Configure the database

After installing the database, you are ready to configure it for Deep Security Manager.

First, configure a database instance, a database user, and a few other vendor-specific settings. See one of the following sections:

Next, perform these additional configurations:

  1. Synchronize both time and time zone. Use the same time source on both the database and Deep Security Manager servers.
  2. Allow network connections between Deep Security Manager and the database server. See Port numbers, URLs, and IP addresses.
  3. (Optional) Configure encryption. See Encrypt communication between the Deep Security Manager and the database.

After preparing the database, you can install Deep Security Manager.