Security Manager

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
6,184
Score:
5

Hi all, Unix Agent 7.4 Hotfix 7018104 (p74p12) is released. This patch updates the Secure Configuration Manager UNIX Agent 7.4 with the following scripts which are used to enable security checks…

Nov 7, 2016
4:16 pm
Reads:
1,646
Score:
Unrated

The IP2Location 2011.1r1 feed plug-in is released. New feed plug-in and replaces the Generic IP Geolocation Service Collector. Allows you to convert IP Location Database files downloaded from ip2location.com to a Sentinel map file.

May 11, 2016
4:30 pm
Reads:
2,538
Score:
Unrated

This is an OpenSSL certificate toolkit utility leveraging OpenSSL’s CLI for Linux. This is a simple wrapper utility for OpenSSL CLI to help automate certificate tasks. Download here…

By: tdharris
May 2, 2016
11:15 am
Reads:
15,334
Score:
5

There was a time in my life when I got so far into the weeds of wife-ing, mothering, and working, that in desperation I began categorizing my day’s activities into three categories: Near Misses, Fails, and Epic Fails. The thinking was that if I could prioritize reducing the number of “near misses,” I could ultimately…

+ read more

Rhonda Holloway
Feb 13, 2015
12:03 pm
Reads:
4,610
Score:
5

We encountered a very rare event where the Event Partition Data (index of raw event data) failed to be written to the secondary storage. While the compressed raw data was still intact and written to the secondary storage, it could not be queried as the index of its content was missing. The resolution required several…

+ read more

ScorpionSting
Oct 9, 2014
2:41 pm
Reads:
3,146
Score:
Unrated

It has long been said that information is the lifeblood of the organization, and it must be protected. But when your data is flowing freely between myriad unmanaged mobile computing devices and networks—the hurdle for IT Security Pros to keep sensitive information safe just keeps getting higher and higher. Fortunately, NetIQ and Cisco are here…

+ read more

Brennan
By: Brennan
Oct 1, 2014
7:24 am
Reads:
16,858
Score:
Unrated

This document provides information about including the ability to capture ticket number information as well as authorization for the change so this information is written to the application events generated via DRA and ultimately can be queried via forensic queries in Security Manager. NetIQ does not test or validate any software, code or other materials…

+ read more

jacksonse
By: jacksonse
Jan 8, 2007
8:10 am
Reads:
3,063
Score:
Unrated
Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Process Automation IT Security Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Passwords Reporting Secure Access Supported Troubleshooting Workflow