Secure Configuration Manager

In this article I will show a fourth method of creating an Aegis workflow to notify Active Directory users that their password will expire in X days, this time using an official adapter. Method #1 was a very simple workflow based off a single script which performed all the automation tasks. Method #2 replaced the…

+ read more

Martin Cotter
Mar 28, 2016
2:26 pm
Reads:
604
Score:
Unrated

Last month Juniper quietly released patches for two newly-discovered remote vulnerabilities. The announcement included some curious information including notification of the presence of “unauthorized code” in its ScreenOS. As researchers investigated this, they discovered some very sophisticated changes to the ScreenOS code that would likely require deep inside knowledge and a state-level actor…

Feb 12, 2016
9:00 am
Reads:
254
Score:
Unrated

Many start the new year hoping for better things. Many could probably learn a lesson or two from the following companies who suffered dearly during 2015. This list does not cover all of the major breaches of the year, but it does underscore the damage that was done with merely a handful of them. We…

+ read more

Feb 1, 2016
11:07 am
Reads:
356
Score:
Unrated

This coming Tuesday, January 12 is a big day – old versions of Internet Explorer will no longer be supported. This change will help the NetIQ team accelerate the development of new features since we no longer have to account for old, incompatible browser quirks, and will also generally increase the safety of our…

Jan 12, 2016
2:03 pm
Reads:
346
Score:
Unrated

Secure-Configuration-Manager_2011.1r1-Sample_Reports.zip contains sample reports for the complete set of reports found in the Secure Configuration Solution Pack (version 2011.1r1).

Sep 9, 2015
10:42 am
Reads:
536
Score:
Unrated

Recently I had the opportunity to collaborate with a customer and NetIQ development in enhancing a regular expression check that allows multiple expressions against multiple files. The check also allows the ability to confirm if a file is present or not, and allow the logic of deciding if the check will have a…

Mar 19, 2015
12:28 pm
Reads:
1,958
Score:
Unrated

No organization is immune from a data breach.  The fact is, your organization probably already has been breached.  A new survey from the CyberEdge Group and NetIQ shows you just where IT teams are finding the security vulnerabilities that can lead to breaches and audit findings.  The good news is it’s not hard to find…

+ read more

Renee Bradshaw
Mar 11, 2015
6:05 am
Reads:
1,953
Score:
Unrated

It’s impossible to tell with any precision if human error in IT is increasing, or decreasing. However, there is plenty of incidental data in the breach headlines of today to support the fact that human, or insider, error is prevalent – and not going away anytime soon. The Hack Heard Round the World For example,…

+ read more

Renee Bradshaw
Dec 22, 2014
9:41 am
Reads:
2,880
Score:
5

This post reminds me of the very early days in my career as an application developer on a Medicare claims processing system. I took on the responsibility of a large subsystem implementation that year where I was responsible for the requirements definition, specification and subsequently the testing of the new subsystem, Medicare Secondary Payer (MSP). Why the…

+ read more

Jul 24, 2014
7:39 pm
Reads:
14,322
Score:
5
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow