Interpreting relevance conditions in commonly used ILMT/BFI fixlets
|
|
- Jasper Sutton
- 5 years ago
- Views:
Transcription
1 Interpreting relevance conditions in commonly used ILMT/BFI fixlets IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu option. To ask a question by voice, you must either Call In or have a microphone on your device. You will not hear sound until the host opens the audio line. For more information, visit: 25 April 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING THE CALL, AS WELL AS TO IBM S USE OF SUCH RECORDING IN ANY AND ALL MEDIA, INCLUDING FOR VIDEO POSTINGS ON YOUTUBE. IF YOU OBJECT, PLEASE DO NOT CONNECT TO THIS CALL.
2 Panelists Michał Zalas Presenter ILMT/BFI L2 support member Leslie Gomba ILMT/BFI L2 support member Andrei Ionescu ILMT/BFI L2 support member Khalid Yahya ILMT/BFI L2 support member Hope Maxwell-Daley Moderator ILMT/BFI L2 support team leader 2 IBM Security
3 Goal of session IBM License Metric Tool and IBM BigFix Inventory applications in version 9.x reuse IBM BigFix infrastructure. Instructions to deploy so-called CIT scanner (module allowing to perform scans), run hardware scans or initiate software scans are propagated to endpoints by means of designated fixlets. Those fixlets contain sets of conditions specifying prerequisites for a particular fixlet task to be performed on the endpoint. The goal of this session is to present steps which allow ILMT/BFI users to verify why the most common fixlets are not relevant for a particular endpoint. 3 IBM Security
4 Agenda Checking the fixlet site version Updating the fixlet site Checking fixlet relevance Install or Upgrade Scanner fixlet Initiate Software Scan fixlet Run Capacity Scan and Upload Results fixlet 4 IBM Security
5 Checking the fixlet site version
6 Checking the fixlet site version 6 IBM Security ILMT: Version: 95 BFI: Version: 86
7 Checking the fixlet site version ILMT: Version: 95 BFI: Version: 86 7 IBM Security
8 Updating the fixlet site
9 Updating the fixlet site The content of the ILMT/BFI fixlet site can be periodically modified. New fixlets, tasks, and analyses can be added. The existing ones can be changed or might become obsolete due to functionality changes. If the BigFix server is installed on a computer with the Internet access, the ILMT/BFI fixlet site is updated automatically whenever the updates are available. However, if the BigFix server is installed on a computer without the Internet access, user must update the ILMT/BFI fixlet site manually. The process is described in detail under the Updating the fixlet site chapter of ILMT/BFI documentation: ILMT BFI Note: All the open fixlet actions started before the fixlet site update will remain running with that old definition until they expire. You need to stop and re-run a fixlet for the new definition to be used. 9 IBM Security
10 Checking fixlet relevance
11 Checking relevance In order to see all the fixlets under ILMT/BFI site, click on the Show Non-Relevant Content button: 11 IBM Security
12 Checking relevance 12 IBM Security
13 Checking relevance Starting from ILMT/BFI it is possible to use a feature called Analyze the Relevance of a Fixlet or Task to evaluate relevance conditions of fixlets available under ILMT/BFI site. 13 IBM Security
14 Checking relevance From the drop-down list choose from among ILMT/BFI fixlets. A result is creation of a new analysis which covers all the endpoints subscribed to ILMT/BFI site. The new analysis gets created under Master Action Site of BigFix. It can be reviewed under Analyses section. Its name pattern is Relevance Check for the Task/Fixlet: source fixlet name. 14 IBM Security
15 Checking relevance After a short moment, required for endpoints to receive instructions from BigFix server and return information on relevance conditions evaluation, the newly created analysis gets populated with results: 15 IBM Security
16 Checking relevance Under analysis Results tab, every column named Relevance # maps to the source fixlet relevance condition with the same number under fixlet Details tab. Exemplary relevance conditions will be explained in the following slides. If a particular condition is met on the endpoint, then its analysis result column entry shows True. Otherwise the False value is displayed. Note: If a particular fixlet condition is not met it does not indicate an error. It may also mean that it is a temporary state, e.g. due a scan operation already running, scanner already installed in the same version, etc. All the fixlet conditions must show True for the fixlet to be relevant. The relevance check process is covered in ILMT/BFI documentation at: ILMT BFI 16 IBM Security
17 Checking relevance Common files and locations evaluated by relevance conditions of Install or Upgrade Scanner, Initiate Software Scan and Run Capacity Scan and Upload Results fixlets: CIT scanner configuration file from - %WINDIR%\cit\cit.ini - /etc/cit/cit.ini CIT scanner home directory specified by CIT_HomeDirectory key value in cit.ini configuration file BigFix client location e.g. - C:\Program Files (x86)\bigfix Enterprise\BES Client\ - /var/opt/besclient/lmt/cit ILMT/BFI scan data folder under BigFix client directory e.g. - C:\Program Files (x86)\bigfix Enterprise\BES Client\LMT\CIT - /var/opt/besclient/lmt/cit 17 IBM Security
18 Install or Upgrade Scanner
19 Install or Upgrade Scanner Relevance 1 (if (name of it as lowercase starts with "win") then (true) else ((name of it as lowercase starts with "linux") OR (name of it as lowercase starts with "aix") OR (name of it as lowercase starts with "mac") OR (name of it as lowercase starts with "hp-ux" AND ((architecture of it as lowercase contains "ia64") OR (family name of main processor as lowercase contains "pa-risc") OR (exists match (regex "^PA8[0-9]{3}(\s+)?$") of (family name of main processor)))) OR (exists match (regex "sunos 5\.( )") of (name of it as lowercase)) of operating system)) of operating system AND (if exists property "in proxy agent context" then ( not in proxy agent context ) else true) Since the release of the IBM Endpoint Manager for Mobile Devices that supports Android, Apple ios and other devices, BigFix installations may include proxy agents in order to support these new devices. Many fixlets contain the relevance above in order to exclude proxy agents from executing. This ensures that proxy agents will not try to execute the fixlet. Relevance 2 not exists settings whose (name of it equals "CIT_Deny" AND value of it = "1") of client This condition checks if the endpoint has a setting named CIT_Deny set to 1. To verify it, right-click on the computer name and choose Edit Computer Settings.... It is set if the Add Targeting Exception fixlet was run earlier to prevent the endpoint from being targeted by the scanner actions. To revert this change run Remove Targeting Exception fixlet. 19 IBM Security
