HTTP Transformation Rules with IBM Security Access Manager
|
|
- Marlene Fletcher
- 6 years ago
- Views:
Transcription
1 HTTP Transformation Rules with IBM Security Access Manager IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection menu option. To ask a question by voice, you must either Call In or have a microphone on your device. You will not hear sound until the host opens the audio line. For more information, visit: October 17, 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING THE CALL, AS WELL AS TO IBM S USE OF SUCH RECORDING IN ANY AND ALL MEDIA, INCLUDING FOR VIDEO POSTINGS ON YOUTUBE. IF YOU OBJECT, PLEASE DO NOT CONNECT TO THIS CALL.
2 HTTP Transformation Rules with IBM Security Access Manager IBM SECURITY SUPPORT OPEN MIC October 17, 2017
3 Panelists Reagan Knowles Presenter L2 Support Engineer Nick Lloyd Presenter L2 Support Engineer Kathy Hansen Moderator L2 Support Manager 3 IBM Security
4 Goals of session HTTP Transformation Rules Description Configuration Troubleshooting Example Rules 4 IBM Security
5 Description of HTTP Transformation Rules
6 What are HTTP Transformation Rules? Modify - Add - Remove HTTP requests and responses as they pass through the ISAM reverse proxy Specify rules with XSL transformation rule (XSLT) Invoked by a POP (old method) or a pattern in the request-match (new method) 6 IBM Security
7 What are HTTP Transformation Rules? Supported Modifications Add/remove header Modify existing header Modify URI (request only) Modify method (request only) Modify authorization object name (request only) Modify HTTP version Modify HTTP status code (response only) Modify status reason (response only) Add/remove cookie Modify existing cookie Add a body (response only) Limitations Can not modify the body of the request or response Can not modify cookies or headers that are inserted by the reverse proxy Headers like: iv-user, iv-creds, Authorization, Host Cookies like: PD-S-SESSION-ID (session), PD-ID (failover), IV_JCT 7 IBM Security
8 Configuration
9 Configuration Overview POP extended attribute value or Pattern Match points to Resource Name Resource Name points to XSL Transformation Rule The evaluation of the rule occurs early in the request processing. As a result, credential attributes are not available in the evaluation of the rule for Pattern Matches. If you want to use credential attributes in your request transformation, use the POP mechanism for invoking the rule. POP (pdadmin or WPM) Resource Name (config file) XSL Transformation Rule (loaded in LMI) Pattern Match (config file) 9 IBM Security
10 Configuration Load the XSL file with the rule into the LMI. XSL rule can be edited in the LMI. Example below will add a header. 10 IBM Security
11 Configuration Edit the [http-transformations] stanza in the reverse proxy configuration file Matches extended attribute value from POP Or matches resource name in stanza Refers to the xsl file that was loaded in LMI 11 IBM Security
12 Two Methods for Configuration Use a POP (old method) Create a POP named http-transformation-pop Attach the POP to the resource Create extended attributes Extended attribute name must match HTTPTransformation Extended attribute value must start with Request= or Response= Extended attribute value refers to the resource-name in the reverse proxy configuration file under the stanza [http-transformations] 12 IBM Security
13 Two Methods for Configuration Pattern Match (new method) [http-transformations] # The following files are currently available for this configuration entry: # - addexampleheader.xsl addexampleheader = addexampleheader.xsl # # The [http-transformations:<resource-name>] stanza is used to house # configuration which is specific to a particular HTTP transformation resource. # [http-transformations:addexampleheader] # For example: # request-match = request:get /index.html HTTP/1.1 # request-match = response:get /jct/* # request-match = response:[ /login/* # request-match = request:get /apple/index.html HTTP/ IBM Security
14 Two Methods for Configuration Example from pdweb.debug log Browser ===> PD Thread ; fd 19; local :445; remote :62353 GET /apple/ HTTP/1.1 accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 accept-encoding: gzip, deflate, br accept-language: en-us,en;q=0.5 connection: keep-alive host: fimlnx.tivlab.austin.ibm.com:445 referer: user-agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/ Firefox/52.0 upgrade-insecure-requests: 1 dnt: 1 Cookie: PD-S-SESSION-ID=1_2_1_wcTvV9llm7RNB6XpxwjrBLyi-hF6+XSslQe+3YKkF4shkRXv PD ===> BackEnd Thread ; fd 24; local :43876; remote :8080 GET / HTTP/1.1 accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 accept-language: en-us,en;q=0.5 connection: close content-length: 0 host: osseal.tivlab.austin.ibm.com:8080 user-agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/ Firefox/52.0 via: HTTP/1.1 fimlnx.tivlab.austin.ibm.com:445 this_was_added: ADDED_VALUE upgrade-insecure-requests: 1 iv_server_name: reagan-webseald-fimlnx.tivlab.austin.ibm.com dnt: 1 14 IBM Security
15 Troubleshooting & Known APARs
16 Troubleshooting Enable Tracing pdweb.debug pdweb.http.transformation Check the reverse proxy message log IBM Security Access Manager WebSEAL Version (Build ) Copyright (C) IBM Corporation All Rights Reserved Fatal Error.Occurred at file /var/pdweb/shared/xslt/http-transformation/addexampleheader.xsl, line 16, column 9. Illegal sequence '--' in comment :53: :00I x1005B3B5 webseald ERROR acl authzn HTTPTransformationRule.cpp 83 0x7f845755d HPDAC0949E Validation of the rule text for rule object "/var/pdweb/shared/xslt/http-transformation/addexampleheader.xsl" failed. Error code 0xfffffffe was returned along with error message "SAXParseException: Illegal sequence '--' in comment (/var/pdweb/shared/xslt/http-transformation/addexampleheader.xsl, line 16, column 9)". Try the other method (POP vs. Pattern Match) Use an XSLT checker like 16 IBM Security
17 Troubleshooting APAR IV98133 HTTP Transformation Rule breaks with query string and ampersand character If the request URI contains a query string with more than one parameter (i.e. there is an ampersand in the request URI), then the final URL incorrectly transforms the ampersand character to & in the URI. Example: Transforms to: GET /jsonsnoop.jsp?x=1&y=2 Fixed in ISAM IBM Security
18 Troubleshooting APAR IV98994 small memory leak while performing WebSEAL HTTP Response Transformation. Even though the leak is small, a long running ISAM reverse proxy can run out of memory and crash. Scheduled to be fixed in ISAM and ISAM Monitor memory usage until the fix is released. APAR IV74702 URI HTTP Transformation Rule results in duplicate junction requests Transformation Rule is executed twice in single request Fixed in ISAM and ISAM IF1 18 IBM Security
19 Troubleshooting Documentation APAR IV99195 Wrong If an error occurs during HTTP transformation processing, a 501 Internal Server Error is returned to the browser. Right! If an error occurs during HTTP transformation processing, a 500 Internal Server Error is returned to the browser. 19 IBM Security
20 Troubleshooting Pattern Match - a wildcard or slash must be used in the request-match value. Currently investigating to determine whether or not this is a defect request-match = request:get /apple/index.html request-match = request:get /apple/index.html HTTP/1.1 request-match = request:get /apple/index.htm* fails! succeeds succeeds 20 IBM Security
21 Example XSL Transformation Rules
22 Example XSL transformation rules erated%20identity%20manager/page/http%20transformation 11 examples from common PMRs Will likely be published to IBM Security GitHub in the near future Delivered As Is, not supported Add comments to developerworks wiki or IBM Security GitHub to get help 22 IBM Security
23 Questions for the panel Now is your opportunity to ask questions of our panelists. To ask a question now: Raise your hand by clicking Raise Hand. The Raise Hand icon appears next to your name in the Attendees panel on the right in the WebEx Event. The host will announce your name and unmute your line. or Type a question in the box below the Ask drop-down menu in the Q&A panel. Select All Panelists from the Ask drop-down-menu. Click Send. Your message is sent and appears in the Q&A panel. To ask a question after this presentation: You are encouraged to participate in the dw Answers forum: < 23 IBM Security
24 Where do you get more information? Questions on this or other topics can be directed to the product forum: <hotspot to forum for this product>. More information you can review: Security Learning Academy: <link> Technote x: <link> IBM developerworks articles: <link> IBM Knowledge Center: <link to product welcome page> Useful links: Get started with IBM Security Support IBM Support Portal Sign up for My Notifications FREE learning resources on the Security Learning Academy Follow us: 24 IBM Security
25 THANK YOU FOLLOW US ON: facebook.com/ibmsecuritysupport SecurityLearningAcademy.com securityintelligence.com xforce.ibmcloud.com Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
26 HTTP Transformation Rules with IBM Security Access Manager 26 IBM Security
Analyzing Hardware Inventory report and hardware scan files
Analyzing Hardware Inventory report and hardware scan files IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by
More informationHow AppScan explores applications with ABE and RBE
How AppScan explores applications with ABE and RBE IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationIBM Security Identity Manager New Features in 6.0 and 7.0
IBM Security Identity Manager New Features in 6.0 and 7.0 IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationIBM Security Access Manager Single Sign-on with Federation
IBM Security Access Manager Single Sign-on with Federation IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationBigFix Query Unleashed!
