Help Center
Quick Start
- Overview
- System requirements
- Minimum privileges required
- Default port configuration
- Installing DataSecurity Plus
- Uninstalling DataSecurity Plus
- Starting DataSecurity Plus
- Launching DataSecurity Plus
- Configuring your solution
- Licensing details
- Applying a license
File Auditing
- About File Auditing
- Domain configuration
- File server configuration
- Failover cluster configuration
- NetApp server configuration
- Workgroup configuration
Setting up File Audit
Dashboard
Reports
Alerts
Configuration
Storage Configuration
File Analysis
- About File Analysis
- On-Demand Reports
Setting up File Analysis
Dashboard
Reports
Alerts
Configuration
Data Risk Assessment
- About Data risk assessment
Setting up Data risk assessment
Dashboard
Reports
Ownership analysis
Configuration
Endpoint DLP
- About Endpoint DLP
Setting up Endpoint DLP
Reports
Alerts
Prevention policies
Configuration
Cloud Protection
- About Cloud Protection
- Gateway Server Installation Steps
- Gateway Configuration in Endpoint
- Gateway Cluster Configuration
- Gateway Server Management
- Certificate Authority Configuration
- Two-way SSL configuration
- Manage Certificate Trust Store
- Threat Analytics Database
- Manage Banned Applications
- Manage Authorized Applications
- Regenerating gateway server access key
- Updating gateway server
- Gateway Server Failover
- Load Balancer Configuration
- Global Insight
- Application Insight
- User Insight
- Shadow Application Insight
- Banned Application Insight
- Cloud App Discovery
- Cloud Access Reports
- Application Insights
- Shadow Cloud Application Reports
- Banned Cloud Application Reports
- File Upload & Download Reports
Setting up Cloud Protection
Dashboard
Reports
Control Policies
Storage Configuration
Administrative settings
- Technician configuration
- Notification filters
- Manage agent
- Agent settings
- SIEM integration
- Business hours configuration
- Two-factor authentication
- Workgroup configuration
- Security policy
Email configuration
General settings
- Connection
- Personalize
- DataSecurity Plus Server
- Privacy Settings
- Disk utilization
- Schedule Retention Policy
Policy Configuration
Release notes
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
Troubleshooting
- HTTP communication failure
- Dormant DataEngine
- Secure Gateway server failure
- RPC communication failure
- Cloud Protection Gateway server failure
- Known issues and limitations
- Known errors and solutions
Guides
- Agent document
- How to Migrate/Move DataSecurity Plus
- How to apply SSL certificate
- How to automate DataSecurity Plus database backup
- How to set alerts in DataSecurity Plus
- How to secure your DataSecurity Plus installation
Connection settings
Under Admin > General Settings > Connection, technicians with admin access to the ManageEngine DataSecurity Plus console can configure the following:
When changes are made to any of these settings, the DataSecurity Plus server must be restarted to reflect them.
1. Connection settings
Under Connection settings, you can configure the connection type and session properties.
1.1.Connection type
By default, DataSecurity Plus uses the port 8800 for HTTP and port 9163 for HTTPS. To change these ports, enter the desired port number in the respective field, click Save, and restart the DataSecurity Plus server.
In both the trial and Free editions, you can choose either HTTP or HTTPS. However, in the Professional edition, it is mandatory to select HTTPS as the connection type to secure data transfers between the users’ web browser and the DataSecurity Plus server.
Configuring SSL
To enable HTTPS connection, you must enable and apply a Secure Sockets Layer (SSL) certificate. DataSecurity Plus provides a default SSL certificate. However, we strongly recommend uploading your own SSL certificate for maximum security.
The steps to apply an SSL certificate vary depending on whether you already have a signed SSL certificate.
- If you already have an SSL certificate, skip ahead to step C.
- If you do not have an SSL certificate yet, follow steps A, B, and C.
A. Generate a certificate signing request (CSR) from DataSecurity Plus
- Log in to the DataSecurity Plus web console with an account that has administrative privileges.