20 Install or Upgrade Scanner Relevance 3 ((name of it as lowercase starts with "win") OR (name of it as lowercase starts with "linux") OR (name of it as lowercase starts with "aix") OR (name of it as lowercase starts with "hp-ux") OR ((name of it as lowercase starts with "sunos 5") AND NOT (name of it as lowercase contains "sunos 5.7")) OR (name of it as lowercase starts with "mac")) of operating system This condition checks if the endpoint is running an operating system type supported by ILMT/BFI. Please refer to Supported operating systems documentation chapter. Relevance 4 (NOT (((name of operating system as lowercase starts with "win") AND (exists folder "cit" of folder (value of variable "windir" of environment))) OR ((NOT (name of operating system as lowercase starts with "win")) AND (exists folder "/etc/cit")))) OR (... long text skipped...) This condtion evaluates if exists the scanner configuration folder named cit located in %WINDIR% directory of Microsoft Windows or /etc/cit in case of other plaftforms. If it is not present then installation can continue. If it turns out to be present, then this fixlet condition checks present configuration to retrieve information on current scanner home directory and scanner version to determine if a newer version should be deployed. Fixlet description always mentions scanner version meant to be installed (e.g ) and user may verify current scanner version on endpoint by means of Scanner Information analysis in BigFix console. Alternatively, it can be read as the "CIT_Version" key value from the cit.ini configuration file on the endpoint. 20 IBM Security
21 Install or Upgrade Scanner Relevance 5 if (name of operating system as lowercase starts with "win") then ((free space of drive of (if (version of client >= "9" as version) then (parent folder of data folder of client) else (parent folder of regapp "besclient.exe")) > ) and (if (exists (folder "cit" of folder (value of variable "windir" of environment)) whose (exists file "cit.ini" of it) and (exists folder (key "CIT_HomeDirectory" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)))) then (free space of drive of (folder (key "CIT_HomeDirectory" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment))) > ) else (free space of drive of folder (value of variable "ProgramFiles" of environment) > ))) else if (not(name of operating system as lowercase starts with "mac")) then ((free space of drive of (if (version of client >= "9" as version) then (parent folder of data folder of client) else (parent folder of parent folder of client folder of site "actionsite")) > ) and (if (exists (folder "/etc/cit") whose (exists file "cit.ini" of it) and (exists folder (key "CIT_HomeDirectory" of file "cit.ini" of folder "/etc/cit"))) then (free space of drive of (folder (key "CIT_HomeDirectory" of file "cit.ini" of folder "/etc/cit")) > ) else (free space of drive of (folder "/opt") > ))) else true This condition checks if the endpoint has at least 20MB of free space in BigFix client location. Additionally at least 50MB of free space is required on the drive/filesystem with CIT scanner home directory. It is read from the cit.ini configuration file. If CIT scanner is not present, then this space condition is checked against the Program Files directory (Windows) or /opt (Linux). 21 IBM Security
22 Install or Upgrade Scanner Relevance 6 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "wscansw") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "wscansw"))) else (not exists process whose (name of it = "wscansw.exe" or name of it = "wscansw")) This condition checks if on the endpoint there is no wscansw process running at the moment of scanner installation attempt. That process is responsible for software scans and evaluation of software catalog repository of software discovery rules. In case of large filesystems SW scan may last a couple of hours preventing scanner upgrade. Relevance 7 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "wscanfs") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "wscanfs"))) else (not exists process whose (name of it = "wscanfs.exe" or name of it = "wscanfs")) This condition checks if on the endpoint there is no wscanfs process running at the moment of scanner installation attempt. That process is responsible for filesystem scans. In case of large filesystems scan may last a couple of hours preventing scanner upgrade. 22 IBM Security
23 Install or Upgrade Scanner Relevance 8 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "itsit") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "itsit"))) else (not exists process whose (name of it = "itsit.exe" or name of it = "itsit")) This condition checks if on the endpoint there is no itsit process running at the moment of scanner installation attempt. That is a legacy process from IBM SUA 2.x product line, responsible for filesystem scans. Relevance 9 if (name of operating system as lowercase contains "mac") then "SUA"="INV" else true This condition is checked only for Mac OS and is related to support of BES Inventory and License fixlet site. For more information on this site, refer to 23 IBM Security
24 Initiate Software Scan
25 Initiate Software Scan Relevance 1 (if (name of it as lowercase starts with "win") then (true) else ((name of it as lowercase starts with "linux") OR (name of it as lowercase starts with "aix") OR (name of it as lowercase starts with "mac") OR (name of it as lowercase starts with "hp-ux" AND ((architecture of it as lowercase contains "ia64") OR (family name of main processor as lowercase contains "pa-risc") OR (exists match (regex "^PA8[0-9]{3}(\s+)?$") of (family name of main processor)))) OR (exists match (regex "sunos 5\.( )") of (name of it as lowercase)) of operating system)) of operating system AND (if exists property "in proxy agent context" then ( not in proxy agent context ) else true) Since the release of the IBM Endpoint Manager for Mobile Devices that supports Android, Apple ios and other devices, BigFix installations may include proxy agents in order to support these new devices. Many fixlets contain the relevance above in order to exclude proxy agents from executing. This ensures that proxy agents will not try to execute the fixlet. Relevance 2 not exists settings whose (name of it equals "CIT_Deny" AND value of it = "1") of client This condition checks if the endpoint has a setting named CIT_Deny set to 1. To verify it, right-click on the computer name and choose Edit Computer Settings.... It is set if the Add Targeting Exception fixlet was run earlier to prevent the endpoint from being targeted by the scanner actions. To revert this change run Remove Targetting Exception fixlet. 25 IBM Security