BigFix Query Unleashed! Lee Wei IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu option. To
More informationMore on relevance checks in ILMT and BFI
More on relevance checks in ILMT and BFI IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate
More informationUsing Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting
Using Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate
More informationJunction SSL Debugging With Wireshark
Junction SSL Debugging With Wireshark IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection menu option.
More informationIBM Security Guardium: : Sniffer restart & High CPU correlation alerts
IBM Security Guardium: : Sniffer restart & High CPU correlation alerts IBM SECURITY SUPPORT OPEN MIC, presented by Lisette Contreras, Guardium Support To hear the WebEx audio, select an option in the Audio
More informationSecurity Support Open Mic Build Your Own POC Setup
IBM Security Access Manager 08/25/2015 Security Support Open Mic Build Your Own POC Setup Panelists Reagan Knowles Level II Engineer Nick Lloyd Level II Support Engineer Kathy Hansen Level II Support Manager
More informationInterpreting relevance conditions in commonly used ILMT/BFI fixlets
Interpreting relevance conditions in commonly used ILMT/BFI fixlets IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog
More informationWhat's new in AppScan Standard version
What's new in AppScan Standard version 9.0.3.5 IBM Audio Security Connection support dialog by Open access Mic the Slides and more information: http://www.ibm.com/support/docview.wss?uid=swg27049311 February
More informationIntroduction to IBM Security Network Protection Manager
Introduction to IBM Security Network Protection Manager IBM SECURITY SUPPORT OPEN MIC Slides are at: https://ibm.biz/bdscvz NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM
More informationQRadar Open Mic: Custom Properties
November 29, 2017 QRadar Open Mic: Custom Properties IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationIBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC. 13 Dec 2017
IBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC 13 Dec 2017 IBM Security Learning Academy www.securitylearningacademy.com New content published
More informationRemote Syslog Shipping IBM Security Guardium
Remote Syslog Shipping IBM Security Guardium IBM Security support Open Mic To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection menu
More informationIBM Security Network Protection
IBM Security Network Protection XGS 5.3.3 firmware release Features and Enhancements IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web
More informationSecurity Support Open Mic Client Certificate Authentication
IBM Security Access Manager, Tuesday, December 8, 2015 Security Support Open Mic Client Certificate Authentication Panelists Jack Yarborough ISAM Level II Nick Lloyd ISAM Level II Scott Stough ISAM Level
More informationDisk Space Management of ISAM Appliance
IBM Security Access Manager Tuesday, 5/3/16 Disk Space Management of ISAM Appliance Panelists David Shen Level 2 Support Engineer Steve Hughes Level 2 Support Engineer Nicholas Hasten Level 2 Support Engineer
More informationWhat's new in AppScan Standard/Enterprise/Source version
What's new in AppScan Standard/Enterprise/Source version 9.0.3.4 support Open Mic Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA
More informationIBM Security Guardium: Troubleshooting No Traffic Issues
IBM Security Guardium: Troubleshooting No Traffic Issues IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationDeploying BigFix Patches for Red Hat