- Navigate to Admin Console > General Settings > Connection, and click the Connection Settings tab.
- Select DataSecurity Plus Portal (https) as the Connection Type and enter the port number you plan on using for DataSecurity Plus.
- Click Apply SSL Certificate next to Upload or Generate SSL Certificate.
- On the next page, select Generate Certificate.
- Provide the required details as follows:
Parameter Description Common Name Enter the name of the server on which DataSecurity Plus is running. SANs Enter the names of the additional hosts (sites, IP addresses, etc.) that are to be protected by the SSL certificate. Organizational Unit Enter the department name that is to appear on the certificate. Organization Enter the legal name of your organization. City Enter the city name as shown in your organization’s registered address. State/Province Enter the state/province as shown in your organization’s registered address. Country Code Enter the two-letter code of the country in which your organization is located. Password Enter a password that is at least six characters long. Validity (In Days) Enter the number of days for which the certificate should be valid. If no value is provided, it will be set to 90 days. Public Key Length (In Bits) Enter the public key length. The larger the size is, the stronger the key will be. The default size is 1,024 bits, and the size can be increased only in multiples of 64. - Click Generate CSR.
Note:
- If you plan to use a self-signed certificate, click Generate and Apply Self-Signed Certificate. This will create the SSL certificate and bind it to DataSecurity Plus to finish enabling HTTPS. Otherwise, proceed to the next step.
- For the steps to manually create a CSR file, refer to the manual SSL configuration guide.
- The generated CSR can be downloaded by clicking Download CSR on the pop-up. Alternatively, the created CSR file can be found in the following folder: <installation directory>\ManageEngine\DataSecurity Plus\jre\bin.
B. Submit it to your certificate authority (CA) for signing
If you are using an external CA, contact them to get the commands required to receive signed certificates. If you want it from Microsoft Certificate Services, follow the steps below:
- Connect to Microsoft Certificate Services by going to https://<servername>/certsrv.
- Click Request a certificate > advanced certificate request > Submit a certificate request by using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request by using a base-64-encoded PKCS #7 file.
- Open the generated CSR file using a text editor, copy the content, and paste it under Saved Request.
- Select Web Server as the Certificate Template and click Submit.
- Click the Download certificate chain link and download the issued PKCS #7 Certificate file to the <installation directory>\ManageEngine\DataSecurity Plus\jre\bin folder. The downloaded certificate will be in P7B format.
- Click Home in the top-right corner and click Download a CA certificate, certificate chain, or CRL.
- Click Download CA certificate to download the root certificate in CER format.
C. Upload the signed certificate to DataSecurity Plus
- Log in to the DataSecurity Plus web console with an account that has administrative privileges.
- Navigate to Admin Console > General Settings > Connection, and click the Connection Settings tab.
- Select DataSecurity Plus Portal (https) as the Connection Type and enter the port number you plan on using for DataSecurity Plus.
- Click Apply SSL Certificate next to Upload or Generate SSL Certificate.
- On the next page, select Apply Certificate.
- There are two upload options you can choose from:
- Option 1—ZIP Upload: If your CA has sent you a ZIP file, click ZIP Upload > Browse and select your target file. If your private key is password-protected, then enter the password in the Private Key Passphrase field.
- Option 2—Individual Certificate: If your CA has sent you just one certificate file (PFX or PEM format), click Individual Certificate. Next to Upload Certificate, click Browse and select your certificate. Then, next to Upload CA Bundle, click Browse and select your CA bundle files. Finally, provide your Certificate Password.
- Click Apply.
- Restart the DataSecurity Plus server for the changes to take effect.
Note: If your CA has sent the certificate content, paste the content in a text editor and save it in a CER, CRT, or PEM format. Then, upload the file by following the steps for Option 2.
Note: You can enable the Encrypt Keystore Password option and enter the password that you used to install the SSL certificate to prevent the password from being stored in clear text format in the server.xml file.
