After upgrading the DLP Enforce server from 16.0 to 16.1, the Incident Persister service will try to start but it fails immediately.
The DLP system is using FIPS.
And a pop-up message appears indicating that there are permissions errors for FIPS.
DLP 16.x
DLP 25.1
The old Enforce and Database passwords did not meet the new FIPS 140-3 requirements that was introduced in DLP 16.1.
DLP 16.1 and 25.1 use FIPS 140-3.
DLP 16.0.x and prior use FIPS 140-2.
Before you upgrade from 16.0 or earlier to either 16.1 or 25.1 and you have enabled FIPS, you must update all the DLP and Database passwords to meet the FIPS 140-3 requirements.
Update the following passwords: Oracle (protect), Enforce Administrator, DLP Services, and the sys dba.
With FIPS 140-3 support, you must implement strong passwords for the following secure connections:
If you use Kerberos authentication to log in to the Enforce Server, and Symantec Data Loss Prevention is configured for FIPS encryption, you must use a strong password for your Active Directory user.
In addition, user passwords for console access may need to be updated.
The password requirements in FIPS 140-3 have been updated to require the following:
When applying FIPS mode for Symantec Data Loss Prevention components, you must set a password that provides at least 112-bit entropy.
Create a password that includes at least one of the following character scenarios:
If you enable FIPS mode during the installation or upgrade process, and plan to use SAML authentication, you must update the SymantecDLPManager.conf file.
Complete the following steps to update the SymantecDLPManager.conf file.
Source documentation:
DLP 16.1: Creating a Strong Password for FIPS Mode
DLP 16.1: Using FIPS with SAML Authentication
DLP 25.1: Creating a Strong Password for FIPS Mode
DLP 25.1: Using FIPS with SAML Authentication
The password requirements for FIPS 140-2 are as follows:
If the first character of the password is an uppercase ASCII letter, then it is not counted as an uppercase ASCII letter for restriction 2.
If the last character of the password is an ASCII digit, then it does not count as an ASCII digit for restriction 2.