Deploying BigFix Patches for Red Hat IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free: 866-803-2141
More informationISAM Advanced Access Control
ISAM Advanced Access Control CONFIGURING TIME-BASED ONE TIME PASSWORD Nicholas J. Hasten ISAM L2 Support Tuesday, November 1, 2016 One Time Password OTP is a password that is valid for only one login session
More informationConfiguring your policy to prevent appliance problems
Configuring your policy to prevent appliance problems IBM Security Guardium IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate
More informationIBM BigFix Client Reporting: Process, Configuration, and Troubleshooting
IBM BigFix Client Reporting: Process, Configuration, and Troubleshooting IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate
More informationIBM Security Network Protection v Enhancements
IBM Security Network Protection v5.3.3.1 Enhancements IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationIBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions
IBM Security Access Manager open mic webcast July 14, 2015 IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions Panelists Gianluca Gargaro L2 Support Engineer Darren Pond L2
More informationIBM Security Support Open Mic
IBM Security Support Open Mic LET S TALK ABOUT QRADAR 7.2.8 FEATURES Connect to WebEx Audio by selecting an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu
More informationSecurity Support Open Mic: ISNP High Availability and Bypass
Panelists Ed Leisure Knowledge Engineer, Presenter Andrew Sallaway SWAT Consultant Kenji Hamahata L2 Engineer (Japan) Maxime Turlot Product Lead Arthur Testa Product Lead Jeff Dicostanzo Advanced Value
More informationIBM Security Access Manager v8.x Kerberos Part 2
IBM Security Access Manager open mic webcast - Oct 27, 2015 IBM Security Access Manager v8.x Kerberos Part 2 Kerberos Single Sign On using Constrained Delegation Panelists Gianluca Gargaro L2 Support Engineer
More informationISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.
ISAM Federation STANDARDS AND MAPPINGS Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support July 19, 2017 Agenda ISAM Federation Introduction Standards and Protocols Attribute Sources
More informationIBM Security Identity Governance and Intelligence Clustering and High Availability
IBM Security Identity Governance and Intelligence Clustering and High Availability IBM SECURITY SUPPORT Luigi Lombardi: luigi.lombardi@it.ibm.com Gianluca Gargaro: g.gargaro@it.ibm.com Raffaele Sperandeo:
More informationUnderstanding scan coverage in AppScan Standard
IBM Security AppScan Standard Open Mic Webcast January 27, 2015 Understanding scan coverage in AppScan Standard Panelists Shahar Sperling Software Architect at Application Security AppScan Tal Rabinovitch
More informationIBM Threat Protection System: XGS - QRadar Integration
IBM Security Network Protection Support Open Mic - Wednesday, 25 May 2016 IBM Threat Protection System: XGS - QRadar Integration Panelists Tanmay Shah - Presenter Level 2 Support Product Lead Danitza Villaran-Rokovich,
More informationIBM Security Network Protection Open Mic - Thursday, 31 March 2016
IBM Security Network Protection Open Mic - Thursday, 31 March 2016 Application Control and IP Reputation on the XGS Demystified Panelists Tanmay Shah, Presenter IPS/Network Protection Product Lead Bill
More informationMSS VSOC Portal Single Sign-On Using IBM id IBM Corporation
MSS VSOC Portal Single Sign-On Using IBM id Changes to VSOC Portal Sign In Page Users can continue to use the existing Client Sign In on the left and enter their existing Portal username and password.
