Security Manager

The IP2Location 2011.1r1 feed plug-in is released. New feed plug-in and replaces the Generic IP Geolocation Service Collector. Allows you to convert IP Location Database files downloaded from ip2location.com to a Sentinel map file.

May 11, 2016
4:30 pm
Reads:
458
Score:
Unrated

There was a time in my life when I got so far into the weeds of wife-ing, mothering, and working, that in desperation I began categorizing my day’s activities into three categories: Near Misses, Fails, and Epic Fails. The thinking was that if I could prioritize reducing the number of “near misses,” I could ultimately…

+ read more

Rhonda Holloway
Feb 13, 2015
12:03 pm
Reads:
2,572
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
1,457
Score:
Unrated

We encountered a very rare event where the Event Partition Data (index of raw event data) failed to be written to the secondary storage. While the compressed raw data was still intact and written to the secondary storage, it could not be queried as the index of its content was missing. The resolution required several…

+ read more

ScorpionSting
Oct 9, 2014
2:41 pm
Reads:
1,573
Score:
Unrated

It has long been said that information is the lifeblood of the organization, and it must be protected. But when your data is flowing freely between myriad unmanaged mobile computing devices and networks—the hurdle for IT Security Pros to keep sensitive information safe just keeps getting higher and higher. Fortunately, NetIQ and Cisco are here…

+ read more

Brennan
By: Brennan
Oct 1, 2014
7:24 am
Reads:
15,101
Score:
Unrated

This document provides information about including the ability to capture ticket number information as well as authorization for the change so this information is written to the application events generated via DRA and ultimately can be queried via forensic queries in Security Manager. NetIQ does not test or validate any software, code or other materials…

+ read more

jacksonse
By: jacksonse
Jan 8, 2007
8:10 am
Reads:
1,575
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow