Using IBM BigFix SCM. Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio.
|
|
- Barrie Higgins
- 7 years ago
- Views:
Transcription
1 IBM Security Support Open Mic Wednesday, April 6, 2016 Using IBM BigFix SCM Panelists Christian Castro, Presenter IBM BigFix Level 2 Support Engineer Adam McDonald Level 2 Support Knowledge Leader Nathan Hanner - Level 2 Support Engineer Kevin Reinstein, Moderator - Level 2 Support Manager Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free: USA toll: Participant passcode: Slides and additional dial in numbers in techdoc : NOTICE: By participating in this call, you give your irrevocable consent to IBM to record any statements that you may make during the call, as well as to IBM's use of such recording in any and all media, including for video postings on YouTube. If you object, please do not connect to this call. 1
2 Agenda What is SCM? What is SCA? Installation of SCM and SCA Working with a Checklist for Windows* Creating Custom Checklists Common pitfalls to avoid *Linux Checklists will not be covered in this OpenMic. However if there is interest there can be another OpenMic scheduled to cover using SCM in Linux environments. 2
3 What are SCM and SCA?
4 What are SCM and SCA? SCM stands for Security and Compliance Management. It is a product that is part of the IBM BigFix suite that helps organizations both protect endpoints and meet various federal and industry security compliance standards for their machines. Some standards are: Center for Internet Security (CIS), US Government and Configuration Baseline (USGCB). SCA stands for Security and Compliance Analytics. It is the graphical piece of the SCM product. SCA shows you the graphical results of your compliance efforts. Though not required for SCM to work, customers find it highly beneficial to have a webpage that shows which machines are in compliance and SCA does this. Both SCM and SCA are now known as IBM BigFix Compliance For more information regarding this topic refer to our whitepaper at: =WGD03072USEN.PDF 4
5 Installing SCM
6 How do you install SCM? SCM consists of sites just like any of our other sites. The sites have fixlets in them that are geared to look for certain things pertaining to the standard, whatever standard you chose, CIS, DISA STIG etc. As such, you add them into the console like any other site, using the License Overview screen as below: 6
7 How do you install SCM? Once you add the SCM site, they will appear under the BigFix Management domain. 7
8 How do you install SCA? To install SCA 1. Add the SCM Reporting site to your BigFix console. 2. Expand Fixlets and Tasks underneath that site. 3. Deploy Fixlet IBM BigFix Compliance 1.8 First-time install to the computer you intend to use as your SCA server, as below: 8
9 How do you install SCA? Warning: Make sure whatever machine you choose to house the SCA product has enough disk space to handle the SCA installation. The installer file alone takes 298 MB of disk space. 9
10 How do you install SCA? As per the installation fixlet you download the SCA installer file. It will be at: X:\Program Files (x86)\bigfix Enterprise\BES Installers\TEMA 10
11 How do you install SCA? Run the executable 11
12 How do you install SCA? Follow the prompts. For purposes of this presentation SCA was installed on the main BigFix server. You can also choose to install it on a server other than the main BF server. 12
13 How do you install SCA? I also chose to supply it the webreports database which is an optional step. Note: on Windows the default name for the WebReports database is BESReporting. 13
14 How do you install SCA? Note this screen about importing. The more SCM sites you added and the more machines you subscribed to those sites, the longer the import will take. 14
15 How do you install SCA? 15
16 How do you install SCA? After installation you can launch the SCA webpage which will show as IBM BigFix Compliance. For purposes of this presentation I had already subscribed to some SCM sites and had subscribed some machines to those sites so I had data for the SCA import job to import. The SCA webpage showed me this: 16
17 How do you install SCA? If you choose to use Mozilla Firefox as your browser you will get the following screen. You need to click on the Add Exception button in order for Firefox to show you the SCA page. 17
18 How do you install SCA? For Firefox you will then have to click the Confirm Security Exception button: 18
19 How do you install SCA? SCA webpage via Firefox: 19
20 How do you install SCA? SCA webpage via Firefox: 20
21 Working with a Checklist for Windows