More informationIBM BigFix Relays Part 1
IBM BigFix Relays Part 1 IBM SECURITY SUPPORT OPEN MIC November 19, 2015 Revised March 2, 2018 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT
More informationXGS & QRadar Integration
IBM Security Support Open Mic - January 28, 2015 XGS & QRadar Integration Advanced Threat Protection Integration Options Panelists Wes Davis Advanced Threat Support Group Engineer (Presenter) Thomas Gray
More informationIBM SECURITY ACCESS MANAGER 9.0 IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE 5.2 AND. Integration CookBook
IBM SECURITY ACCESS MANAGER 9.0 AND IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE 5.2 Integration CookBook Gianluca Gargaro Luigi Lombardi Riccardo Alessandrini Version 1.4 Apr. 2017 Document Control
More informationQRadar Feature Discussion IBM SECURITY SUPPORT OPEN MIC
QRadar 7.2.7 Feature Discussion IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free: 866-803-2141
More informationXGS: Making use of Logs and Captures
IBM Security Network Protection XGS Open Mic webcast #6 June 24, 2015 XGS: Making use of Logs and Captures Panelists Bill Klauke (Presenter) Product Lead L2 Support Maxime Turlot Product Lead L2 Support
More informationIBM BigFix Relays Part 2
IBM BigFix Relays Part 2 IBM SECURITY SUPPORT OPEN MIC December 17, 2015 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING
More informationOptimizing IBM QRadar Advisor with Watson
Optimizing IBM QRadar Advisor with Watson IBM SECURITY SUPPORT OPEN MIC #25 Slides and additional dial in numbers: http://ibm.biz/openmic25 June 8, 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE
More informationLet s Talk About Threat Intelligence
Let s Talk About Threat Intelligence IBM SECURITY SUPPORT OPEN MIC #20 Slides and additional dial in numbers: http://ibm.biz/openmic20 January 26, 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR
More informationXGS Administration - Post Deployment Tasks
IBM Security Network Protection Support Open Mic - 18 November 2015 XGS Administration - Post Deployment Tasks Panelists Tanmay Shah XGS Product Lead, L2 Support (Presenter) Thomas Gray L2 Support Manager
More informationBigFix 101- Server Pricing
BigFix 101- Server Pricing Licensing in a Nutshell BigFix is included with AIX Enterprise Edition (AIX EE). If you have AIX EE on a system, all the cores on that system are covered and any LPAR running
More informationIdentity Governance Troubleshooting
Identity Governance Troubleshooting Chris Weber Level 2 support, IBM Security May 16, 2017 Identity Governance Troubleshooting Support Files contents Accessing different logs and other files though the
More informationIBM MaaS360 Kiosk Mode Settings
IBM MaaS360 Kiosk Mode Settings Configuration Settings for Kiosk Mode Operation IBM Security September 2017 Android Kiosk Mode IBM MaaS360 provides a range of Android device management including Samsung
More informationIBM Guardium Data Encryption
IBM Guardium Data Encryption RELEASE TAXONOMY FOR LINUX/AIX/WINDOWS 10-October-2018 GDE Taxonomy Version V.0.0.0 Major V.R.0.0 Mod V.R.M.0 SSE V.R.M.F Fixpack V.R.M.F Cadence 36-48 Months 12-15 Months
More informationIBM Security Directory Server: Utilizing the Audit.log
IBM Security Directory Server Open Mic Webcast #1 November 4, 2014 IBM Security Directory Server: Utilizing the Audit.log Panelists Roy Spencer L2LDAP Technical Lead Ram Reddy L2LDAP Senior Engineer Benjamin
More informationHow to properly deploy, configure and upgrade the NAB
Panelists Jeff DiCostanzo, Presenter AVP Team Lead Bill Klauke - Level 2 Product Lead Maxime Turlot - Level 2 Product Lead Ryan Andersen - Level 2 Senior Engineer Edward A Romero - Level 3 Network Security
More informationGX vs XGS: An administrator s comparison of the two products
: An administrator s comparison of the two products Panelists Bill Klauke IPS Product Lead, Level 2 Support Matthew Elsner XGS Development Yuceer (Banu) Ilgen XGS Development Jeff Dicostanzo AVP Support
More informationSWD & SSA Updates 2018
SWD & SSA Updates 2018 Stephen Hull STSM, BigFix Development 04/09/2018 Latest SWD & SSA features What s shiny and new? SWD Support multiple tasks for a software pkg Install, Update, Uninstall, etc Export/Import
