Interpreting relevance conditions in commonly used ILMT/BFI fixlets

Size: px
Start display at page:

Download "Interpreting relevance conditions in commonly used ILMT/BFI fixlets"

Transcription

1 Interpreting relevance conditions in commonly used ILMT/BFI fixlets IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu option. To ask a question by voice, you must either Call In or have a microphone on your device. You will not hear sound until the host opens the audio line. For more information, visit: 25 April 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING THE CALL, AS WELL AS TO IBM S USE OF SUCH RECORDING IN ANY AND ALL MEDIA, INCLUDING FOR VIDEO POSTINGS ON YOUTUBE. IF YOU OBJECT, PLEASE DO NOT CONNECT TO THIS CALL.

2 Panelists Michał Zalas Presenter ILMT/BFI L2 support member Leslie Gomba ILMT/BFI L2 support member Andrei Ionescu ILMT/BFI L2 support member Khalid Yahya ILMT/BFI L2 support member Hope Maxwell-Daley Moderator ILMT/BFI L2 support team leader 2 IBM Security

3 Goal of session IBM License Metric Tool and IBM BigFix Inventory applications in version 9.x reuse IBM BigFix infrastructure. Instructions to deploy so-called CIT scanner (module allowing to perform scans), run hardware scans or initiate software scans are propagated to endpoints by means of designated fixlets. Those fixlets contain sets of conditions specifying prerequisites for a particular fixlet task to be performed on the endpoint. The goal of this session is to present steps which allow ILMT/BFI users to verify why the most common fixlets are not relevant for a particular endpoint. 3 IBM Security

4 Agenda Checking the fixlet site version Updating the fixlet site Checking fixlet relevance Install or Upgrade Scanner fixlet Initiate Software Scan fixlet Run Capacity Scan and Upload Results fixlet 4 IBM Security

5 Checking the fixlet site version

6 Checking the fixlet site version 6 IBM Security ILMT: Version: 95 BFI: Version: 86

7 Checking the fixlet site version ILMT: Version: 95 BFI: Version: 86 7 IBM Security

8 Updating the fixlet site

9 Updating the fixlet site The content of the ILMT/BFI fixlet site can be periodically modified. New fixlets, tasks, and analyses can be added. The existing ones can be changed or might become obsolete due to functionality changes. If the BigFix server is installed on a computer with the Internet access, the ILMT/BFI fixlet site is updated automatically whenever the updates are available. However, if the BigFix server is installed on a computer without the Internet access, user must update the ILMT/BFI fixlet site manually. The process is described in detail under the Updating the fixlet site chapter of ILMT/BFI documentation: ILMT BFI Note: All the open fixlet actions started before the fixlet site update will remain running with that old definition until they expire. You need to stop and re-run a fixlet for the new definition to be used. 9 IBM Security

10 Checking fixlet relevance

11 Checking relevance In order to see all the fixlets under ILMT/BFI site, click on the Show Non-Relevant Content button: 11 IBM Security

12 Checking relevance 12 IBM Security

13 Checking relevance Starting from ILMT/BFI it is possible to use a feature called Analyze the Relevance of a Fixlet or Task to evaluate relevance conditions of fixlets available under ILMT/BFI site. 13 IBM Security

14 Checking relevance From the drop-down list choose from among ILMT/BFI fixlets. A result is creation of a new analysis which covers all the endpoints subscribed to ILMT/BFI site. The new analysis gets created under Master Action Site of BigFix. It can be reviewed under Analyses section. Its name pattern is Relevance Check for the Task/Fixlet: source fixlet name. 14 IBM Security

15 Checking relevance After a short moment, required for endpoints to receive instructions from BigFix server and return information on relevance conditions evaluation, the newly created analysis gets populated with results: 15 IBM Security

16 Checking relevance Under analysis Results tab, every column named Relevance # maps to the source fixlet relevance condition with the same number under fixlet Details tab. Exemplary relevance conditions will be explained in the following slides. If a particular condition is met on the endpoint, then its analysis result column entry shows True. Otherwise the False value is displayed. Note: If a particular fixlet condition is not met it does not indicate an error. It may also mean that it is a temporary state, e.g. due a scan operation already running, scanner already installed in the same version, etc. All the fixlet conditions must show True for the fixlet to be relevant. The relevance check process is covered in ILMT/BFI documentation at: ILMT BFI 16 IBM Security

17 Checking relevance Common files and locations evaluated by relevance conditions of Install or Upgrade Scanner, Initiate Software Scan and Run Capacity Scan and Upload Results fixlets: CIT scanner configuration file from - %WINDIR%\cit\cit.ini - /etc/cit/cit.ini CIT scanner home directory specified by CIT_HomeDirectory key value in cit.ini configuration file BigFix client location e.g. - C:\Program Files (x86)\bigfix Enterprise\BES Client\ - /var/opt/besclient/lmt/cit ILMT/BFI scan data folder under BigFix client directory e.g. - C:\Program Files (x86)\bigfix Enterprise\BES Client\LMT\CIT - /var/opt/besclient/lmt/cit 17 IBM Security

18 Install or Upgrade Scanner

19 Install or Upgrade Scanner Relevance 1 (if (name of it as lowercase starts with "win") then (true) else ((name of it as lowercase starts with "linux") OR (name of it as lowercase starts with "aix") OR (name of it as lowercase starts with "mac") OR (name of it as lowercase starts with "hp-ux" AND ((architecture of it as lowercase contains "ia64") OR (family name of main processor as lowercase contains "pa-risc") OR (exists match (regex "^PA8[0-9]{3}(\s+)?$") of (family name of main processor)))) OR (exists match (regex "sunos 5\.( )") of (name of it as lowercase)) of operating system)) of operating system AND (if exists property "in proxy agent context" then ( not in proxy agent context ) else true) Since the release of the IBM Endpoint Manager for Mobile Devices that supports Android, Apple ios and other devices, BigFix installations may include proxy agents in order to support these new devices. Many fixlets contain the relevance above in order to exclude proxy agents from executing. This ensures that proxy agents will not try to execute the fixlet. Relevance 2 not exists settings whose (name of it equals "CIT_Deny" AND value of it = "1") of client This condition checks if the endpoint has a setting named CIT_Deny set to 1. To verify it, right-click on the computer name and choose Edit Computer Settings.... It is set if the Add Targeting Exception fixlet was run earlier to prevent the endpoint from being targeted by the scanner actions. To revert this change run Remove Targeting Exception fixlet. 19 IBM Security

20 Install or Upgrade Scanner Relevance 3 ((name of it as lowercase starts with "win") OR (name of it as lowercase starts with "linux") OR (name of it as lowercase starts with "aix") OR (name of it as lowercase starts with "hp-ux") OR ((name of it as lowercase starts with "sunos 5") AND NOT (name of it as lowercase contains "sunos 5.7")) OR (name of it as lowercase starts with "mac")) of operating system This condition checks if the endpoint is running an operating system type supported by ILMT/BFI. Please refer to Supported operating systems documentation chapter. Relevance 4 (NOT (((name of operating system as lowercase starts with "win") AND (exists folder "cit" of folder (value of variable "windir" of environment))) OR ((NOT (name of operating system as lowercase starts with "win")) AND (exists folder "/etc/cit")))) OR (... long text skipped...) This condtion evaluates if exists the scanner configuration folder named cit located in %WINDIR% directory of Microsoft Windows or /etc/cit in case of other plaftforms. If it is not present then installation can continue. If it turns out to be present, then this fixlet condition checks present configuration to retrieve information on current scanner home directory and scanner version to determine if a newer version should be deployed. Fixlet description always mentions scanner version meant to be installed (e.g ) and user may verify current scanner version on endpoint by means of Scanner Information analysis in BigFix console. Alternatively, it can be read as the "CIT_Version" key value from the cit.ini configuration file on the endpoint. 20 IBM Security

21 Install or Upgrade Scanner Relevance 5 if (name of operating system as lowercase starts with "win") then ((free space of drive of (if (version of client >= "9" as version) then (parent folder of data folder of client) else (parent folder of regapp "besclient.exe")) > ) and (if (exists (folder "cit" of folder (value of variable "windir" of environment)) whose (exists file "cit.ini" of it) and (exists folder (key "CIT_HomeDirectory" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)))) then (free space of drive of (folder (key "CIT_HomeDirectory" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment))) > ) else (free space of drive of folder (value of variable "ProgramFiles" of environment) > ))) else if (not(name of operating system as lowercase starts with "mac")) then ((free space of drive of (if (version of client >= "9" as version) then (parent folder of data folder of client) else (parent folder of parent folder of client folder of site "actionsite")) > ) and (if (exists (folder "/etc/cit") whose (exists file "cit.ini" of it) and (exists folder (key "CIT_HomeDirectory" of file "cit.ini" of folder "/etc/cit"))) then (free space of drive of (folder (key "CIT_HomeDirectory" of file "cit.ini" of folder "/etc/cit")) > ) else (free space of drive of (folder "/opt") > ))) else true This condition checks if the endpoint has at least 20MB of free space in BigFix client location. Additionally at least 50MB of free space is required on the drive/filesystem with CIT scanner home directory. It is read from the cit.ini configuration file. If CIT scanner is not present, then this space condition is checked against the Program Files directory (Windows) or /opt (Linux). 21 IBM Security

22 Install or Upgrade Scanner Relevance 6 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "wscansw") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "wscansw"))) else (not exists process whose (name of it = "wscansw.exe" or name of it = "wscansw")) This condition checks if on the endpoint there is no wscansw process running at the moment of scanner installation attempt. That process is responsible for software scans and evaluation of software catalog repository of software discovery rules. In case of large filesystems SW scan may last a couple of hours preventing scanner upgrade. Relevance 7 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "wscanfs") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "wscanfs"))) else (not exists process whose (name of it = "wscanfs.exe" or name of it = "wscanfs")) This condition checks if on the endpoint there is no wscanfs process running at the moment of scanner installation attempt. That process is responsible for filesystem scans. In case of large filesystems scan may last a couple of hours preventing scanner upgrade. 22 IBM Security