22 Working with a Checklist for Windows For purposes of this presentation I had already subscribed my machines to some sites such as the PCI DSS Checklist for Windows 7. Note: A checklist is a site. The fixlets in them check for specific things and collectively make up the checklist or site. 22
23 Working with a Checklist for Windows To see my results in graphical form, I then went to the SCA website as per below. Then chose Reports -> Checklist -> and saw the graphical output for that site. 2 of my machines were applicable to the site and they passed 39% of all the checks from that site (the checklist) as of 4/5/2016 midnight, 12:00 AM. 23
24 Working with a Checklist site for Windows Note: If you go back to the BigFix console -> under the site itself -> click on the Show Non- Relevant Content up top, you will see this particular site checks for 229 things. Not all 229 are actual checks. Some are housekeeping fixlets themselves. 24
25 Working with a Checklist site for Windows Note: As the SCM sites use fixlets, each fixlet will, in-turn, use Relevance to determine if it itself is applicable to a machine(s) or not. Some fixlets may not be applicable as, for example, database checks fixlets would not be applicable to a customer that had no databases in their environment. If you un-depress Show Non-Relevant Content and you will see only 125 fixlets applicable to this environment for this particular SCM site. 25
26 Working with a Checklist for Windows You can then go back to the SCA main page and check out the various charts. In this example you can navigate to Reports -> Checklists and see how many checks, for the entire environment, passed (compliant), failed (not compliant) or were not applicable. 26
27 Working with a Checklist for Windows You can then click on the individual checklists and see a report just for that checklist as below. There is a heading titled Checklist: PCI DSS Checklist for Windows 7 Keep in mind the Check Results History values are the checks themselves; not the number of computers. And it s a cumulative number for all computers. 27
28 Working with a Checklist for Windows Example below shows 225 checks total, but reading 239 checks as Non-Compliant. How can this be? It can be because it s the total, for all machines. In the example, there are 2 computers subscribed to this PCI DSS Checklist for Windows 7 site. Between both machines, 239 individual fixlets (checks) came back as noncompliant, 155 Compliant, 56 Not Applicable. You can click on the numbers themselves for more info. 28
29 Working with a Checklist for Windows You can also customize the SCA webpage view with the Configure View option, as below: 29
30 Working with a Checklist for Windows See: 30
31 Creating a Custom Checklist
32 Creating a Custom Checklist The recommended way to create your own custom checklist is to use the Create Custom Checklist Wizard that is part of the SCM reporting site as shown below: 32
33 Creating a Custom Checklist. You then can name your site and choose the fixlets you want to create your custom checklists from our sites as shown below: 33
34 Creating a Custom Checklist Make sure to click on the Create Checklist button on the bottom of the screen. The site will then appear under Custom Sites in the BigFix console: 34
35 Creating a Custom Checklist We recommend you use the Synchronize Custom Checks feature to make sure the copy that you have derived from our own site(s) is up to date. A recommended practice is to run this wizard once a month. Note that when we release new content, we do not update customers own custom sites, just our sites, therefore, the need for the wizard. 35
36 Common pitfalls to avoid
37 Common pitfalls to avoid The biggest pitfall users face is not understanding the relationship between what they do in the console and the results they will see in the SCA webpage. Therefore, keep in mind: SCA will pull data from the BigFix database into its own database known as the TEMA database. This is a very laborious process and puts strain on the BigFix server database if you have a large deployment with thousands upon thousands of endpoints. Therefore we recommend the import job be scheduled during off-hours. The default pull time is once a day at midnight. A once a day pull is recommended. The pull is what is referred to as the Import job. If you add/remove computers from the console, it will take some time to see those results in SCA provided you performed an import job. If a machine was not subscribed to the corresponding SCM site then no results will be visible for that machine in the SCA webpage, even if you perform an import job. Machines must be added to SCM sites first. 37