26 Initiate Software Scan Relevance 3 (if (name of operating system as lowercase starts with "win") then (exists (folder "cit" of folder (value of variable "windir" of environment)) whose (exists file "cit.ini" of it) and (exists folder ((key "CIT_HomeDirectory" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)) & "\bin") whose ((exists file "wscansw.exe" of it) and (exists file "wscanfs.exe" of it)))) else (exists (folder "/etc/cit") whose (exists file "cit.ini" of it) and (exists folder ((key "CIT_HomeDirectory" of file "cit.ini" of folder "/etc/cit") & "/bin") whose ((exists file "wscansw" of it) and (exists file "wscanfs" of it))))) OR (name of operating system as lowercase starts with "mac") This condition checks for scanner configuration file (cit.ini) to read information on scanner home directory and locate binaries required to run a softwatre scan (wscansw, wscanfs). Relevance 4 name of operating system as lowercase starts with "mac") OR ((if (name of operating system as lowercase starts with "win") then (key "CIT_Version" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)) else (key "CIT_Version" of file "cit.ini" of folder "/etc/cit")) >= " ") This condition checks for scanner configuration file (cit.ini) to read information on scanner version. It should be at least User may verify current scanner version on endpoint by means of Scanner Information analysis in BigFix console. Alternatively, it can be read as the "CIT_Version" key value from the cit.ini file on the endpoint. Run Install or Upgrade Scanner fixlet if CIT scanner version is obsolete. 26 IBM Security
27 Initiate Software Scan Relevance 5 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "wscansw") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "wscansw"))) else (not exists process whose (name of it = "wscansw.exe" or name of it = "wscansw")) This condition checks if on the endpoint there is no wscansw process already running. That process is responsible for software scans and evaluation of software catalog repository of software discovery rules. In case of large filesystems SW scan may last a couple of hours preventing subsequent runs. Relevance 6 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "wscanfs") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "wscanfs"))) else (not exists process whose (name of it = "wscanfs.exe" or name of it = "wscanfs")) This condition checks if on the endpoint there is no wscanfs process already running. That process is responsible for filesystem scans. In case of large filesystems scan may last a couple of hours preventing subsequent runs. 27 IBM Security
28 Initiate Software Scan Relevance 7 (if (name of operating system as lowercase starts with "win") then ((exists (folder "cit" of folder (value of variable "windir" of environment)) whose (exists file "cit.ini" of it)) and ((key "CIT_Exploiters" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)) contains "SUA:")) else ((exists (folder "/etc/cit") whose (exists file "cit.ini" of it)) and ((key "CIT_Exploiters" of file "cit.ini" of folder "/etc/cit") contains "SUA:"))) OR (name of operating system as lowercase starts with "mac") This condition checks for scanner configuration file (cit.ini) to read information on scanner exploiters (CIT_exploiters). ILMT/BFI tag is SUA:. It is set by the Install or Upgrade Scanner fixlet. The SUA: tag is required to run a scan. If it is missing run Install or Upgrade Scanner fixlet. Relevance 8 (name of operating system as lowercase starts with "mac") OR (if (name of operating system as lowercase starts with "win") then (exists file "catalog.xml.bz2" of folder ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT") or exists file "catalog.xml" of folder ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT")) else (exists file "catalog.xml.bz2" of folder (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT") or exists file "catalog.xml" of folder (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT"))) This condition checks if under LMT\CIT subfolder of BigFix client there is so-called software catalog present. Software catalog is a repository of software discovery rules used by scanner. If catalog is not present, run Catalog Download fixlet. It is described in Updating scanner catalogs chapter of ILMT/BFI documentation. 28 IBM Security
29 Initiate Software Scan Relevance 9 (name of operating system as lowercase starts with "mac") OR (if (name of operating system as lowercase starts with "win") then (exists file "bzip2.exe" of folder ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT")) else (exists file "bzip2" of folder (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT"))) This condition checks if under LMT\CIT subfolder of BigFix client there is bzip2 archiver present. It is required to compress scan results. It is deployed by the Install or Upgrade Scanner fixlet. Relevance 10 NOT (if (name of operating system as lowercase starts with "win") then (exists file ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT\cit_config.xml")) else (exists file (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT/cit_config.xml"))) OR (name of operating system as lowercase starts with "mac") This condition checks if under BigFix client directory, in LMT\CIT subfolder there is no cit_config.xml file. That is a legacy configuration file related to IBM SUA 2.x product line. If it is still present, then the Install or Upgrade Scanner fixlet should be run. 29 IBM Security
30 Initiate Software Scan Relevance 11 if (name of operating system as lowercase starts with "win") then (exists file "zip.exe" of folder ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT")) else if (((name of it as lowercase starts with "sunos 5") AND NOT (name of it as lowercase contains "sunos 5.7")) of operating system) then (exists pkginfo whose (pkginst of it contains "gzip") of pkgdb) else true This condition checks if under LMT\CIT subfolder of BigFix client on Microsoft Windows there is zip.exe archiver present. It is deployed by Install or Upgrade Scanner fixlet. In case of Solaris 5.x OS (except 5.7) the gzip package is required. Other OS types are not evaluated by this condition. Refer to Supported operating systems documentation chapter. 30 IBM Security
31 Run Capacity Scan and Upload Results