More informationThreat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES
Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES Agenda Welcome Threat Intelligence EcoSystem Cyber Resiliency
More informationConfiguring zsecure To Send Data to QRadar
Configuring zsecure To Send Data to QRadar CONFIGURATION, SETUP, AND EXAMPLES Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free:
More informationIBM Security Access Manager for Versions 9.0.2, IBM Security App Exchange Installer for ISAM
IBM Security Access Manager for Versions 9.0.2, 9.0.3 IBM Security App Exchange Installer for ISAM Contents PREFACE... 3 Access to publications and terminology... 3 Publication Library... 3 IBM Terminology
More informationMay the (IBM) X-Force Be With You
Ann Arbor, Michigan July 23-25 May the (IBM) X-Force Be With You A QUICK PEEK INTO ONE OF THE MOST RENOWNED SECURITY TEAMS IN THE WORLD Marlon Machado Worldwide Standardization Leader, Application Security
More informationIntegrated, Intelligence driven Cyber Threat Hunting
Integrated, Intelligence driven Cyber Threat Hunting THREAT INVESTIGATION AND RESPONSE PLATFORM Zsolt Kocsis IBM Security Technical Executive, CEE zsolt.kocsis@hu.ibm.com 6th Nov 2018 Build an integrated
More informationRBS NetGain Enterprise Manager Multiple Vulnerabilities of 11
RBS-2018-004 NetGain Enterprise Manager Multiple Vulnerabilities 2018-03-22 1 of 11 Table of Contents Vendor / Product Information 3 Vulnerable Program Details 3 Credits 3 Impact 3 Vulnerability Details
More informationSecuring global enterprise with innovation
IBM Cybersecurity Securing global enterprise with innovation Shamla Naidoo VP, IBM Global CISO August 2018 Topics 01 02 03 Securing Large Complex Enterprise Accelerating With Artificial Intelligence And
More informationVersion Moodle Module v3.0 for Web Conferencing Configuration and Installation Guide
Version 12.5 Moodle Module v3.0 for Web Conferencing Configuration and Installation Guide June 1, 2013 Table of Contents Preface 1 Purpose of This Guide 1 Audience 1 Help and Other Resources 2 Technical
More informationFabrizio Patriarca. Come creare valore dalla GDPR
Fabrizio Patriarca Come creare valore dalla GDPR Disclaimer Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data
More informationSecuring communication between SDS VA and its remote DB2 DB
Securing communication between SDS 8.0.1 VA and its remote DB2 DB IBM SECURITY SUPPORT OPEN MIC PRESENTATION Ramamohan T Reddy - Senior Software Engineer / L2 Team Tech Lead - Directory Support Team Brook
More informationTroubleshooting Guide
IBM Security Access Manager for Mobile Version 8 Release 0 Troubleshooting Guide GC27-6209-00 IBM Security Access Manager for Mobile Version 8 Release 0 Troubleshooting Guide GC27-6209-00 Note Before
More informationIBM Single Sign On for Bluemix Version 2.0. Identity Bridge Troubleshooting topics
IBM Single Sign On for Bluemix Version 2.0 Identity Bridge Troubleshooting topics IBM Single Sign On for Bluemix Version 2.0 Identity Bridge Troubleshooting topics ii IBM Single Sign On for Bluemix Version
More informationThe New Era of Cognitive Security
The New Era of Cognitive Security IBM WATSON SUMMIT KANOKSAK RATCHAPAT Senior Technical Sales 1 Today s security challenges ACTORS TARGETS VECTORS REALITY Organized Crime Healthcare Ransomware Cloud, mobile,
More informationLet's talk about QRadar Apps: Development & Troubleshooting IBM SECURITY SUPPORT OPEN MIC
Let's talk about QRadar Apps: Development & Troubleshooting IBM SECURITY SUPPORT OPEN MIC Slides and additional dial in numbers: http://ibm.biz/joinqradaropenmic August 23, 2017 NOTICE: BY PARTICIPATING
More informationModern Realities of Securing Active Directory & the Need for AI
Modern Realities of Securing Active Directory & the Need for AI Our Mission: Hacking Anything to Secure Everything 7 Feb 2019 Presenters: Dustin Heywood (EvilMog), Senior Managing Consultant, X-Force Red
More informationPerformance tuning in SDS VA with a remote DB2 DB
Performance tuning in SDS 8.0.1 VA with a remote DB2 DB IBM SECURITY SUPPORT OPEN MIC PRESENTATION Ramamohan T Reddy - Senior Software Engineer / L2 Team Tech Lead - Directory Support Team Dave Bachmann
More informationRedpaper. IBM Tivoli Access Manager for e-business: Junctions and Links. Overview. URLs, links, and junctions. Axel Buecker Ori Pomerantz
Redpaper Axel Buecker Ori Pomerantz IBM Tivoli Access Manager for e-business: Junctions and Links Overview IBM Tivoli Access Manager for e-business can manage and enforce access control to Web-based resources
More informationIBM MaaS360 with Watson Evaluator s Guide. Version 2.2
IBM MaaS360 with Watson Evaluator s Guide Version 2.2 Introduction Welcome to the IBM MaaS360 with Watson Evaluator s Guide. This document provides you with a self-guided, hands-on review of our leading
More informationCybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY
Cybersecurity THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Gary Meshell World Wide Leader Financial Services Industry IBM Security March 21 2019 You have been breached; What Happens Next 2 IBM Security
More informationIBM Security Access Manager Firmware Update ISS-ISAM-FP0001 README
IBM Security Access Manager Firmware Update 9.0.0-ISS-ISAM-FP0001 README Copyright International Business Machines Corporation 2013, 2015. All rights reserved. U.S. Government Users Restricted Rights --
More informationREALIZATION CONCEPT Version: 1.02
REALIZATION CONCEPT Version: 1.02 Status: Approved Type of project: Restart Project name: Project no.: Storage location: Author: Project oversight: PC Direct Marketer Interface PN313021 L:\05_Product_Management\500_Products\580_Solutions\Direkt_marke
More informationIBM Application Security on Cloud
April, 2017 IBM Application Security on Cloud Service Overview Security has and will always be about understanding, managing, and mitigating the risk to an organization s most critical assets. - Dr. Eric
More informationIBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT
IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT NOTICE Clients are responsible for ensuring their own compliance with various laws and regulations, including the
More informationFive9 Plus Adapter for Agent Desktop Toolkit
Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center
More informationOracle Profitability and Cost Management Cloud. November 2017 Update (17.11) What s New
Oracle Profitability and Cost Management Cloud November 2017 Update (17.11) What s New TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE PROFITABILITY AND COST MANAGEMENT CLOUD, NOVEMBER UPDATE... 3 ANNOUNCEMENTS
More informationIBM SECURITY ACCESS MANAGER
IBM SECURITY ACCESS MANAGER Virtual Machine Cookbook Configuring an ISAM VM for basic tasks 9.0.2.0 David Lord Version 1.0.0 April 2017 Table of Contents 1 Introduction... 3 1.1 Required Components...
More informationOpen Mic Webcast. IBM Sametime Media Manager Troubleshooting Tips and Tricks. Tony Payne Sr. Software Engineer May 20, 2015
Open Mic Webcast IBM Sametime Media Manager Troubleshooting Tips and Tricks Tony Payne Sr. Software Engineer May 20, 2015 Agenda Troubleshooting Basics Setting a diagnostic trace Finding the right trace
More informationUnified CCX Administration Web Interface
The Unified CCX provides a multimedia (voice, data, and web) IP-enabled customer-care application environment, using VoIP technology that allows your Cisco Unified Communications network to share resources
More informationHow to Secure Your Cloud with...a Cloud?
A New Era of Thinking How to Secure Your Cloud with...a Cloud? Eitan Worcel Offering Manager - Application Security on Cloud IBM Security 1 2016 IBM Corporation 1 A New Era of Thinking Agenda IBM Cloud
More informationThe Evolved Office Assistant
The Evolved Office Assistant USER GUIDE TM 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Release 1.0 Document Version 1 Copyright Notice Copyright 2008 Evolve IP,
More informationDeploying Lookout with IBM MaaS360
Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,
More informationOracle Cloud Using the Google Calendar Adapter. Release 17.3
Oracle Cloud Using the Google Calendar Adapter Release 17.3 E68599-09 October 2017 Oracle Cloud Using the Google Calendar Adapter, Release 17.3 E68599-09 Copyright 2015, 2017, Oracle and/or its affiliates.