38 Common pitfalls to avoid For Custom Checklists: Make sure you use the Synchronize Custom Checks wizard under the SCM Reporting site to have the latest version of checks you copied from our sites. Otherwise you run the risk of a checklist having old relevance and giving you incorrect results in the SCA webpage. For the Import job We recommend the Import job be run once a day during non-peak hours. 38
39 Where do you get more information? Questions on this or other topics can be directed to the IBM BigFix forum: Additional references: IBM BigFix Compliance in IBM Knowledge Center: IBM BigFix Compliance in IBM developerworks articles: 0Endpoint%20Manager/page/BigFix%20Compliance How to sign up for notifications when BigFix releases new content for our sites: Follow us: 39
40 Questions
41 Questions for the panel? Now is your opportunity to ask questions of our panelists. To ask a question now: Press *1 to ask a question over the phone or Type your question into the IBM Connections Cloud Meeting chat To ask a question after this presentation: You are encouraged to participate in our Forum topic for this event: IBM Corporation 41
42 Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Let s talk about assets in QRadar
QRadar Open Mic Webcast #7 January 28, 2015 Let s talk about assets in QRadar Panelists Dwight Spencer Principal Solutions Architect & Co-founder of Q1 Labs Adam Frank Principal Solutions Architect Brad
More informationQRadar SIEM 7.2 Windows Event Collection Overview
QRadar Open Mic Webcast #3 August 26, 2014 QRadar SIEM 7.2 Windows Event Collection Overview Panelists Aaron Breen QRadar World-wide Support Leader Adam Frank Principal Solutions Architect Jonathan Pechta
More informationIBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
More informationTivoli Endpoint Manager for Configuration Management. User s Guide
Tivoli Endpoint Manager for Configuration Management User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
More informationTivoli Endpoint Manager for Security and Compliance Analytics
Tivoli Endpoint Manager for Security and Compliance Analytics User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM
More informationRemote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide
Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Note Before using this information and the product it supports,
More informationSecurity Intelligence
IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers
More informationAddressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
More informationSociety Protection Best Practices from Industry
Society Best Practices from Industry The Nuts and Bolts of the Dynamic Attack Chain 1 October 2015 1 2015 IBM Corporation You are an... IT Security Manager (and a father of three teenagers his wife is
More informationThe Current State of Cyber Security
The Current State of Cyber Security Bob Kalka, Vice President, IBM Security PARADIGM SHIFT in crime ORGANIZED COLLABORATIVE AUTOMATED 2 Cyber criminals use BUSINESS INTELLIGENCE 3 NOBODY IS IMMUNE 2012
More informationTivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide
Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
More informationMobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
More informationIntroduction to PCI DSS
Month-Year Introduction to PCI DSS March 2015 Agenda PCI DSS History What is PCI DSS? / PCI DSS Requirements What is Cardholder Data? What does PCI DSS apply to? Payment Ecosystem How is PCI DSS Enforced?
More informationData Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
More informationIBM Security Systems Support
IBM Security Systems Support Dave Milburn European Customer Support Manager Security Systems - Identity & Access Management (dave_milburn@uk.ibm.com) 23 rd May 2014 12014 IBM Corporation Remote Technical
More informationUnder the Hood of the IBM Threat Protection System
Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE balazs.csendes@cz.ibm.com 1 You are an... IT Security Manager at a retailer
More informationBusiness Process Management IBM Business Process Manager V7.5
Business Process Management IBM Business Process Manager V7.5 Federated task management for BPEL processes and human tasks This presentation introduces the federated task management feature for BPEL processes
More informationSecuring the Cloud infrastructure with IBM Dynamic Cloud Security
Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation Cloud is rapidly transforming
More informationPatch Management for Red Hat Enterprise Linux. User s Guide
Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,
More informationand Security in the Era of Cloud
Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems Leverage Cloud as a growth engine for business Exploit Mobile to build customer
More informationMobile Security. Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.