Configuring TLS versions and cipher suites
Once the SSL certificate is applied, you can modify the TLS versions and cipher suites by following these steps:
- Click Advanced Settings.
- Select the desired TLS versions from the TLS Versions drop-down menu. DataSecurity Plus supports TLSv1, TLSv1.1, and TLSv1.2.
- Select your desired cipher suites from the Cipher Suites drop-down menu. DataSecurity Plus supports the following cipher suites:
- TLS_AES_256_GCM_SHA384
- TLS_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
- TLS_RSA_WITH_AES_256_GCM_SHA384
- TLS_RSA_WITH_AES_128_GCM_SHA256
- TLS_RSA_WITH_AES_256_CBC_SHA384
- TLS_RSA_WITH_AES_128_CBC_SHA256
- TLS_RSA_WITH_AES_256_CBC_SHA
- TLS_RSA_WITH_AES_128_CBC_SHA
1.2. Session properties
This setting allows administrators to define how long a user's session can be inactive in their browser before they are automatically logged out of the DataSecurity Plus web console. By default, sessions will time out after 30 minutes of inactivity. Any changes to this duration will be reflected only after the DataSecurity Plus server is restarted.
2. Proxy settings
To configure DataSecurity Plus to use a proxy server for connecting to the internet, follow the steps below:
- Login to the DataSecurity Plus web console.
- Go to Admin Console > Admin > General Settings > Connection, and click the Proxy Settings tab.
- Enable the Proxy Server Settings checkbox.
- Specify the Server Name or IP Address of your proxy server.
- If your environment has an authentication-enabled proxy setup, check Authentication and type in the Username and Password.
- Click the Save button.
3. NAT settings
When endpoint devices need to access the DataSecurity Plus central server through the internet, you can configure a network address translation (NAT) device. This will map your internal IP address to a public IP address or fully qualified domain name (FQDN), which the devices can use to access the central server.
Configure the NAT device by following the steps below:
- Log in to the DataSecurity Plus web console.
- Navigate to Admin Console > General Settings > Connection, and click the NAT tab.
- The details of DataSecurity Plus' Central Server (Private IP Address and Ports) are prefilled based on your current configuration.
- Enter the public FQDN and port number of the NAT device under NAT Device (Public FQDN and Ports).
- Click Save.
4. Secure Gateway Server settings
A Secure Gateway Server provides an additional layer of security when handling communications between your central server and endpoint devices. It prevents the central server from being exposed directly to the internet by acting as an intermediary between the central server and the endpoint devices. When the agent tries to contact the central server, the Secure Gateway Server receives all the communications and redirects it to the central server.
Note: NAT settings need to be configured to enable Secure Gateway Server.
Installing the proxy server application
- Download and install the DataSecurity Plus proxy server application.
- Enter the central server name and port number in the pop-up tab that opens after installation.
- Provide the required details for local or AD authentication.
- Click Validate.
- Wait until the server certificates are installed.
- Click Finish to close the window.
The Secure Gateway Server will start running. Check the status of the connection by following these steps:
- Log in to the DataSecurity Plus web console.
- Navigate to Admin Console > General Settings > Connection, and click the Secure Gateway Server tab.
Changing the port number of the Secure Gateway Server
Follow the steps below to change the port number of the Secure Gateway Server:
- Log in to the DataSecurity Plus web console.
- Navigate to Admin Console > General Settings > Connection, and click the NAT tab.
- Change the port number of the NAT Device to your required value.
- Navigate to the installation folder of the DataSecurity Plus proxy server application and go the conf folder.
- Open the websettings.conf file in notepad.
- Find fs.https.port within the file and change the port number here as well. Double-check to ensure that the port numbers match.
- Save and close the file.
- Restart the DataSecurity Plus proxy server to apply the changes.
- Go to the Secure Gateway Server tab and click Test Connection to check whether the connection is successful.