Computer

Communication Direction

Agents/Appliances look for the Vulnerability ProtectionDeep Security Manager on the network by the Manager's hostname. Therefore the Manager's hostname must be in your local DNS for Agent/Appliance initiated or bidirectional communication to work.
To enable communications between the Manager and the Agents/Appliances, the Manager automatically implements a (hidden) Firewall Rule (priority four, Bypass) which opens port 4118 on the Agents/Appliances to incoming TCP/IP traffic. The default settings open the port to any IP address and any MAC address. You can restrict incoming traffic on this port by creating a new priority 4, Force Allow or Bypass Firewall Rule, which only allows incoming TCP/IP traffic from specific IP and/or MAC addresses. This new Firewall Rule will replace the hidden Firewall Rule if the settings match the following:

action: force allow or bypass
priority: 4 - highest
packet's direction: incoming
frame type: IP
protocol: TCP
packet's destination port: 4118 (or a list or range that includes 4118)

As long as these settings are in effect, the new rule will replace the hidden rule. You can then type Packet Source information for IP and/or MAC addresses to restrict traffic to the computer.

Heartbeat

Send Policy Changes Immediately

By default, the value for the Automatically send Policy changes to computers setting is "Yes". This means that any changes to a security policy are automatically applied to the computers that use the policy. If you change this setting to "No", you will need find affected computers on the Computers page, right-click them, and choose "Send Policy" from the context menu.

Troubleshooting

You can increase the granularity of the logging level and record more events for troubleshooting purposes, however you should exercise caution when using this option since this can significantly increase the total size of your Event logs.

Choose whether to inherit the logging override settings from the policy assigned to this computer ("Inherited"), to not override logging settings ("Do Not Override"), to log all triggered Firewall Rules ("Full Firewall Event Logging"), to log all triggered Intrusion Prevention Rules ("Full Intrusion Prevention Event Logging"), or to log all triggered rules ("Full Logging").

Agent Self-Protection

The Agent Self-Protection feature is available only with Windows Agents.

Use these settings to prevent local users from interfering with Agent functionality.

Anti-Malware protection must be "On" to prevent the following:

Anti-Malware protection is not required to prevent local users from uninstalling the Agent.

To turn Agent Self-Protection off or on from the command line:

  1. Log in to the local computer as an Administrator
  2. Run a command prompt from the Agent's (or Relay's) installation directory
  3. Enter the following command (where "password" is the password set using the Local override requires password setting):
    • to turn Self-Protection off:
      dsa_control --selfprotect=0 --passwd=password
    • to turn Self-Protection on
      dsa_control --selfprotect=1 --passwd=password
    If no password was set, omit the "--passwd" parameter.
In Deep Security 9.0 and earlier, this option was --harden=<num>

Alternatively, you can use the reset parameter which will reset the Agent and disable Agent Self-Protection:

Environment Variable Overrides

Environment variables are used by the Integrity Monitoring module to represent some standard locations in the directory system of the Windows operating system. For example, the Microsoft Windows - 'Hosts' file modified Integrity Monitoring rule, which monitors changes to the Windows hosts file, looks for that file in the C:\WINDOWS\system32\drivers\etc folder. However not all Windows installations use the C:\WINDOWS\ directory, so the Integrity Monitoring rule uses the WINDIR environment variable and represents the directory this way as %WINDIR%\system32\drivers\etc.

Environment variables are used primarily by the Virtual Appliance when performing Agentless Integrity Monitoring on a virtual machine. This is because the Virtual Appliance has no way of knowing if the operating system on a particular virtual machine is using standard directory locations.

The following are the default environment variables used by the Integrity Monitoring module:

Name Value
ALLUSERSPROFILE C:\ProgramData
COMMONPROGRAMFILES C:\Program Files\Common Files
PROGRAMFILES C:\Program Files
SYSTEMDRIVE C:
SYSTEMROOT C:\Windows
WINDIR C:\Windows

To override any of these environment variables:

  1. Click the View Environment Variables... button to display the Environment Variable Overrides page.
  2. Click New in the menu bar and enter a new name/value pair (for example, WINDIR and D:\Windows) and click OK.