23 Install or Upgrade Scanner Relevance 8 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "itsit") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "itsit"))) else (not exists process whose (name of it = "itsit.exe" or name of it = "itsit")) This condition checks if on the endpoint there is no itsit process running at the moment of scanner installation attempt. That is a legacy process from IBM SUA 2.x product line, responsible for filesystem scans. Relevance 9 if (name of operating system as lowercase contains "mac") then "SUA"="INV" else true This condition is checked only for Mac OS and is related to support of BES Inventory and License fixlet site. For more information on this site, refer to 23 IBM Security

24 Initiate Software Scan

25 Initiate Software Scan Relevance 1 (if (name of it as lowercase starts with "win") then (true) else ((name of it as lowercase starts with "linux") OR (name of it as lowercase starts with "aix") OR (name of it as lowercase starts with "mac") OR (name of it as lowercase starts with "hp-ux" AND ((architecture of it as lowercase contains "ia64") OR (family name of main processor as lowercase contains "pa-risc") OR (exists match (regex "^PA8[0-9]{3}(\s+)?$") of (family name of main processor)))) OR (exists match (regex "sunos 5\.( )") of (name of it as lowercase)) of operating system)) of operating system AND (if exists property "in proxy agent context" then ( not in proxy agent context ) else true) Since the release of the IBM Endpoint Manager for Mobile Devices that supports Android, Apple ios and other devices, BigFix installations may include proxy agents in order to support these new devices. Many fixlets contain the relevance above in order to exclude proxy agents from executing. This ensures that proxy agents will not try to execute the fixlet. Relevance 2 not exists settings whose (name of it equals "CIT_Deny" AND value of it = "1") of client This condition checks if the endpoint has a setting named CIT_Deny set to 1. To verify it, right-click on the computer name and choose Edit Computer Settings.... It is set if the Add Targeting Exception fixlet was run earlier to prevent the endpoint from being targeted by the scanner actions. To revert this change run Remove Targetting Exception fixlet. 25 IBM Security

26 Initiate Software Scan Relevance 3 (if (name of operating system as lowercase starts with "win") then (exists (folder "cit" of folder (value of variable "windir" of environment)) whose (exists file "cit.ini" of it) and (exists folder ((key "CIT_HomeDirectory" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)) & "\bin") whose ((exists file "wscansw.exe" of it) and (exists file "wscanfs.exe" of it)))) else (exists (folder "/etc/cit") whose (exists file "cit.ini" of it) and (exists folder ((key "CIT_HomeDirectory" of file "cit.ini" of folder "/etc/cit") & "/bin") whose ((exists file "wscansw" of it) and (exists file "wscanfs" of it))))) OR (name of operating system as lowercase starts with "mac") This condition checks for scanner configuration file (cit.ini) to read information on scanner home directory and locate binaries required to run a softwatre scan (wscansw, wscanfs). Relevance 4 name of operating system as lowercase starts with "mac") OR ((if (name of operating system as lowercase starts with "win") then (key "CIT_Version" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)) else (key "CIT_Version" of file "cit.ini" of folder "/etc/cit")) >= " ") This condition checks for scanner configuration file (cit.ini) to read information on scanner version. It should be at least User may verify current scanner version on endpoint by means of Scanner Information analysis in BigFix console. Alternatively, it can be read as the "CIT_Version" key value from the cit.ini file on the endpoint. Run Install or Upgrade Scanner fixlet if CIT scanner version is obsolete. 26 IBM Security

27 Initiate Software Scan Relevance 5 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "wscansw") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "wscansw"))) else (not exists process whose (name of it = "wscansw.exe" or name of it = "wscansw")) This condition checks if on the endpoint there is no wscansw process already running. That process is responsible for software scans and evaluation of software catalog repository of software discovery rules. In case of large filesystems SW scan may last a couple of hours preventing subsequent runs. Relevance 6 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "wscanfs") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "wscanfs"))) else (not exists process whose (name of it = "wscanfs.exe" or name of it = "wscanfs")) This condition checks if on the endpoint there is no wscanfs process already running. That process is responsible for filesystem scans. In case of large filesystems scan may last a couple of hours preventing subsequent runs. 27 IBM Security

28 Initiate Software Scan Relevance 7 (if (name of operating system as lowercase starts with "win") then ((exists (folder "cit" of folder (value of variable "windir" of environment)) whose (exists file "cit.ini" of it)) and ((key "CIT_Exploiters" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)) contains "SUA:")) else ((exists (folder "/etc/cit") whose (exists file "cit.ini" of it)) and ((key "CIT_Exploiters" of file "cit.ini" of folder "/etc/cit") contains "SUA:"))) OR (name of operating system as lowercase starts with "mac") This condition checks for scanner configuration file (cit.ini) to read information on scanner exploiters (CIT_exploiters). ILMT/BFI tag is SUA:. It is set by the Install or Upgrade Scanner fixlet. The SUA: tag is required to run a scan. If it is missing run Install or Upgrade Scanner fixlet. Relevance 8 (name of operating system as lowercase starts with "mac") OR (if (name of operating system as lowercase starts with "win") then (exists file "catalog.xml.bz2" of folder ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT") or exists file "catalog.xml" of folder ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT")) else (exists file "catalog.xml.bz2" of folder (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT") or exists file "catalog.xml" of folder (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT"))) This condition checks if under LMT\CIT subfolder of BigFix client there is so-called software catalog present. Software catalog is a repository of software discovery rules used by scanner. If catalog is not present, run Catalog Download fixlet. It is described in Updating scanner catalogs chapter of ILMT/BFI documentation. 28 IBM Security