32 Run Capacity Scan and Upload Results Relevance 1 (if (name of it as lowercase starts with "win") then (true) else ((name of it as lowercase starts with "linux") OR (name of it as lowercase starts with "aix") OR (name of it as lowercase starts with "mac") OR (name of it as lowercase starts with "hp-ux" AND ((architecture of it as lowercase contains "ia64") OR (family name of main processor as lowercase contains "pa-risc") OR (exists match (regex "^PA8[0-9]{3}(\s+)?$") of (family name of main processor)))) OR (exists match (regex "sunos 5\.( )") of (name of it as lowercase)) of operating system)) of operating system AND (if exists property "in proxy agent context" then ( not in proxy agent context ) else true) Since the release of the IBM Endpoint Manager for Mobile Devices that supports Android, Apple ios and other devices, BigFix installations may include proxy agents in order to support these new devices. Many fixlets contain the relevance above in order to exclude proxy agents from executing. This ensures that proxy agents will not try to execute the fixlet. Relevance 2 not exists settings whose (name of it equals "CIT_Deny" AND value of it = "1") of client This condition checks if the endpoint has a setting named CIT_Deny set to 1. To verify it, right-click on the computer name and choose Edit Computer Settings.... It is set if the Add Targeting Exception fixlet was run earlier to prevent the endpoint from being targeted by the scanner actions. To revert this change run Remove Targetting Exception fixlet. 32 IBM Security
33 Run Capacity Scan and Upload Results Relevance 3 if (name of operating system as lowercase starts with "win") then (exists (folder "cit" of folder (value of variable "windir" of environment)) whose (exists file "cit.ini" of it) and (exists folder ((key "CIT_HomeDirectory" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)) & "\bin") whose (exists file "wscanhw.exe" of it))) else (exists (folder "/etc/cit") whose (exists file "cit.ini" of it) and (exists folder ((key "CIT_HomeDirectory" of file "cit.ini" of folder "/etc/cit") & "/bin") whose (exists file "wscanhw" of it))) This condition checks for scanner configuration file (cit.ini) to read information on scanner home directory ( CIT_HomeDirectory key) and locate binaries required to run a hardware scan (wscanhw). Relevance 4 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "wscanhw") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "wscanhw"))) else (not exists process whose (name of it = "wscanhw.exe" or name of it = "wscanhw")) This condition checks if on the endpoint there is no wscanhw process already running. That process is responsible for hardware capacity scans. 33 IBM Security
34 Run Capacity Scan and Upload Results Relevance 5 if (name of operating system as lowercase starts with "win") then ((exists (folder "cit" of folder (value of variable "windir" of environment)) whose (exists file "cit.ini" of it)) and ((key "CIT_Exploiters" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)) contains "SUA:")) else ((exists (folder "/etc/cit") whose (exists file "cit.ini" of it)) and ((key "CIT_Exploiters" of file "cit.ini" of folder "/etc/cit") contains "SUA:")) This condition checks for scanner configuration file (cit.ini) to read information on scanner exploiters (CIT_exploiters). ILMT/BFI tag is SUA:. It is set by the Install or Upgrade Scanner fixlet. The SUA: tag is required to run a scan. If it is missing run Install or Upgrade Scanner fixlet. Relevance 6 if (name of operating system as lowercase starts with "win") then (exists folder ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT")) else (exists folder (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT")) This condition checks if under BigFix client directory there is LMT\CIT subfolder where scan results are meant to be placed. It is created by the Install or Upgrade Scanner fixlet. 34 IBM Security
35 Run Capacity Scan and Upload Results Relevance 7 NOT (if (name of operating system as lowercase starts with "win") then (exists file ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT\cit_config.xml")) else (exists file (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT/cit_config.xml"))) This condition checks if under BigFix client directory, in LMT\CIT subfolder there is no cit_config.xml file. That is a legacy configuration file related to IBM SUA 2.x product line. If it is still present, then the Install or Upgrade Scanner fixlet should be run. Relevance 8 if (((name of it as lowercase starts with "sunos 5") AND NOT (name of it as lowercase contains "sunos 5.7")) of operating system) then (exists pkginfo whose (pkginst of it contains "gzip") of pkgdb) else true This condition checks if in case of Solaris 5.x OS (except 5.7) the gzip package exists. Other OS types are not evaluated by this condition. Refer to Supported operating systems documentation chapter. 35 IBM Security
36 Troubleshooting
37 Troubleshooting Additional troubleshooting steps: Restart BigFix client process on the endpoint In BigFix console right-click on the endpoint computer name and click Send Refresh 37 IBM Security
38 Questions for the panel Now is your opportunity to ask questions of our panelists. To ask a question now: Raise your hand by clicking Raise Hand. The Raise Hand icon appears next to your name in the Attendees panel on the right in the WebEx Event. The host will announce your name and unmute your line. or Type a question in the box below the Ask drop-down menu in the Q&A panel. Select All Panelists from the Ask drop-down-menu. Click Send. Your message is sent and appears in the Q&A panel. To ask a question after this presentation: You are encouraged to participate in the dw Answers forums for ILMT: BigFix Inventory: 38 IBM Security
39 Where do you get more information? License Metric Tool wiki: Security Learning Academy training roadmap for BigFix Inventory and ILMT: More articles you can review: IBM developerworks articles: - ILMT 9.2.x - BFI 9.2.x IBM Knowledge Center: - ILMT 9.2.x - BFI 9.2.x Useful links: Get started with IBM Security Support IBM Support Portal Sign up for My Notifications Follow us: 39 IBM Security
40 THANK YOU FOLLOW US ON: securityintelligence.com xforce.ibmcloud.com Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
More on relevance checks in ILMT and BFI
More on relevance checks in ILMT and BFI IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate
More informationAnalyzing Hardware Inventory report and hardware scan files
Analyzing Hardware Inventory report and hardware scan files IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by
More informationBigFix Query Unleashed!
BigFix Query Unleashed! Lee Wei IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu option. To
More informationHow AppScan explores applications with ABE and RBE
How AppScan explores applications with ABE and RBE IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationHTTP Transformation Rules with IBM Security Access Manager
HTTP Transformation Rules with IBM Security Access Manager IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationIBM Security Identity Manager New Features in 6.0 and 7.0
IBM Security Identity Manager New Features in 6.0 and 7.0 IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationDeploying BigFix Patches for Red Hat
Deploying BigFix Patches for Red Hat IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free: 866-803-2141
More informationIBM BigFix Client Reporting: Process, Configuration, and Troubleshooting
IBM BigFix Client Reporting: Process, Configuration, and Troubleshooting IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate
More informationUsing Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting
Using Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate
More informationIBM BigFix Relays Part 1
IBM BigFix Relays Part 1 IBM SECURITY SUPPORT OPEN MIC November 19, 2015 Revised March 2, 2018 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT
More informationQRadar Open Mic: Custom Properties
November 29, 2017 QRadar Open Mic: Custom Properties IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationIntroduction to IBM Security Network Protection Manager
Introduction to IBM Security Network Protection Manager IBM SECURITY SUPPORT OPEN MIC Slides are at: https://ibm.biz/bdscvz NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM
More informationWhat's new in AppScan Standard version
What's new in AppScan Standard version 9.0.3.5 IBM Audio Security Connection support dialog by Open access Mic the Slides and more information: http://www.ibm.com/support/docview.wss?uid=swg27049311 February
More informationIBM Security Access Manager Single Sign-on with Federation
IBM Security Access Manager Single Sign-on with Federation IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationIBM Security Guardium: : Sniffer restart & High CPU correlation alerts
IBM Security Guardium: : Sniffer restart & High CPU correlation alerts IBM SECURITY SUPPORT OPEN MIC, presented by Lisette Contreras, Guardium Support To hear the WebEx audio, select an option in the Audio
More informationIBM BigFix Relays Part 2
IBM BigFix Relays Part 2 IBM SECURITY SUPPORT OPEN MIC December 17, 2015 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING
More informationWhat's new in AppScan Standard/Enterprise/Source version
What's new in AppScan Standard/Enterprise/Source version 9.0.3.4 support Open Mic Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA
More informationRemote Syslog Shipping IBM Security Guardium
Remote Syslog Shipping IBM Security Guardium IBM Security support Open Mic To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection menu
More informationIBM Security Guardium: Troubleshooting No Traffic Issues
IBM Security Guardium: Troubleshooting No Traffic Issues IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationIBM Security Network Protection
IBM Security Network Protection XGS 5.3.3 firmware release Features and Enhancements IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web
More informationJunction SSL Debugging With Wireshark
Junction SSL Debugging With Wireshark IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection menu option.
More informationIBM Security Support Open Mic
IBM Security Support Open Mic LET S TALK ABOUT QRADAR 7.2.8 FEATURES Connect to WebEx Audio by selecting an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu
More informationQRadar Feature Discussion IBM SECURITY SUPPORT OPEN MIC
QRadar 7.2.7 Feature Discussion IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free: 866-803-2141
More informationSecurity Support Open Mic: ISNP High Availability and Bypass
Panelists Ed Leisure Knowledge Engineer, Presenter Andrew Sallaway SWAT Consultant Kenji Hamahata L2 Engineer (Japan) Maxime Turlot Product Lead Arthur Testa Product Lead Jeff Dicostanzo Advanced Value
More informationConfiguring your policy to prevent appliance problems
Configuring your policy to prevent appliance problems IBM Security Guardium IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate
More informationInstalling BigFix clients through self-update IBM
Installing BigFix clients through self-update IBM ii Installing BigFix clients through self-update Contents Chapter 1. Installing BigFix clients through self-update.......... 1 Step 1: Planning the infrastructure.......
More informationBigFix 101- Server Pricing
BigFix 101- Server Pricing Licensing in a Nutshell BigFix is included with AIX Enterprise Edition (AIX EE). If you have AIX EE on a system, all the cores on that system are covered and any LPAR running
More informationSWD & SSA Updates 2018
SWD & SSA Updates 2018 Stephen Hull STSM, BigFix Development 04/09/2018 Latest SWD & SSA features What s shiny and new? SWD Support multiple tasks for a software pkg Install, Update, Uninstall, etc Export/Import
More informationDisk Space Management of ISAM Appliance
IBM Security Access Manager Tuesday, 5/3/16 Disk Space Management of ISAM Appliance Panelists David Shen Level 2 Support Engineer Steve Hughes Level 2 Support Engineer Nicholas Hasten Level 2 Support Engineer
More informationIBM Security Network Protection Open Mic - Thursday, 31 March 2016
IBM Security Network Protection Open Mic - Thursday, 31 March 2016 Application Control and IP Reputation on the XGS Demystified Panelists Tanmay Shah, Presenter IPS/Network Protection Product Lead Bill
More informationEnhancements and new features in ILMT/SUA IBM License Metric Tool & Software Use Analysis Questions and Answers Enablement Team
Enhancements and new features in ILMT/SUA 9.2.0.2 IBM License Metric Tool & Software Use Analysis Questions and Answers Enablement Team Agenda 01 Introduction 04 Hiding free instances 07 Rebranding 02
More informationIBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation
IBM Security Endpoint Manager- BigFix Daniel Joksch Security Sales Establish security as an immune system Malware protection Incident and threat management Identity management Device management Data monitoring
More informationIBM Security Network Protection v Enhancements
IBM Security Network Protection v5.3.3.1 Enhancements IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection
More informationIBM Threat Protection System: XGS - QRadar Integration
IBM Security Network Protection Support Open Mic - Wednesday, 25 May 2016 IBM Threat Protection System: XGS - QRadar Integration Panelists Tanmay Shah - Presenter Level 2 Support Product Lead Danitza Villaran-Rokovich,
More informationXGS & QRadar Integration
IBM Security Support Open Mic - January 28, 2015 XGS & QRadar Integration Advanced Threat Protection Integration Options Panelists Wes Davis Advanced Threat Support Group Engineer (Presenter) Thomas Gray
More informationLet s Talk About Threat Intelligence
Let s Talk About Threat Intelligence IBM SECURITY SUPPORT OPEN MIC #20 Slides and additional dial in numbers: http://ibm.biz/openmic20 January 26, 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR
More informationIBM Endpoint Manager Version 9.2. Software Use Analysis Installation Guide
IBM Endpoint Manager Version 9.2 Software Use Analysis Installation Guide IBM Endpoint Manager Version 9.2 Software Use Analysis Installation Guide Installation Guide This edition applies to IBM Endpoint
More informationXGS: Making use of Logs and Captures
IBM Security Network Protection XGS Open Mic webcast #6 June 24, 2015 XGS: Making use of Logs and Captures Panelists Bill Klauke (Presenter) Product Lead L2 Support Maxime Turlot Product Lead L2 Support
More informationMSS VSOC Portal Single Sign-On Using IBM id IBM Corporation
MSS VSOC Portal Single Sign-On Using IBM id Changes to VSOC Portal Sign In Page Users can continue to use the existing Client Sign In on the left and enter their existing Portal username and password.
More informationForeScout Extended Module for IBM BigFix
ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...
More informationUnderstanding scan coverage in AppScan Standard
IBM Security AppScan Standard Open Mic Webcast January 27, 2015 Understanding scan coverage in AppScan Standard Panelists Shahar Sperling Software Architect at Application Security AppScan Tal Rabinovitch
More informationIBM License Metric Tool 9.0 Installation
ILMT Central Team IBM License Metric Tool 9.0 Installation Questions & Answers Welcome This is the twenty second Q&A event prepared by the ILMT Central Team We concentrate on License Metric Tool version
More informationOptimizing IBM QRadar Advisor with Watson
Optimizing IBM QRadar Advisor with Watson IBM SECURITY SUPPORT OPEN MIC #25 Slides and additional dial in numbers: http://ibm.biz/openmic25 June 8, 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE
More informationXGS Administration - Post Deployment Tasks
IBM Security Network Protection Support Open Mic - 18 November 2015 XGS Administration - Post Deployment Tasks Panelists Tanmay Shah XGS Product Lead, L2 Support (Presenter) Thomas Gray L2 Support Manager
More informationSecurity Support Open Mic Build Your Own POC Setup
IBM Security Access Manager 08/25/2015 Security Support Open Mic Build Your Own POC Setup Panelists Reagan Knowles Level II Engineer Nick Lloyd Level II Support Engineer Kathy Hansen Level II Support Manager
More informationMigration from version 7.5 to 9.0. IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team
Migration from version 7.5 to 9.0 IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team Agenda Introduction 01 Step 1: Prepare the environment 02 Step 2: Map the agents
More informationIBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions
IBM Security Access Manager open mic webcast July 14, 2015 IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions Panelists Gianluca Gargaro L2 Support Engineer Darren Pond L2
More informationIBM. Migration Cookbook. Migrating from License Metric Tool and Tivoli Asset Discovery for Distributed 7.5 to License Metric Tool 9.
IBM License Metric Tool 9.x Migration Cookbook Migrating from License Metric Tool and Tivoli Asset Discovery for Distributed 7.5 to License Metric Tool 9.x IBM IBM License Metric Tool 9.x Migration Cookbook
More informationIBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC. 13 Dec 2017
IBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC 13 Dec 2017 IBM Security Learning Academy www.securitylearningacademy.com New content published
More informationIBM Guardium Data Encryption
IBM Guardium Data Encryption RELEASE TAXONOMY FOR LINUX/AIX/WINDOWS 10-October-2018 GDE Taxonomy Version V.0.0.0 Major V.R.0.0 Mod V.R.M.0 SSE V.R.M.F Fixpack V.R.M.F Cadence 36-48 Months 12-15 Months
More informationSecurity Support Open Mic Client Certificate Authentication
IBM Security Access Manager, Tuesday, December 8, 2015 Security Support Open Mic Client Certificate Authentication Panelists Jack Yarborough ISAM Level II Nick Lloyd ISAM Level II Scott Stough ISAM Level
More informationConfiguring zsecure To Send Data to QRadar
Configuring zsecure To Send Data to QRadar CONFIGURATION, SETUP, AND EXAMPLES Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free:
More informationForeScout Extended Module for IBM BigFix
Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,
More informationIBM Security Identity Governance and Intelligence Clustering and High Availability
IBM Security Identity Governance and Intelligence Clustering and High Availability IBM SECURITY SUPPORT Luigi Lombardi: luigi.lombardi@it.ibm.com Gianluca Gargaro: g.gargaro@it.ibm.com Raffaele Sperandeo:
More informationIBM MaaS360 Kiosk Mode Settings
IBM MaaS360 Kiosk Mode Settings Configuration Settings for Kiosk Mode Operation IBM Security September 2017 Android Kiosk Mode IBM MaaS360 provides a range of Android device management including Samsung
More informationIBM UrbanCode Deploy V6.2 provides the tools needed to automate the application deployment pipeline
IBM United States Software Announcement 215-447, dated October 27, 2015 V6.2 provides the tools needed to automate the application deployment pipeline Table of contents 1 Overview 3 Publications 2 Key
More informationIdentity Governance Troubleshooting
Identity Governance Troubleshooting Chris Weber Level 2 support, IBM Security May 16, 2017 Identity Governance Troubleshooting Support Files contents Accessing different logs and other files though the
More informationISAM Advanced Access Control
ISAM Advanced Access Control CONFIGURING TIME-BASED ONE TIME PASSWORD Nicholas J. Hasten ISAM L2 Support Tuesday, November 1, 2016 One Time Password OTP is a password that is valid for only one login session
More informationForescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2
Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationIBM Endpoint Manager Version 9.0. Software Distribution User's Guide
IBM Endpoint Manager Version 9.0 Software Distribution User's Guide IBM Endpoint Manager Version 9.0 Software Distribution User's Guide Note Before using this information and the product it supports,
More informationISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.
ISAM Federation STANDARDS AND MAPPINGS Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support July 19, 2017 Agenda ISAM Federation Introduction Standards and Protocols Attribute Sources
More informationIBM BigFix Compliance PCI Add-on Version 9.5. Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM
IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard
More informationIBM Security Access Manager v8.x Kerberos Part 2
IBM Security Access Manager open mic webcast - Oct 27, 2015 IBM Security Access Manager v8.x Kerberos Part 2 Kerberos Single Sign On using Constrained Delegation Panelists Gianluca Gargaro L2 Support Engineer
More informationHow to properly deploy, configure and upgrade the NAB
Panelists Jeff DiCostanzo, Presenter AVP Team Lead Bill Klauke - Level 2 Product Lead Maxime Turlot - Level 2 Product Lead Ryan Andersen - Level 2 Senior Engineer Edward A Romero - Level 3 Network Security
More informationIBM BigFix Version 9.5. Patch for Red Hat Enterprise Linux User's Guide IBM
IBM BigFix Version 9.5 Patch for Red Hat Enterprise Linux User's Guide IBM IBM BigFix Version 9.5 Patch for Red Hat Enterprise Linux User's Guide IBM Note Before using this information and the product
More informationIBM Endpoint Manager. OS Deployment V3.5 User's Guide
IBM Endpoint Manager OS Deployment V3.5 User's Guide IBM Endpoint Manager OS Deployment V3.5 User's Guide Note Before using this information and the product it supports, read the information in Notices
More informationSecuring communication between SDS VA and its remote DB2 DB
Securing communication between SDS 8.0.1 VA and its remote DB2 DB IBM SECURITY SUPPORT OPEN MIC PRESENTATION Ramamohan T Reddy - Senior Software Engineer / L2 Team Tech Lead - Directory Support Team Brook
More informationIBM License Metric Tool 9.0 Overview
ILMT Central Team IBM License Metric Tool 9.0 Overview Questions & Answers Welcome This is the twenty first Q&A event prepared by the ILMT Central Team We concentrate on License Metric Tool version 9.0
More informationIBM IBM Tivoli Endpoint Manager V8.1 Implementation.
IBM 000-560 IBM Tivoli Endpoint Manager V8.1 Implementation http://killexams.com/exam-detail/000-560 A. It should always be empty in a healthy environment. B. It is used to store downloaded files from
More informationAutomated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers
ILMT Central Team Automated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers Information These slides were just the deck of the ILMT Central Team Questions&Answers session.
More informationSymantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide
Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:
More informationPerforming an ObserveIT Upgrade Using the Interactive Installer
Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One
More informationInstalling Client Proxy software
Revision A McAfee Client Proxy 2.3.4 Installation Guide (McAfee epolicy Orchestrator) Installing Client Proxy software Client Proxy software Client Proxy consists of server and client software, whose deployment
More informationPatch Management using Dell Management Console v1.0
Patch Management using Dell Management Console v1.0 Dell Technical White Paper By Abhijit Pathak Dell Product Group - Enterprise Revision History Version Date Description Author(s) 1.0 13 April 2009 First
More informationBigFix OS Deployment. Windows 7 Migration Guide
BigFix OS Deployment August, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product names, trade names,
More informationGX vs XGS: An administrator s comparison of the two products
: An administrator s comparison of the two products Panelists Bill Klauke IPS Product Lead, Level 2 Support Matthew Elsner XGS Development Yuceer (Banu) Ilgen XGS Development Jeff Dicostanzo AVP Support
More informationIntegrated, Intelligence driven Cyber Threat Hunting
Integrated, Intelligence driven Cyber Threat Hunting THREAT INVESTIGATION AND RESPONSE PLATFORM Zsolt Kocsis IBM Security Technical Executive, CEE zsolt.kocsis@hu.ibm.com 6th Nov 2018 Build an integrated
More informationThreat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES
Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES Agenda Welcome Threat Intelligence EcoSystem Cyber Resiliency
More informationMay the (IBM) X-Force Be With You
Ann Arbor, Michigan July 23-25 May the (IBM) X-Force Be With You A QUICK PEEK INTO ONE OF THE MOST RENOWNED SECURITY TEAMS IN THE WORLD Marlon Machado Worldwide Standardization Leader, Application Security
More informationOpen Mic Webcast. IBM Sametime Media Manager Troubleshooting Tips and Tricks. Tony Payne Sr. Software Engineer May 20, 2015
Open Mic Webcast IBM Sametime Media Manager Troubleshooting Tips and Tricks Tony Payne Sr. Software Engineer May 20, 2015 Agenda Troubleshooting Basics Setting a diagnostic trace Finding the right trace
More informationIBM United States Software Announcement , dated February 17, 2015
IBM United States Software Announcement 215-031, dated February 17, 2015 The IBM CICS Transaction Gateway V9.2 open beta offering enables continuous integration testing for JSON web services and all remote
More informationIBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute)
IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) Note Before
More informationIBM Security Directory Server: Utilizing the Audit.log
IBM Security Directory Server Open Mic Webcast #1 November 4, 2014 IBM Security Directory Server: Utilizing the Audit.log Panelists Roy Spencer L2LDAP Technical Lead Ram Reddy L2LDAP Senior Engineer Benjamin
More informationTivoli Endpoint Manager for Patch Management - AIX. User s Guide
Tivoli Endpoint Manager for Patch Management - AIX User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
More informationLet's talk about QRadar Apps: Development & Troubleshooting IBM SECURITY SUPPORT OPEN MIC
Let's talk about QRadar Apps: Development & Troubleshooting IBM SECURITY SUPPORT OPEN MIC Slides and additional dial in numbers: http://ibm.biz/joinqradaropenmic August 23, 2017 NOTICE: BY PARTICIPATING
More informationTanium Discover User Guide. Version 2.x.x
Tanium Discover User Guide Version 2.x.x June 27, 2017 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is
More informationIBM BigFix Compliance
IBM BigFix Compliance A single solution for managing endpoint security across the organization Highlights Ensure configuration compliance using thousands of out-of-the-box bestpractice policies with automated
More informationHow to Secure Your Cloud with...a Cloud?
A New Era of Thinking How to Secure Your Cloud with...a Cloud? Eitan Worcel Offering Manager - Application Security on Cloud IBM Security 1 2016 IBM Corporation 1 A New Era of Thinking Agenda IBM Cloud
More informationOracle Fusion Middleware Oracle WebCenter Collaboration
Oracle Fusion Middleware Oracle WebCenter Collaboration Release Notes 10g Release 4 (10.3.3.0.0) E22881-03 May 2013 This document describes the supported software and known issues for Oracle WebCenter
More informationDell Repository Manager Business Client Version 2.0 User s Guide
Dell Repository Manager Business Client Version 2.0 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION
More informationSimplifying Blade Server Update with Dell Repository Manager
Simplifying Blade Server Update with Dell Repository Manager Dell Engineering December 2015 A Dell Technical White Paper Revisions Date December 2015 Description Initial release THIS WHITE PAPER IS FOR
More informationUsing ZENworks with Novell Service Desk
www.novell.com/documentation Using ZENworks with Novell Service Desk Novell Service Desk 7.1 April 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or
More informationDeploying Lookout with IBM MaaS360
Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,
More informationCreating Resources on the ZFS Storage Appliance
Oracle Enterprise Manager Ops Center Creating Non-Global Zones Using a SAN Storage Library 12c Release 3 (12.3.0.0.0) E65613-01 October 2015 This guide provides an end-to-end example for how to use Oracle
More informationMcAfee Host Intrusion Prevention Administration Course
McAfee Host Intrusion Prevention Administration Course Education Services administration course The McAfee Host Intrusion Prevention Administration course provides attendees with indepth training on the
More informationUpgrading an ObserveIT One-Click Installation
Upgrading an ObserveIT One-Click Installation This document was written for ObserveIT Enterprise version 7.6.1. This document uses screenshots and procedures written for Windows Server 2012 R2 and SQL
More informationHP-UX Software and Patching Management Using HP Server Automation
HP-UX Software and Patching Management Using HP Server Automation Software Version 7.84, released August 2010 Overview... 2 Patch Management for HP-UX Prerequisites... 2 HP-UX Patching Features... 2 Importing
More informationPatch Management for AIX
Patch Management for AIX Supported Versions The Patches for AIX Fixlet site provides Fixlet messages for the latest Maintenance Level packages for AIX 5.1, 5.2 and 5.3. It also includes inventory-only
More informationBigFix 2018 Roadmap. Aram Eblighatian. Product Manager IBM BigFix. 14 May, 2018
BigFix 2018 Roadmap Aram Eblighatian Product Manager IBM BigFix 14 May, 2018 What's New in BigFix? BigFix Platform BigFix Platform v9.5.7 Released Oct. 2017 Gathering Performance improvements (WebUI and
More informationCybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY
Cybersecurity THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Gary Meshell World Wide Leader Financial Services Industry IBM Security March 21 2019 You have been breached; What Happens Next 2 IBM Security
More information