Mobile Security Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015 12015 IBM Corporation Where I Started: Blackberry Migration BYOD Bring Your Own
More informationTivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide
Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product
More informationTake the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
More informationThe webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
More informationIBM Tivoli Provisioning Manager V 7.1
IBM Tivoli Provisioning Manager V 7.1 Preparing for patch management in a small environment 2011 IBM Corporation Welcome to the training module for Tivoli Provisioning Manager version 7.1, preparing for
More informationWebSphere Business Monitor
WebSphere Business Monitor Administration This presentation will show you the functions in the administrative console for WebSphere Business Monitor. WBPM_Monitor_Administration.ppt Page 1 of 21 Goals
More informationIBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions
IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions Integrated SFTP server 2011 IBM Corporation The presentation gives an overview of integrated SFTP server feature IntegratedSFTPServer.ppt
More informationBusiness Process Management IBM Business Process Manager V7.5
Business Process Management IBM Business Process Manager V7.5 Federated task management overview This presentation gives you an overview on the federated task management feature in IBM Business Process
More informationIBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
More informationQRadar SIEM 7.2 Flows Overview
QRadar SIEM 7.2 Flows Overview Panelists Dwight Spencer Principal Solutions Architect & Co-founder of Q1 Labs Aaron Breen QRadar World-wide Support Leader Adam Frank Principal Solutions Architect Dale
More informationIBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
More informationSecurity strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
More informationIBM WebSphere Application Server Communications Enabled Applications
IBM WebSphere Application Server Communications Enabled Applications Configuring a CEA environment 2011 IBM Corporation This presentation describes how to configure a WebSphere Application Server environment
More informationSimplify security management in the cloud
Simplify security management in the cloud IBM Endpoint Manager and IBM SmartCloud offerings provide complete cloud protection Highlights Ensure security of new cloud services by employing scalable, optimized
More informationIBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM
IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information
More informationSecurity for a Smarter Planet. 2011 IBM Corporation All Rights Reserved.
Security for a Smarter Planet The Smarter Planet Our world is getting Instrumented Our world is getting Interconnected Our world is getting Intelligent Growing Security Challenges on the Smarter Planet
More informationApplication Security from IBM Karl Snider, Market Segment Manager March 2012
Application Security from IBM Karl Snider, Market Segment Manager March 2012 1 2012 IBM Corporation Helping Solve Customer Challenges Application Security Finding Application Vulnerabilities GlassBox scanning
More informationExtreme Networks Security Upgrade Guide
Extreme Networks Security Upgrade Guide 9034868 Published July 2015 Copyright 2012 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications and
More informationGetting Started with Microsoft Office Live Meeting. Published October 2007
Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless
More informationIBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
More informationLeveraging Rational Team Concert's build capabilities for Continuous Integration
Leveraging Rational Team Concert's build capabilities for Continuous Integration Krishna Kishore Senior Engineer, RTC IBM Krishna.kishore@in.ibm.com August 9-11, Bangalore August 11, Delhi Agenda What
More informationCore Protection Module 1.6 for Mac powered by. User s Guide
Core Protection Module 1.6 for Mac July, 2010 Copyright All rights reserved. Copyright 1998-2010 Trend Micro Incorporated. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are
More informationMemory-to-memory session replication
Memory-to-memory session replication IBM WebSphere Application Server V7 This presentation will cover memory-to-memory session replication in WebSphere Application Server V7. WASv7_MemorytoMemoryReplication.ppt
More informationActualtests.C2010-508.40 questions
Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got
More informationRational Asset Manager 7.2 Editions and Licensing
Rational Asset Manager 7.2 Editions and Licensing Derek D. Baron, ddbaron@us.ibm.com Product Manager, Rational Asset Manager 2009 IBM Corporation IBM Corporation 200 The information contained in this presentation
More informationBigData Analytics per la sicurezza delle Infrastrutture Critiche
BigData Analytics per la sicurezza delle Infrastrutture Critiche Vincenzo Conti IBM Security Sales Consultant Energy and utility organizations are at the forefront of attacks Utilities are among the most
More informationSecurity Configuration Management. User s Guide
Security Configuration Management User s Guide July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product
More informationNetwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
More informationIBM Endpoint Manager. Security and Compliance Analytics Setup Guide
IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 IBM Endpoint Manager Security and Compliance Analytics Setup Guide Version 9.2 Note Before using this information and the
More informationGetting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009
Getting Started with Microsoft Office Live Meeting Published October 2007 Last Update: August 2009 Information in this document, including URL and other Internet Web site references, is subject to change
More informationIBM X-Force 2012 Cyber Security Threat Landscape
IBM X-Force 2012 Cyber Security Threat Landscape 1 2012 IBM Corporation Agenda Overview Marketing & Promotion Highlights from the 2011 IBM X-Force Trend and Risk Report New attack activity Progress in
More informationWavecrest Certificate
Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationReducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
More informationEl costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
More informationBROWSER-BASED DEVELOPMENT & NETWORK MONITORING UTILITIES
BROWSER-BASED DEVELOPMENT & NETWORK MONITORING UTILITIES This document and the information contained herein are the property of L.L.C. and should be considered business sensitive. Copyright 2008 L.L.C.