29 Initiate Software Scan Relevance 9 (name of operating system as lowercase starts with "mac") OR (if (name of operating system as lowercase starts with "win") then (exists file "bzip2.exe" of folder ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT")) else (exists file "bzip2" of folder (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT"))) This condition checks if under LMT\CIT subfolder of BigFix client there is bzip2 archiver present. It is required to compress scan results. It is deployed by the Install or Upgrade Scanner fixlet. Relevance 10 NOT (if (name of operating system as lowercase starts with "win") then (exists file ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT\cit_config.xml")) else (exists file (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT/cit_config.xml"))) OR (name of operating system as lowercase starts with "mac") This condition checks if under BigFix client directory, in LMT\CIT subfolder there is no cit_config.xml file. That is a legacy configuration file related to IBM SUA 2.x product line. If it is still present, then the Install or Upgrade Scanner fixlet should be run. 29 IBM Security

30 Initiate Software Scan Relevance 11 if (name of operating system as lowercase starts with "win") then (exists file "zip.exe" of folder ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT")) else if (((name of it as lowercase starts with "sunos 5") AND NOT (name of it as lowercase contains "sunos 5.7")) of operating system) then (exists pkginfo whose (pkginst of it contains "gzip") of pkgdb) else true This condition checks if under LMT\CIT subfolder of BigFix client on Microsoft Windows there is zip.exe archiver present. It is deployed by Install or Upgrade Scanner fixlet. In case of Solaris 5.x OS (except 5.7) the gzip package is required. Other OS types are not evaluated by this condition. Refer to Supported operating systems documentation chapter. 30 IBM Security

31 Run Capacity Scan and Upload Results

32 Run Capacity Scan and Upload Results Relevance 1 (if (name of it as lowercase starts with "win") then (true) else ((name of it as lowercase starts with "linux") OR (name of it as lowercase starts with "aix") OR (name of it as lowercase starts with "mac") OR (name of it as lowercase starts with "hp-ux" AND ((architecture of it as lowercase contains "ia64") OR (family name of main processor as lowercase contains "pa-risc") OR (exists match (regex "^PA8[0-9]{3}(\s+)?$") of (family name of main processor)))) OR (exists match (regex "sunos 5\.( )") of (name of it as lowercase)) of operating system)) of operating system AND (if exists property "in proxy agent context" then ( not in proxy agent context ) else true) Since the release of the IBM Endpoint Manager for Mobile Devices that supports Android, Apple ios and other devices, BigFix installations may include proxy agents in order to support these new devices. Many fixlets contain the relevance above in order to exclude proxy agents from executing. This ensures that proxy agents will not try to execute the fixlet. Relevance 2 not exists settings whose (name of it equals "CIT_Deny" AND value of it = "1") of client This condition checks if the endpoint has a setting named CIT_Deny set to 1. To verify it, right-click on the computer name and choose Edit Computer Settings.... It is set if the Add Targeting Exception fixlet was run earlier to prevent the endpoint from being targeted by the scanner actions. To revert this change run Remove Targetting Exception fixlet. 32 IBM Security

33 Run Capacity Scan and Upload Results Relevance 3 if (name of operating system as lowercase starts with "win") then (exists (folder "cit" of folder (value of variable "windir" of environment)) whose (exists file "cit.ini" of it) and (exists folder ((key "CIT_HomeDirectory" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)) & "\bin") whose (exists file "wscanhw.exe" of it))) else (exists (folder "/etc/cit") whose (exists file "cit.ini" of it) and (exists folder ((key "CIT_HomeDirectory" of file "cit.ini" of folder "/etc/cit") & "/bin") whose (exists file "wscanhw" of it))) This condition checks for scanner configuration file (cit.ini) to read information on scanner home directory ( CIT_HomeDirectory key) and locate binaries required to run a hardware scan (wscanhw). Relevance 4 if (name of operating system as lowercase contains "sunos") then (if exists file "/usr/bin/zonename" then (not exists process whose (name of it = "wscanhw") whose (zone of it as string =tuple string item 0 of concatenation ", " of names of zones as string)) else (not exists process whose (name of it = "wscanhw"))) else (not exists process whose (name of it = "wscanhw.exe" or name of it = "wscanhw")) This condition checks if on the endpoint there is no wscanhw process already running. That process is responsible for hardware capacity scans. 33 IBM Security

34 Run Capacity Scan and Upload Results Relevance 5 if (name of operating system as lowercase starts with "win") then ((exists (folder "cit" of folder (value of variable "windir" of environment)) whose (exists file "cit.ini" of it)) and ((key "CIT_Exploiters" of file "cit.ini" of folder "cit" of folder (value of variable "windir" of environment)) contains "SUA:")) else ((exists (folder "/etc/cit") whose (exists file "cit.ini" of it)) and ((key "CIT_Exploiters" of file "cit.ini" of folder "/etc/cit") contains "SUA:")) This condition checks for scanner configuration file (cit.ini) to read information on scanner exploiters (CIT_exploiters). ILMT/BFI tag is SUA:. It is set by the Install or Upgrade Scanner fixlet. The SUA: tag is required to run a scan. If it is missing run Install or Upgrade Scanner fixlet. Relevance 6 if (name of operating system as lowercase starts with "win") then (exists folder ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT")) else (exists folder (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT")) This condition checks if under BigFix client directory there is LMT\CIT subfolder where scan results are meant to be placed. It is created by the Install or Upgrade Scanner fixlet. 34 IBM Security

