Welcome to NetIQ Cool Solutions!  Explore what is possible with NetIQ products by seeing how product experts use them in real life.  Download purpose-built Cool Tools and see if they can help you streamline things.  Share your knowledge and earn Rewards Points.

Why get involved?

Submit articles and Cool Tools, and earn Rewards Points to spend at Amazon.

Sign up now

Subscribe to our newsletter

Latest Posts

This entry is part 6 of 6 in the series Aegis Workflow 101

Welcome to Part 6 of Aegis Workflow 101.  Decision support in Aegis allows users to choose how workflows are started, which flows in a workflow are followed and what decisions need to manual intervention by a user at run-time. Decision Making in Aegis is split into 3 general areas – Conditional Connectors, Triggers and User Input Forms….

+ read more

Martin Cotter
Apr 28, 2016
8:37 am
Reads:
48
Score:
Unrated
This entry is part 5 of 6 in the series Aegis Workflow 101

Welcome to Part 5 of Aegis Workflow 101. This time we look at variables and their use (and misuse) in Aegis. Variables in Aegis are storage locations where you can store, retrieve and modify data. Like programming, in Aegis we have Global Variables (Global Settings), values which are accessible to all running work items and…

+ read more

Martin Cotter
Apr 22, 2016
3:29 pm
Reads:
70
Score:
Unrated

I have written many articles about the various error codes I have come across in drivers. I highly recommend everyone try this. When you are working with a driver all sorts of issues pop up. Keep a text editor open, copy and paste the error into the file, and then try to leave a note…

+ read more

geoffc
By: geoffc
Apr 22, 2016
1:34 pm
Reads:
144
Score:
Unrated

Microsoft IIS Collector 2011.1r4, VMware ESXi Collector 2011.1r4, Fortinet FortiGate Collector 2011.1r3, and Cisco Switch and Router 2011.1r5 plug-ins have been released. Find out more here…

Apr 22, 2016
1:03 pm
Reads:
108
Score:
Unrated

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
407
Score:
Unrated
This entry is part 4 of 6 in the series Aegis Workflow 101

Welcome to Part 4 of Aegis Workflow 101.  This time we look at Triggers which define the conditions when workitems should start as well as well as other behavior which we will learn about below. In the last topic we learned about events.  When events arrive into Aegis they are written to the Aegis Database but…

+ read more

Martin Cotter
Apr 20, 2016
10:43 am
Reads:
76
Score:
Unrated
This entry is part 3 of 6 in the series Aegis Workflow 101

Welcome to Part 3 of Aegis Workflow 101.  This time we look at Events which act as signals to Aegis to perform some action, from meeting the criteria to starting a workitem to signalling a workitem should end.  Inside the Aegis Web Console Aegis events are view able on the Events tab. All Aegis events have a…

+ read more

Martin Cotter
Apr 14, 2016
12:26 pm
Reads:
123
Score:
Unrated

eDirectory comes with PKI (Public Key Infrastructure) components built in. The most obvious manifestation of this is the Certificate Authority that is created on the first server in each tree. This is used to make X.509 Certificates that are used by eDirectory for a number of services. (LDAP with SSL/TLS, iMonitor’s HTTP stack for SSL/TLS…

+ read more

geoffc
By: geoffc
Apr 14, 2016
10:54 am
Reads:
197
Score:
5
This entry is part 2 of 6 in the series Aegis Workflow 101

Welcome to Part 2 of Aegis Workflow 101.  This time we look at Input Builder which is a basic but very powerful component of Aegis workflow design. Looking back at Part 1, we build a ‘Hello World’ workflow which used the echo activity to output the value at its input.  This input was hard-coded.  Every…

+ read more

Martin Cotter
Apr 8, 2016
2:11 pm
Reads:
285
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow