Security Manager

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
1,604
Score:
5

Hi all, Unix Agent 7.4 Hotfix 7018104 (p74p12) is released. This patch updates the Secure Configuration Manager UNIX Agent 7.4 with the following scripts which are used to enable security checks…

Nov 7, 2016
4:16 pm
Reads:
789
Score:
Unrated

The IP2Location 2011.1r1 feed plug-in is released. New feed plug-in and replaces the Generic IP Geolocation Service Collector. Allows you to convert IP Location Database files downloaded from ip2location.com to a Sentinel map file.

May 11, 2016
4:30 pm
Reads:
1,472
Score:
Unrated

There was a time in my life when I got so far into the weeds of wife-ing, mothering, and working, that in desperation I began categorizing my day’s activities into three categories: Near Misses, Fails, and Epic Fails. The thinking was that if I could prioritize reducing the number of “near misses,” I could ultimately…

+ read more

Rhonda Holloway
Feb 13, 2015
12:03 pm
Reads:
3,498
Score:
5

We encountered a very rare event where the Event Partition Data (index of raw event data) failed to be written to the secondary storage. While the compressed raw data was still intact and written to the secondary storage, it could not be queried as the index of its content was missing. The resolution required several…

+ read more

ScorpionSting
Oct 9, 2014
2:41 pm
Reads:
2,206
Score:
Unrated

It has long been said that information is the lifeblood of the organization, and it must be protected. But when your data is flowing freely between myriad unmanaged mobile computing devices and networks—the hurdle for IT Security Pros to keep sensitive information safe just keeps getting higher and higher. Fortunately, NetIQ and Cisco are here…

+ read more

Brennan
By: Brennan
Oct 1, 2014
7:24 am
Reads:
15,770
Score:
Unrated

This document provides information about including the ability to capture ticket number information as well as authorization for the change so this information is written to the application events generated via DRA and ultimately can be queried via forensic queries in Security Manager. NetIQ does not test or validate any software, code or other materials…

+ read more

jacksonse
By: jacksonse
Jan 8, 2007
8:10 am
Reads:
2,304
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow