the channel between the Manager and the database may already be secure (either they are running on the same computer or they are connected by crossover cable, a private network segment, or tunneling via IPSec).
However, if the communication channel between the Vulnerability ProtectionDeep Security Manager and the database is not secure, you should encrypt the communications between them. Do this by editing the
dsm.properties
file located in
\Vulnerability ProtectionDeep Security Manager\webclient\webapps\ROOT\WEB-INF\
To encrypt communication between the Deep Security Manager and a Microsoft SQL Server database:
# service dsm_s stop /opt/dsm/webclient/webapps/ROOT/WEB-INF/dsm.properties to
add the following line: database.SqlServer.ssl=require /opt/dsm, create a file named dsm_s.vmoptions that contains the following line: -Djsse.enableCBCProtection=false 

# service dsm_s start For additional information, see Enable Encrypted Connections to the Database Engine on the Microsoft MSDN site.
To encrypt communication between the Vulnerability ProtectionDeep Security Manager and a Microsoft SQL Server database:
\Program Files\Trend Micro\Vulnerability ProtectionDeep Security Manager\webclient\webapps\ROOT\WEB-INF\dsm.properties to
add the following line: database.SqlServer.ssl=require \Program Files\Trend Micro\Vulnerability ProtectionDeep Security Manager, create a file named Vulnerability ProtectionDeep Security Manager.vmoptions that contains the following line: -Djsse.enableCBCProtection=false

For additional information, see Enable Encrypted Connections to the Database Engine on the Microsoft MSDN site.
To encrypt communication between the Vulnerability ProtectionDeep Security Manager and an Oracle database:
dsm.properties (example): database.Oracle.oracle.net.encryption_types_client=(AES256) database.Oracle.oracle.net.encryption_client=REQUIRED database.Oracle.oracle.net.crypto_checksum_types_client=(SHA1) database.Oracle.oracle.net.crypto_checksum_client=REQUIRED (All parameters prefixed with database.Oracle. will be passed to the Oracle driver.)
Possible values for the
encryption_types_client
are:
Possible values for
crypto_checksum_types_client
are:
For additional options consult: http://docs.oracle.com/cd/B28359_01/java.111/b31224/clntsec.htm
Encryption should be enabled if you are using an Agent to protect the database. When you perform a Security Update, the Vulnerability ProtectionDeep Security Manager stores new Intrusion Prevention Rules in the database. The rule names themselves will almost certainly generate false positives as they get parsed by the Agent if the data is not encrypted.