Deep Security Manager 10 has reached end of support. Use the version selector (above) to see more recent versions of the Help Center.
Computer status is "Offline"
A computer status of "Offline" means that the Deep Security Manager hasn't communicated with the agent's instance for an extended period of time.
The most common reason for a computer status of "Offline" is that the ports for outbound communication are being blocked in the agent's environment. Depending on what kind of instance your agents are running on, this can be caused by a network firewall or by a Security Group or policy setting in AWS, Azure VM or VMware.
You will need to test if the agent can communicate with the Deep Security Manager over outbound ports, and if any of the outbound ports are blocked, allow the required outbound ports on the agent's instance.
A computer status of "offline" can also happen when the agent is installed on a workstation or other computer that has been shut down. If you are using Deep Security to protect computers that sometimes get shut down, make sure the policy assigned to those computers does not raise an alert when there is a missed heartbeat. In the policy editor, go to Settings > General > Number of Heartbeats that can be missed before an alert is raised and change the setting to "Unlimited".
Test outbound ports
Depending on what flavor of Deep Security you are using, the following outbound ports must be open for your agent to communicate with the Deep Security Manager:
443 | 4120 | |
Deep Security on-premise | ✔ | |
Deep Security AMI from AWS Marketplace | ✔ | ✔ |
To test if the agent can communicate with the Deep Security Manager over the required outbound port(s), follow the procedure for your Deep Security flavor below:
- Log in to the agent computer.
- Open a command prompt.
-
Enter the command(s) for your Deep Security flavor:
-
Deep Security on-premise
telnet [Deep Security Manager IP]:4120
-
Deep Security AMI from Marketplace
telnet [Deep Security Manager IP]:443
telnet [Deep Security Manager IP]:4120
-
Allow required outbound ports on the agent computer
If the outbound port test shows that any of the required outbound ports are blocked, follow the procedure for allowing outbound ports on the instance type your agent is running on below:
AWS EC2 instance
If the agent is running on an AWS EC2 instance, see Amazon's documentation on Amazon EC2 Security Groups for Linux Instances or Amazon EC2 Security Groups for Windows Instances.
Azure VM instance
If the agent is on an Azure VM instance, see Microsoft's Azure documentation on modifying a Network Security Group to allow the required outbound port(s).
Local instance
If the agent is on a Windows instance, you may need to configure Windows Firewall or third-party firewall software to allow the necessary outbound port(s). If your agent is on a Linux instance, you may need to configure iptables to allow the necessary outbound port(s).