35 Run Capacity Scan and Upload Results Relevance 7 NOT (if (name of operating system as lowercase starts with "win") then (exists file ((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of regapp "besclient.exe")) & "\LMT\CIT\cit_config.xml")) else (exists file (((if (version of client >= "9" as version) then (pathname of parent folder of data folder of client) else (pathname of parent folder of parent folder of client folder of site "actionsite"))) & "/LMT/CIT/cit_config.xml"))) This condition checks if under BigFix client directory, in LMT\CIT subfolder there is no cit_config.xml file. That is a legacy configuration file related to IBM SUA 2.x product line. If it is still present, then the Install or Upgrade Scanner fixlet should be run. Relevance 8 if (((name of it as lowercase starts with "sunos 5") AND NOT (name of it as lowercase contains "sunos 5.7")) of operating system) then (exists pkginfo whose (pkginst of it contains "gzip") of pkgdb) else true This condition checks if in case of Solaris 5.x OS (except 5.7) the gzip package exists. Other OS types are not evaluated by this condition. Refer to Supported operating systems documentation chapter. 35 IBM Security

36 Troubleshooting

37 Troubleshooting Additional troubleshooting steps: Restart BigFix client process on the endpoint In BigFix console right-click on the endpoint computer name and click Send Refresh 37 IBM Security

38 Questions for the panel Now is your opportunity to ask questions of our panelists. To ask a question now: Raise your hand by clicking Raise Hand. The Raise Hand icon appears next to your name in the Attendees panel on the right in the WebEx Event. The host will announce your name and unmute your line. or Type a question in the box below the Ask drop-down menu in the Q&A panel. Select All Panelists from the Ask drop-down-menu. Click Send. Your message is sent and appears in the Q&A panel. To ask a question after this presentation: You are encouraged to participate in the dw Answers forums for ILMT: BigFix Inventory: 38 IBM Security

39 Where do you get more information? License Metric Tool wiki: Security Learning Academy training roadmap for BigFix Inventory and ILMT: More articles you can review: IBM developerworks articles: - ILMT 9.2.x - BFI 9.2.x IBM Knowledge Center: - ILMT 9.2.x - BFI 9.2.x Useful links: Get started with IBM Security Support IBM Support Portal Sign up for My Notifications Follow us: 39 IBM Security

40 THANK YOU FOLLOW US ON: securityintelligence.com xforce.ibmcloud.com Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

More on relevance checks in ILMT and BFI

More on relevance checks in ILMT and BFI More on relevance checks in ILMT and BFI IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate

More information

Analyzing Hardware Inventory report and hardware scan files

Analyzing Hardware Inventory report and hardware scan files Analyzing Hardware Inventory report and hardware scan files IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by

More information

BigFix Query Unleashed!

BigFix Query Unleashed! BigFix Query Unleashed! Lee Wei IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu option. To

More information

How AppScan explores applications with ABE and RBE

How AppScan explores applications with ABE and RBE How AppScan explores applications with ABE and RBE IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

HTTP Transformation Rules with IBM Security Access Manager

HTTP Transformation Rules with IBM Security Access Manager HTTP Transformation Rules with IBM Security Access Manager IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

IBM Security Identity Manager New Features in 6.0 and 7.0

IBM Security Identity Manager New Features in 6.0 and 7.0 IBM Security Identity Manager New Features in 6.0 and 7.0 IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

Deploying BigFix Patches for Red Hat

Deploying BigFix Patches for Red Hat Deploying BigFix Patches for Red Hat IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free: 866-803-2141

More information

IBM BigFix Client Reporting: Process, Configuration, and Troubleshooting

IBM BigFix Client Reporting: Process, Configuration, and Troubleshooting IBM BigFix Client Reporting: Process, Configuration, and Troubleshooting IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate

More information

Using Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting

Using Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting Using Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate

More information

IBM BigFix Relays Part 1

IBM BigFix Relays Part 1 IBM BigFix Relays Part 1 IBM SECURITY SUPPORT OPEN MIC November 19, 2015 Revised March 2, 2018 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT

More information

QRadar Open Mic: Custom Properties

QRadar Open Mic: Custom Properties November 29, 2017 QRadar Open Mic: Custom Properties IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

Introduction to IBM Security Network Protection Manager

Introduction to IBM Security Network Protection Manager Introduction to IBM Security Network Protection Manager IBM SECURITY SUPPORT OPEN MIC Slides are at: https://ibm.biz/bdscvz NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM

More information

What's new in AppScan Standard version

What's new in AppScan Standard version What's new in AppScan Standard version 9.0.3.5 IBM Audio Security Connection support dialog by Open access Mic the Slides and more information: http://www.ibm.com/support/docview.wss?uid=swg27049311 February

More information

IBM Security Access Manager Single Sign-on with Federation

IBM Security Access Manager Single Sign-on with Federation IBM Security Access Manager Single Sign-on with Federation IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

