Deep Security 10.1 has reached end of support. Use the version selector (above) to see more recent versions of the Help Center.
Prepare a database for Deep Security Manager on AWS
We recommend that you use the AWS Quick Start Deep Security on AWS to automatically deploy Deep Security on AWS. If you use that method, you can disregard the database preparation steps described here because the Quick Start takes care of database configuration for you. For information on the Quick Start, see Getting started with Deep Security AMI from AWS Marketplace.
If you are not using the Quick Start, you must install a database, create a database instance for Deep Security, and create a user account for Deep Security before you install Deep Security Manager. You can install your own database or you can use the Amazon RDS Management Console to create a database instance (Microsoft SQL RDS or Oracle RDS). Refer to the Amazon RDS Documentation for instructions, but keep the following considerations in mind for integration with Deep Security:
- Check the Hardware recommendations.
- Choose your database type. For a list of supported databases, see Database.
- Depending on which database you choose, see Microsoft SQL Server, Oracle Database, or PostgreSQL recommendations for database-specific considerations.
- For high availability, the Deep Security database is compatible with database failover protection so long as no alterations are made to the database schema. For example, some database replication technologies add columns to the database tables during replication which can result in critical failures. For this reason, database mirroring is recommended over database replication.
Microsoft SQL Server Express is supported only in certain limited deployments. For details, see Microsoft SQL Server Express considerations.
- The database time must be synchronized with the time on the Deep Security Manager computer. Ensure that the database and the manager use the same time zone and that they are synchronizing their time to the same time source.
By default, the AWS Marketplace AMI uses Coordinated Universal Time (UTC). We recommend that you also use UTC for your database. If you change this setting, be sure your manager and database match.
- Allow communication from the Deep Security Manager computer to the database computer. See Port numbers.
- During the Deep Security Manager installation, you will be asked for database connection details. Enter the database hostname under "Hostname" and the database that you created for Deep Security under "Database Name".
The installation supports both SQL and Windows Authentication. When using Windows Authentication, the "Advanced" option is not available with the AWS Marketplace version of Deep Security Manager.
We recommend that you use an AWS RDS instance (Microsoft SQL RDS or Oracle RDS), but you can also use a stand-alone database server.
If you choose to use a stand-alone database server, keep these recommendations in mind:
- Many Deep Security Manager operations (such as updates and recommendation scans) require high CPU and memory resources. Trend Micro recommends that each manager node has four cores and sufficient RAM in high scale environments.
- The database should be installed on hardware that is equal to or better than the specifications of the best Deep Security Manager node. For the best performance, the database should have 8-16 GB of RAM and fast access to the local or network attached storage. Whenever possible, a database administrator should be consulted on the best configuration of the database server and a maintenance plan should be put in effect.
- You must create an empty database that will be used by Deep Security.
- The recommended transport protocol is TCP.
- Enable "Remote TCP Connections". (See http://msdn.microsoft.com/en-us/library/bb909712(v=vs.90).aspx)
- The AWS Marketplace version of Deep Security Manager does not support Named Pipes.
- The database account used by the Deep Security Manager must have db_owner rights.
- If using Multi-Tenancy, the database account used by the Deep Security Manager must have dbcreator rights. For information on multi-tenancy, see Set up a multi-tenant environment.
- It is important to have good database maintenance strategies in place. Refer to the Microsoft SQL Server documentation for guidelines, including Options in the Back Up Database Task for Maintenance Plan.
- Start the "Oracle Listener" service and make sure it accepts TCP connections.
- The database account used by the Deep Security Manager must be granted the CONNECT and RESOURCE roles and UNLIMITED TABLESPACE, CREATE SEQUENCE, CREATE TABLE and CREATE TRIGGER system privileges.
- If using multi-tenancy, the database account used by the Deep Security Manager must be granted the CREATE USER, DROP USER, ALTER USER, GRANT ANY PRIVILEGE and GRANT ANY ROLE system privileges.
- Avoid special characters for the database user name. Although Oracle allows special characters when configuring the database user object, if they are surrounded by quotes. Deep Security does not support special characters for the database user.
Oracle RAC (Real Application Clusters) support
Deep Security supports:
- SUSE Linux Enterprise Server 11 SP3 with Oracle RAC 12c Release 1 (v18.104.22.168.0)
- Red Hat Linux Enterprise Server 6.6 with Oracle RAC 12c Release 1 (v22.214.171.124.0)
The default Linux Server Deep Security policy is compatible with the Oracle RAC environment, with the exception of Firewall settings. You can disable Firewall or customize the Firewall settings according to the instructions in Firewall settings with Oracle RAC.
Connection settings used during Deep Security Manager installation
During the Deep Security Manager installation, you will be asked for Database connection details. Enter the Database hostname under "Hostname" and the pre-created database for Deep Security under "Database Name".