Cool Tools

Tracing IDM drivers can be difficult, especially if you have a lot of policies. Designer has a colored trace view, but mixes all drivers. The log files are missing the nice colors. This IDM designer plugin tries to make tracing IDM drivers simpler. It provides the following features…

By: scauwe
Aug 28, 2015
9:10 am
Reads:
95
Score:
Unrated

I’ve been asked a few times about the purpose of various policysets; for what purpose do we have this one vs. that one? Why Event vs. Command, or Creation vs. Placement? There are reasons for all of them, and if followed properly life can be much simpler than if lumping everything under one policyset and…

+ read more

By: ab
Jul 2, 2015
8:15 am
Reads:
388
Score:
5

Since eDirectory 8.8 was released Novell/NetIQ has provided the option to have multiple eDirectory instances on a single system, and to have these running either as ‘root’ or as a non-root user. There are benefits to both, but generally speaking it is a proven and best practice to run services as non-root users.

By: ab
Jun 17, 2015
9:12 am
Reads:
424
Score:
5

Getting the raw data that caused an event in Sentinel is rather cumbersome. The script presented here will automate this process.

Norbert Klasen
Jun 3, 2015
4:34 pm
Reads:
464
Score:
Unrated

Shell script with a set of bash functions that build the SOAP requests to perform common tasks using RBPM 4.5 role SOAP endpoints. To use download the script, source it in a command terminal or other script and call the functions with the parameters. All functions provide a basic usage message if called without parameters.

By: ffreitas
May 13, 2015
5:25 pm
Reads:
591
Score:
5

In the previous article, I have explained the Botnets and free sites which offer a list of infected sites. Repeated here for readability “There are number of publicly available lists of known IP Addresses that are currently compromised. Various sites offer these lists for free. These hosts are running crimeware with Botnets. The…

Apr 21, 2015
12:01 pm
Reads:
983
Score:
Unrated

Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager

Apr 16, 2015
10:57 am
Reads:
1,200
Score:
Unrated

Oftentimes organizations start their web presence by building it in-­-house. A common characteristic of such in–house developed solutions is that a database is used to hold user information such as user name, password, and additional information such as first and last name, email address, etc. As the web presence grows and requires more and more…

+ read more

By: wbusath
Mar 25, 2015
11:15 am
Reads:
969
Score:
Unrated

Welcome to part 2 of the Remote Execution Adapter for Aegis. In this second part I provide the server side adapter, instructions on how to install and configure as well as descriptions of each activity. Part 1 is available here – Please ensure you download the client and server files from part1 and part2 at…

+ read more

Martin Cotter
Mar 24, 2015
4:21 pm
Reads:
910
Score:
Unrated

Recently I had the opportunity to collaborate with a customer and NetIQ development in enhancing a regular expression check that allows multiple expressions against multiple files. The check also allows the ability to confirm if a file is present or not, and allow the logic of deciding if the check will have a…

Mar 19, 2015
12:28 pm
Reads:
1,367
Score:
Unrated