Back up and restore your database

Separate from high availability or load balancing, best practices include regular database backups and a disaster recovery plan. Backups can be used to restore the database if there is a serious failure.

Back up your database

Consult your database vendor's documentation for instructions on how to back up your database.

For RDS, follow the instructions provided by AWS for backing up your database to an S3 bucket. For example, see Amazon RDS for SQL Server - Support for Native Backup/Restore to Amazon S3.

For PostgreSQL databases, basic tools like pg_dump or pg_basebackup are not suitable to back up and restore in an enterprise environment. Consider other tools such as Barman.

Restore the database only

  1. Stop the Deep Security Manager service.
  2. Restore the database.
    This must be a database from the same version number of the Deep Security Manager.
  3. Start the Deep Security Manager service.
  4. Verify contents restored.
  5. Update all of the computers to ensure they have the proper configuration.

Restore both the Deep Security Manager and the database

  1. Remove any remnants of the lost or corrupted Deep Security Manager. When uninstalling Deep Security Manager, don't choose to keep configuration files.
  2. Restore the database.
  3. Find the version of the Deep Security Manager installer that supports your database and install it. During the installation, in the Database options, select the Add a new Manager node option.
  4. After installing Deep Security Manager successfully, open the Deep Security Manager console, go to Administration > Manager Nodes, and decommission the old offline Manager node.

Export objects in XML or CSV format

  • Events: Go to one of the Events pages and use the Advanced Search options to filter the event data. For example, you could search for all firewall events for computers in the Computers > Laptops computer group that were logged within the last hour whose reason column contains the word spoofed.



    Click the submit button (with the right-facing arrow) to execute the "query". Then clickExport to export the filtered data in CSV format. You can export all the displayed entries or just selected data. The exporting of logs in this format is primarily for integration with third-party reporting tools.
  • Computer Lists: Computers lists can be exported in XML or CSV format from the Computers page. You might want to do this if you find you are managing too many computers from a single Deep Security Manager and are planning to set up a second Deep Security Manager to manage a collection of computers. Exporting a list of selected computers will save you the trouble of rediscovering all of the computers again and arranging them into groups.
    Policy, firewall rule, and intrusion prevention rule settings will not be included. You will have to export your firewall rules, intrusion prevention rules, firewall stateful configurations, and policies as well and then reapply them to your computers.
  • Policies: To export these in XML format, go to Policies.
    When you export a selected policy to XML, any child policies the policy might have are included in the exported package. The export package contains all of the actual objects associated with the policy except: intrusion prevention rules, log inspection rules, integrity monitoring rules, and application types.
  • Firewall Rules: Firewall rules can be exported to an XML or CSV file using the same searching and filtering techniques as above.
  • Firewall Stateful Configurations: Firewall stateful configurations can be exported to an XML or CSV file using the same searching and filtering techniques as above.
  • Intrusion Prevention Rules: Intrusion prevention rules can be exported to an XML or CSV file using the same searching and filtering techniques as above.
  • Integrity Monitoring Rules: Integrity monitoring rules can be exported to an XML or CSV file using the same searching and filtering techniques as above.
  • Log Inspection Rules: Log inspection rules can be exported to an XML or CSV file using the same searching and filtering techniques as above.
  • Other Common Objects : All the reusable components common objects can be exported to an XML or CSV file the same way.

When exporting to CSV, only displayed column data is included. Use the Columns tool to change which data is displayed. Grouping is ignored so the data might not be in same order as on the screen.

Import objects

To import each of the individual objects into Deep Security, next to New in the object page's toolbar, select Import From File .