IBM Security Guardium: : Sniffer restart & High CPU correlation alerts

IBM Security Guardium: : Sniffer restart & High CPU correlation alerts IBM Security Guardium: : Sniffer restart & High CPU correlation alerts IBM SECURITY SUPPORT OPEN MIC, presented by Lisette Contreras, Guardium Support To hear the WebEx audio, select an option in the Audio

More information

IBM BigFix Relays Part 2

IBM BigFix Relays Part 2 IBM BigFix Relays Part 2 IBM SECURITY SUPPORT OPEN MIC December 17, 2015 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING

More information

What's new in AppScan Standard/Enterprise/Source version

What's new in AppScan Standard/Enterprise/Source version What's new in AppScan Standard/Enterprise/Source version 9.0.3.4 support Open Mic Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA

More information

Remote Syslog Shipping IBM Security Guardium

Remote Syslog Shipping IBM Security Guardium Remote Syslog Shipping IBM Security Guardium IBM Security support Open Mic To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection menu

More information

IBM Security Guardium: Troubleshooting No Traffic Issues

IBM Security Guardium: Troubleshooting No Traffic Issues IBM Security Guardium: Troubleshooting No Traffic Issues IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

IBM Security Network Protection

IBM Security Network Protection IBM Security Network Protection XGS 5.3.3 firmware release Features and Enhancements IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web

More information

Junction SSL Debugging With Wireshark

Junction SSL Debugging With Wireshark Junction SSL Debugging With Wireshark IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection menu option.

More information

IBM Security Support Open Mic

IBM Security Support Open Mic IBM Security Support Open Mic LET S TALK ABOUT QRADAR 7.2.8 FEATURES Connect to WebEx Audio by selecting an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu

More information

QRadar Feature Discussion IBM SECURITY SUPPORT OPEN MIC

QRadar Feature Discussion IBM SECURITY SUPPORT OPEN MIC QRadar 7.2.7 Feature Discussion IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free: 866-803-2141

More information

Security Support Open Mic: ISNP High Availability and Bypass

Security Support Open Mic: ISNP High Availability and Bypass Panelists Ed Leisure Knowledge Engineer, Presenter Andrew Sallaway SWAT Consultant Kenji Hamahata L2 Engineer (Japan) Maxime Turlot Product Lead Arthur Testa Product Lead Jeff Dicostanzo Advanced Value

More information

Configuring your policy to prevent appliance problems

Configuring your policy to prevent appliance problems Configuring your policy to prevent appliance problems IBM Security Guardium IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate

More information

Installing BigFix clients through self-update IBM

Installing BigFix clients through self-update IBM Installing BigFix clients through self-update IBM ii Installing BigFix clients through self-update Contents Chapter 1. Installing BigFix clients through self-update.......... 1 Step 1: Planning the infrastructure.......

More information

BigFix 101- Server Pricing

BigFix 101- Server Pricing BigFix 101- Server Pricing Licensing in a Nutshell BigFix is included with AIX Enterprise Edition (AIX EE). If you have AIX EE on a system, all the cores on that system are covered and any LPAR running

More information

SWD & SSA Updates 2018

SWD & SSA Updates 2018 SWD & SSA Updates 2018 Stephen Hull STSM, BigFix Development 04/09/2018 Latest SWD & SSA features What s shiny and new? SWD Support multiple tasks for a software pkg Install, Update, Uninstall, etc Export/Import

More information

Disk Space Management of ISAM Appliance

Disk Space Management of ISAM Appliance IBM Security Access Manager Tuesday, 5/3/16 Disk Space Management of ISAM Appliance Panelists David Shen Level 2 Support Engineer Steve Hughes Level 2 Support Engineer Nicholas Hasten Level 2 Support Engineer

More information

IBM Security Network Protection Open Mic - Thursday, 31 March 2016

IBM Security Network Protection Open Mic - Thursday, 31 March 2016 IBM Security Network Protection Open Mic - Thursday, 31 March 2016 Application Control and IP Reputation on the XGS Demystified Panelists Tanmay Shah, Presenter IPS/Network Protection Product Lead Bill

More information

Enhancements and new features in ILMT/SUA IBM License Metric Tool & Software Use Analysis Questions and Answers Enablement Team

Enhancements and new features in ILMT/SUA IBM License Metric Tool & Software Use Analysis Questions and Answers Enablement Team Enhancements and new features in ILMT/SUA 9.2.0.2 IBM License Metric Tool & Software Use Analysis Questions and Answers Enablement Team Agenda 01 Introduction 04 Hiding free instances 07 Rebranding 02

More information

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation IBM Security Endpoint Manager- BigFix Daniel Joksch Security Sales Establish security as an immune system Malware protection Incident and threat management Identity management Device management Data monitoring

More information

IBM Security Network Protection v Enhancements

IBM Security Network Protection v Enhancements IBM Security Network Protection v5.3.3.1 Enhancements IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

IBM Threat Protection System: XGS - QRadar Integration

IBM Threat Protection System: XGS - QRadar Integration IBM Security Network Protection Support Open Mic - Wednesday, 25 May 2016 IBM Threat Protection System: XGS - QRadar Integration Panelists Tanmay Shah - Presenter Level 2 Support Product Lead Danitza Villaran-Rokovich,