More informationSingle Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
More informationDell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationProtecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
More informationNETWRIX CHANGE NOTIFIER
NETWRIX CHANGE NOTIFIER FOR SQL SERVER QUICK-START GUIDE Product Version: 2.6.194 February 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationClient Manager for Endpoint Protection. User s Guide
Client Manager for Endpoint Protection User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices Copyright IBM Corporation 2003, 2011.
More informationWeb servers and WebSphere Portal
Web servers and WebSphere Portal By default IBM WebSphere Portal uses the internal HTTP transport within IBM WebSphere Application Server to handle requests. However, because WebSphere Application Server
More informationBb Collaborate Online Rooms Faculty Support Guide
Bb Collaborate Online Rooms Faculty Support Guide D2L Services West Chester University of Pennsylvania www.wcupa.edu/d2l 610-436-3350, option 2 Anderson Hall, room 20 d2l@wcupa.edu v10.3 June 2014 Contents
More informationSecuring the Cloud: Making Cloud an Opportunity to Enhance Security
Securing the Cloud: Making Cloud an Opportunity to Enhance Security February 2016 Greg Coughlin Director, IBM Security @JGCoughlin 1 The rise of Shadow IT? 2 Security reality we have all been compromised
More informationBIGFI X. BigFix Remote Desktop for Windows. BigFix, Inc. Emeryville, CA. Last Modified: 9/13/07 Version 1.0. 2007 BigFix, Inc.
TM BIGFI X BigFix Remote Desktop for Windows BigFix, Inc. Emeryville, CA Last Modified: 9/13/07 Version 1.0 All rights reserved. BigFix, Fixlet and "Fix it before it fails" are registered trademarks of
More informationCONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES
CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationIBM Business Monitor. BPEL process monitoring
IBM Business Monitor BPEL process monitoring 2011 IBM Corporation This presentation will give you an understanding of monitoring BPEL processes using IBM Business Monitor. BPM_BusinessMonitor_BPEL_Monitoring.ppt
More informationUSER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB
USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29 Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB Table of Contents UNIT 1: Lab description... 3 Pre-requisites:... 3 UNIT 2: Launching an instance on EC2...
More informationIBM Security SiteProtector System Migration Utility Guide
IBM Security IBM Security SiteProtector System Migration Utility Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 5. This edition
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More informationLEVEL 3 SM XPRESSMEET SOLUTIONS
LEVEL 3 SM XPRESSMEET SOLUTIONS USER GUIDE VERSION 2015 TABLE OF CONTENTS Level 3 XpressMeet Calendar...3 Level 3 SM XpressMeet Outlook Add-In...3 Overview...3 Features...3 Download and Installation Instructions...
More informationmystanwell.com Installing Citrix Client Software Information and Business Systems
mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.
More informationWebSphere Commerce V7 Feature Pack 2
WebSphere Commerce V7 Feature Pack 2 Pricing tool 2011 IBM Corporation This presentation provides an overview of the Pricing tool of the WebSphere Commerce V7.0 feature pack 2. PricingTool.ppt Page 1 of
More informationIBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.
IBM Security Managed Security Services SOC Poland / GSOC Damian Staroscic Security Operations Center (SOC) Manager IBM Security Damian.Staroscic@pl.ibm.com +48-727-036-464 November 27, 2015 Why setting
More informationIBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan
IBM Endpoint Manager IBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan Document version 1.0 Michele Tomassi Copyright International Business Machines
More informationIncreased Agility with Integration Testing
Increased Agility with Integration Testing Monica Luke (mluke@us.ibm.com) Scenario Designer IBM Rational Agenda ALM Community Office Hours Increased Agility with Integration Testing 2 Application Lifecycle
More informationLumension Endpoint Management and Security Suite
Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module
More informationNETWRIX DISK SPACE MONITOR
NETWRIX DISK SPACE MONITOR QUICK-START GUIDE Product Version: 1.2 February 2015 Copyright 2015 Netwrix Corporation. All Rights Reserved Legal Notice The information in this publication is furnished for
More informationFront-Office Server 2.7
This release connector is deprecated. Use Kofax Capture and the appropriate Kofax Capture release script to release documents to a specific destination. KOFAX Front-Office Server 2.7 Configuration Guide
More informationIBM WebSphere Application Server
IBM WebSphere Application Server Multihomed hosting 2011 IBM Corporation Multihoming allows you to have a single application communicate with different user agent clients and user agent servers on different
More informationThese instructions will allow you to configure your computer to install necessary software to access mystanwell.com.
