Cool Tools

I’ve been asked a few times about the purpose of various policysets; for what purpose do we have this one vs. that one? Why Event vs. Command, or Creation vs. Placement? There are reasons for all of them, and if followed properly life can be much simpler than if lumping everything under one policyset and…

+ read more

By: ab
Jul 2, 2015
8:15 am
Reads:
373
Score:
5

Since eDirectory 8.8 was released Novell/NetIQ has provided the option to have multiple eDirectory instances on a single system, and to have these running either as ‘root’ or as a non-root user. There are benefits to both, but generally speaking it is a proven and best practice to run services as non-root users.

By: ab
Jun 17, 2015
9:12 am
Reads:
410
Score:
5

Getting the raw data that caused an event in Sentinel is rather cumbersome. The script presented here will automate this process.

Norbert Klasen
Jun 3, 2015
4:34 pm
Reads:
448
Score:
Unrated

Shell script with a set of bash functions that build the SOAP requests to perform common tasks using RBPM 4.5 role SOAP endpoints. To use download the script, source it in a command terminal or other script and call the functions with the parameters. All functions provide a basic usage message if called without parameters.

By: ffreitas
May 13, 2015
5:25 pm
Reads:
578
Score:
5

In the previous article, I have explained the Botnets and free sites which offer a list of infected sites. Repeated here for readability “There are number of publicly available lists of known IP Addresses that are currently compromised. Various sites offer these lists for free. These hosts are running crimeware with Botnets. The…

Apr 21, 2015
12:01 pm
Reads:
971
Score:
Unrated

Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager

Apr 16, 2015
10:57 am
Reads:
1,184
Score:
Unrated

Oftentimes organizations start their web presence by building it in-­-house. A common characteristic of such in–house developed solutions is that a database is used to hold user information such as user name, password, and additional information such as first and last name, email address, etc. As the web presence grows and requires more and more…

+ read more

By: wbusath
Mar 25, 2015
11:15 am
Reads:
957
Score:
Unrated

Welcome to part 2 of the Remote Execution Adapter for Aegis. In this second part I provide the server side adapter, instructions on how to install and configure as well as descriptions of each activity. Part 1 is available here – Please ensure you download the client and server files from part1 and part2 at…

+ read more

Martin Cotter
Mar 24, 2015
4:21 pm
Reads:
898
Score:
Unrated

Recently I had the opportunity to collaborate with a customer and NetIQ development in enhancing a regular expression check that allows multiple expressions against multiple files. The check also allows the ability to confirm if a file is present or not, and allow the logic of deciding if the check will have a…

Mar 19, 2015
12:28 pm
Reads:
1,351
Score:
Unrated

Designing IT Process Automation workflows very often comprises of taking a manually documented process and converting it into an automated process, maintaining the logical steps and as many of the techniques used in the manual process as possible. Manual processes can include heterogeneous automated steps utilizing customized scripts which may have been in place for…

+ read more

Martin Cotter
Mar 18, 2015
12:23 pm
Reads:
975
Score:
Unrated