More information

XGS & QRadar Integration

XGS & QRadar Integration IBM Security Support Open Mic - January 28, 2015 XGS & QRadar Integration Advanced Threat Protection Integration Options Panelists Wes Davis Advanced Threat Support Group Engineer (Presenter) Thomas Gray

More information

Let s Talk About Threat Intelligence

Let s Talk About Threat Intelligence Let s Talk About Threat Intelligence IBM SECURITY SUPPORT OPEN MIC #20 Slides and additional dial in numbers: http://ibm.biz/openmic20 January 26, 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR

More information

IBM Endpoint Manager Version 9.2. Software Use Analysis Installation Guide

IBM Endpoint Manager Version 9.2. Software Use Analysis Installation Guide IBM Endpoint Manager Version 9.2 Software Use Analysis Installation Guide IBM Endpoint Manager Version 9.2 Software Use Analysis Installation Guide Installation Guide This edition applies to IBM Endpoint

More information

XGS: Making use of Logs and Captures

XGS: Making use of Logs and Captures IBM Security Network Protection XGS Open Mic webcast #6 June 24, 2015 XGS: Making use of Logs and Captures Panelists Bill Klauke (Presenter) Product Lead L2 Support Maxime Turlot Product Lead L2 Support

More information

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation MSS VSOC Portal Single Sign-On Using IBM id Changes to VSOC Portal Sign In Page Users can continue to use the existing Client Sign In on the left and enter their existing Portal username and password.

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...

More information

Understanding scan coverage in AppScan Standard

Understanding scan coverage in AppScan Standard IBM Security AppScan Standard Open Mic Webcast January 27, 2015 Understanding scan coverage in AppScan Standard Panelists Shahar Sperling Software Architect at Application Security AppScan Tal Rabinovitch

More information

IBM License Metric Tool 9.0 Installation

IBM License Metric Tool 9.0 Installation ILMT Central Team IBM License Metric Tool 9.0 Installation Questions & Answers Welcome This is the twenty second Q&A event prepared by the ILMT Central Team We concentrate on License Metric Tool version

More information

Optimizing IBM QRadar Advisor with Watson

Optimizing IBM QRadar Advisor with Watson Optimizing IBM QRadar Advisor with Watson IBM SECURITY SUPPORT OPEN MIC #25 Slides and additional dial in numbers: http://ibm.biz/openmic25 June 8, 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE

More information

XGS Administration - Post Deployment Tasks

XGS Administration - Post Deployment Tasks IBM Security Network Protection Support Open Mic - 18 November 2015 XGS Administration - Post Deployment Tasks Panelists Tanmay Shah XGS Product Lead, L2 Support (Presenter) Thomas Gray L2 Support Manager

More information

Security Support Open Mic Build Your Own POC Setup

Security Support Open Mic Build Your Own POC Setup IBM Security Access Manager 08/25/2015 Security Support Open Mic Build Your Own POC Setup Panelists Reagan Knowles Level II Engineer Nick Lloyd Level II Support Engineer Kathy Hansen Level II Support Manager

More information

Migration from version 7.5 to 9.0. IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team

Migration from version 7.5 to 9.0. IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team Migration from version 7.5 to 9.0 IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team Agenda Introduction 01 Step 1: Prepare the environment 02 Step 2: Map the agents

More information

IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions

IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions IBM Security Access Manager open mic webcast July 14, 2015 IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions Panelists Gianluca Gargaro L2 Support Engineer Darren Pond L2

More information

IBM. Migration Cookbook. Migrating from License Metric Tool and Tivoli Asset Discovery for Distributed 7.5 to License Metric Tool 9.

IBM. Migration Cookbook. Migrating from License Metric Tool and Tivoli Asset Discovery for Distributed 7.5 to License Metric Tool 9. IBM License Metric Tool 9.x Migration Cookbook Migrating from License Metric Tool and Tivoli Asset Discovery for Distributed 7.5 to License Metric Tool 9.x IBM IBM License Metric Tool 9.x Migration Cookbook

More information

IBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC. 13 Dec 2017

IBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC. 13 Dec 2017 IBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC 13 Dec 2017 IBM Security Learning Academy www.securitylearningacademy.com New content published

More information

IBM Guardium Data Encryption

IBM Guardium Data Encryption IBM Guardium Data Encryption RELEASE TAXONOMY FOR LINUX/AIX/WINDOWS 10-October-2018 GDE Taxonomy Version V.0.0.0 Major V.R.0.0 Mod V.R.M.0 SSE V.R.M.F Fixpack V.R.M.F Cadence 36-48 Months 12-15 Months

More information

Security Support Open Mic Client Certificate Authentication

Security Support Open Mic Client Certificate Authentication IBM Security Access Manager, Tuesday, December 8, 2015 Security Support Open Mic Client Certificate Authentication Panelists Jack Yarborough ISAM Level II Nick Lloyd ISAM Level II Scott Stough ISAM Level

More information

Configuring zsecure To Send Data to QRadar

Configuring zsecure To Send Data to QRadar Configuring zsecure To Send Data to QRadar CONFIGURATION, SETUP, AND EXAMPLES Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free:

