Tenants

The Tenants tab appears only if you have enabled Multi-Tenant mode.

Multi-Tenant Options

Database Servers

By default all Tenants will be created on the same database server Vulnerability ProtectionDeep Security Manager was installed with. In order to provide additional scalability Vulnerability ProtectionDeep Security Manager supports adding additional database servers.

For SQL Server the secondary database server requires a hostname, username and password (domain and named instance are optional). The TCP/Named Pipes setting has to be the same as the primary database (TCP is always recommended). The user (the Vulnerability ProtectionDeep Security Manager) must have the following permissions:

This account is used not only to create the database but to authenticate to the databases that are created.

Oracle Multi-Tenant uses a different model. The new database definition defines a user that is bound to a tablespace. That user is used to "bootstrap" the creation of additional users on Oracle.

For information on setting up database user accounts for multi-tenancy see Multi-Tenancy.

Database servers (other than the primary) can be deleted provided there are no Tenants located on the server.

If the hostname, username, password or any details change the GUI can be used to change for database servers (other than the primary). To change values for the primary the Vulnerability ProtectionDeep Security Manager must be shutdown (all nodes) and the dsm.properties file edited with the new details.

New Tenant Template

The Tenant Template feature provides a convenient way of creating a customized "out-of-the-box" experience for new Tenants.

The process involves:

  1. Creating a new Tenant
  2. Logging in as that Tenant
  3. Customizing the example Policies (adding/removing/modifying) and the Security Update version (applying newer versions)
  4. Return to the primary Tenant and run the Tenant template wizard
  5. Select the Tenant to snapshot

All future Tenants will have the example policies and rule update version included in the snapshot.

This feature may be useful in service provider environments where some of the examples are not applicable, or special examples need to be created.

As always the examples are meant to be a starting point. Tenants are encouraged to create policies based on their unique needs.

Creating a new template will not affect existing Tenants.

Protection Usage Monitoring

Vulnerability ProtectionDeep Security collects information about protected computers. This information is visible on the Dashboard in the Tenants widget and the Tenant Protection Activity widget. The information is also provide in the Tenant Report and is available via the REST API.

In the most basic case, the monitoring can help determine the percentage usage of Vulnerability ProtectionDeep Security Manager by hours of protection (through the report or the API). Commonly called 'viewback' or 'chargeback' this information can be used in a variety of ways. In more advanced cases this can be used for custom billing based on characteristics like Tenant computer operating systems.

Use these options determine which additional additional Tenant computer details are recorded.