HOW TO: ACCESS MYSTANWELL.COM USING WINDOWS WITH MOZILLA FIREFOX What is mystanwell.com? The remote access web site called mystanwell.com allows staff to access Stanwell applications via the Internet using
More informationHadoop Basics with InfoSphere BigInsights
An IBM Proof of Technology Hadoop Basics with InfoSphere BigInsights Part: 1 Exploring Hadoop Distributed File System An IBM Proof of Technology Catalog Number Copyright IBM Corporation, 2013 US Government
More informationHadoop Basics with InfoSphere BigInsights
An IBM Proof of Technology Hadoop Basics with InfoSphere BigInsights Unit 4: Hadoop Administration An IBM Proof of Technology Catalog Number Copyright IBM Corporation, 2013 US Government Users Restricted
More informationIBM Rational Software
IBM Rational Software Development Conference 2008 A Guided Tour of Jazz.net Bill Higgins Jazz.net and Jazz Web UI Foundation Lead, IBM Rational bhiggins@us.ibm.com SDP 20 2008 IBM Corporation. All rights
More informationWebSphere Business Monitor
WebSphere Business Monitor Debugger 2010 IBM Corporation This presentation provides an overview of the monitor model debugger in WebSphere Business Monitor. WBPM_Monitor_Debugger.ppt Page 1 of 23 Goals
More informationClient Manager for Endpoint Protection (CMEP) User s Guide
Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product
More informationBb Collaborate Online Rooms Faculty Support Guide
Bb Collaborate Online Rooms Faculty Support Guide D2L Services West Chester University of Pennsylvania www.wcupa.edu/d2l 610-436-3350, option 2 Anderson Hall d2l@wcupa.edu D2L v10.5 BB Collaborate 12.6.4
More informationBest Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist
Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist 2008 IBM Corporation Agenda Objective Interoperability Prerequisites Where to model
More informationwww.novell.com/documentation Advanced User Guide Vibe 4.0 March 2015
www.novell.com/documentation Advanced User Guide Vibe 4.0 March 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically
More informationCollecting Logs and Troubleshooting. Troubleshooting Guide
Collecting Logs and Troubleshooting Troubleshooting Guide Revision A Issued December 2014 Table of Contents Introduction... 3 Before Filing a Support Ticket... 4 Setting Log Settings to Debug... 5 Collecting
More informationMobility Manager 9.5. Installation Guide
Mobility Manager 9.5 Installation Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or
More informationSecure Agent Quick Start for Windows
Secure Agent Quick Start for Windows 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
More informationAvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM
AvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM Installation and Configuration Guide Revision F Issued April 2014 1 Table of Contents Overview... 3 Obtaining the Record Rollback Solution Package...
More informationDecision Support System Software Asset Management (SAM)
DecisionSupportSystem SoftwareAssetManagement(SAM) ReleaseNotes Version1.2.3 May,2010 BigFix DSSSAM1.2.3 2009-2010 BigFix, Inc. All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix
More informationOS Deployment V2.0. User s Guide
OS Deployment V2.0 User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US Government Users
More informationHeroix Longitude Quick Start Guide V7.1
Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides
More informationIBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence
IBM Security Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg
More informationWeb Enabled Software for 8614xB-series Optical Spectrum Analyzers. Installation Guide
for 8614xB-series Optical Spectrum Analyzers Installation Guide Copyright Agilent Technologies Company 2001 All Rights Reserved. Reproduction, adaptation, or translation without prior written permission
More informationManaging and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
More information