More informationWebEx Meeting Participant Guide
WebEx Meeting Participant Guide Signing On to a WebEx Meeting 1 Attending a WebEx Meeting 3 WebEx Meeting Tabs 4 WebEx Meeting Audio Information 6 Streaming Audio 6 Phone Audio 8 WebEx Meeting Panels 10
More informationRSA Authentication Manager Adapter User Guide
IBM Security Identity Manager Version 6.0 RSA Authentication Manager Adapter User Guide SC27-4409-04 IBM Security Identity Manager Version 6.0 RSA Authentication Manager Adapter User Guide SC27-4409-04
More informationBlueJeans Events Instructions for Moderators. October 2017
BlueJeans Events Instructions for Moderators October 2017 Scheduling Events Schedule an Event 1. Enter an Event Title 2. Provide a Description 3. Select an available Event Size (your plan will dictate
More informationKTH ROYAL INSTITUTE OF TECHNOLOGY. Remote Invocation. Vladimir Vlassov and Johan Montelius
KTH ROYAL INSTITUTE OF TECHNOLOGY Remote Invocation Vladimir Vlassov and Johan Montelius Middleware Application layer Remote invocation / indirect communication Socket layer Network layer 2 Request / Reply
More informationIBM Security Access Manager Version 9.0 October Product overview IBM
IBM Security Access Manager Version 9.0 October 2015 Product overview IBM IBM Security Access Manager Version 9.0 October 2015 Product overview IBM ii IBM Security Access Manager Version 9.0 October 2015:
More informationSupportCenter Getting Started Guide
SupportCenter Getting Started Guide In partnership with WebEx Communications, Inc, we provide SupportCenter web conferencing services. Because SupportCenter is powered by WebEx TM, this guide makes several
More informationCisco WebEx Meetings Server User Guide Release 2.5
First Published: July 14, 2014 Last Modified: October 23, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationQuick Start Guide. Screen Sharing. Document Revision: (May 12, 2016)
Quick Start Guide Screen Sharing Document Revision: 1.0.3 (May 12, 2016) 2 Table of Contents Quick Start Guide... 1 Starting Application... 3 Joining a Online Meeting... 6 Copyright... 7 For full documentation
More information(System) Integrity attacks System Abuse, Malicious File upload, SQL Injection
Pattern Recognition and Applications Lab (System) Integrity attacks System Abuse, Malicious File upload, SQL Injection Igino Corona igino.corona (at) diee.unica.it Computer Security April 9, 2018 Department
More informationConfiguring and Troubleshooting ATAP and EXIT Functionalities for Database Traffic Collection
Configuring and Troubleshooting ATAP and EXIT Functionalities for Database Traffic Collection IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by
More informationPolycom RealPresence Web Suite
USER GUIDE 2.1.2 October 2016 3725-03305-005G Polycom RealPresence Web Suite Copyright 2016, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language
More informationBe effective in protecting against the cybercrime
Be effective in protecting against the cybercrime INTEGRATED SECURITY FOR A NEW ERA Domenico Raguseo Domenico Scardicchio Luca Bizzotto Simone Riccetti Technical Sales Manager, Europe Software Procdut
More informationAttending a Meeting. Tips for Attending a Meeting
Attending a Meeting Tips for Attending a Meeting, page 1 Tips for Attending a Video Meeting, page 2 About the Auto-Attend Feature, page 3 Attending a Meeting from an Emailed Invitation, page 4 Attending
More informationPolycom RealPresence Media Manager
RELEASE NOTES Software 6.0.5.1 February 2013 3725-75300-001 Rev C1 Polycom RealPresence Media Manager 6.0.5.1 About these Release Notes The newest release of Polycom RealPresence Media Manager software,
More informationIntel Unite Solution Intel Unite Plugin for WebEx*
Intel Unite Solution Intel Unite Plugin for WebEx* Version 1.0 Legal Notices and Disclaimers All information provided here is subject to change without notice. Contact your Intel representative to obtain
More information