Configure the database
After installing the database, you are ready to configure it for Deep Security Manager.
First, configure a database instance, a database user, and several other vendor-specific settings. See one of the following sections:
Next, perform the following configurations:
- Synchronize both time and time zone. Use the same time source on both the database and Deep Security Manager servers.
- Allow network connections between Deep Security Manager and the database server. See Port numbers, URLs, and IP addresses.
- Optionally, configure encryption. See Encrypt communication between the Deep Security Manager and the database.