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,

More information

IBM Security Identity Governance and Intelligence Clustering and High Availability

IBM Security Identity Governance and Intelligence Clustering and High Availability IBM Security Identity Governance and Intelligence Clustering and High Availability IBM SECURITY SUPPORT Luigi Lombardi: luigi.lombardi@it.ibm.com Gianluca Gargaro: g.gargaro@it.ibm.com Raffaele Sperandeo:

More information

IBM MaaS360 Kiosk Mode Settings

IBM MaaS360 Kiosk Mode Settings IBM MaaS360 Kiosk Mode Settings Configuration Settings for Kiosk Mode Operation IBM Security September 2017 Android Kiosk Mode IBM MaaS360 provides a range of Android device management including Samsung

More information

IBM UrbanCode Deploy V6.2 provides the tools needed to automate the application deployment pipeline

IBM UrbanCode Deploy V6.2 provides the tools needed to automate the application deployment pipeline IBM United States Software Announcement 215-447, dated October 27, 2015 V6.2 provides the tools needed to automate the application deployment pipeline Table of contents 1 Overview 3 Publications 2 Key

More information

Identity Governance Troubleshooting

Identity Governance Troubleshooting Identity Governance Troubleshooting Chris Weber Level 2 support, IBM Security May 16, 2017 Identity Governance Troubleshooting Support Files contents Accessing different logs and other files though the

More information

ISAM Advanced Access Control

ISAM Advanced Access Control ISAM Advanced Access Control CONFIGURING TIME-BASED ONE TIME PASSWORD Nicholas J. Hasten ISAM L2 Support Tuesday, November 1, 2016 One Time Password OTP is a password that is valid for only one login session

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

IBM Endpoint Manager Version 9.0. Software Distribution User's Guide

IBM Endpoint Manager Version 9.0. Software Distribution User's Guide IBM Endpoint Manager Version 9.0 Software Distribution User's Guide IBM Endpoint Manager Version 9.0 Software Distribution User's Guide Note Before using this information and the product it supports,

More information

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support. ISAM Federation STANDARDS AND MAPPINGS Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support July 19, 2017 Agenda ISAM Federation Introduction Standards and Protocols Attribute Sources

More information

IBM BigFix Compliance PCI Add-on Version 9.5. Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM

IBM BigFix Compliance PCI Add-on Version 9.5. Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard

More information

IBM Security Access Manager v8.x Kerberos Part 2

IBM Security Access Manager v8.x Kerberos Part 2 IBM Security Access Manager open mic webcast - Oct 27, 2015 IBM Security Access Manager v8.x Kerberos Part 2 Kerberos Single Sign On using Constrained Delegation Panelists Gianluca Gargaro L2 Support Engineer

More information

How to properly deploy, configure and upgrade the NAB

How to properly deploy, configure and upgrade the NAB Panelists Jeff DiCostanzo, Presenter AVP Team Lead Bill Klauke - Level 2 Product Lead Maxime Turlot - Level 2 Product Lead Ryan Andersen - Level 2 Senior Engineer Edward A Romero - Level 3 Network Security

More information

IBM BigFix Version 9.5. Patch for Red Hat Enterprise Linux User's Guide IBM

IBM BigFix Version 9.5. Patch for Red Hat Enterprise Linux User's Guide IBM IBM BigFix Version 9.5 Patch for Red Hat Enterprise Linux User's Guide IBM IBM BigFix Version 9.5 Patch for Red Hat Enterprise Linux User's Guide IBM Note Before using this information and the product

More information

IBM Endpoint Manager. OS Deployment V3.5 User's Guide

IBM Endpoint Manager. OS Deployment V3.5 User's Guide IBM Endpoint Manager OS Deployment V3.5 User's Guide IBM Endpoint Manager OS Deployment V3.5 User's Guide Note Before using this information and the product it supports, read the information in Notices

More information

Securing communication between SDS VA and its remote DB2 DB

Securing communication between SDS VA and its remote DB2 DB Securing communication between SDS 8.0.1 VA and its remote DB2 DB IBM SECURITY SUPPORT OPEN MIC PRESENTATION Ramamohan T Reddy - Senior Software Engineer / L2 Team Tech Lead - Directory Support Team Brook

More information

IBM License Metric Tool 9.0 Overview

IBM License Metric Tool 9.0 Overview ILMT Central Team IBM License Metric Tool 9.0 Overview Questions & Answers Welcome This is the twenty first Q&A event prepared by the ILMT Central Team We concentrate on License Metric Tool version 9.0

More information

IBM IBM Tivoli Endpoint Manager V8.1 Implementation.

IBM IBM Tivoli Endpoint Manager V8.1 Implementation. IBM 000-560 IBM Tivoli Endpoint Manager V8.1 Implementation http://killexams.com/exam-detail/000-560 A. It should always be empty in a healthy environment. B. It is used to store downloaded files from

More information

Automated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers

Automated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers ILMT Central Team Automated Bundling and Other New Features in IBM License Metric Tool 7.5 Questions & Answers Information These slides were just the deck of the ILMT Central Team Questions&Answers session.

More information

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide

Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:

More information

Performing an ObserveIT Upgrade Using the Interactive Installer

Performing an ObserveIT Upgrade Using the Interactive Installer Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One

More information

Installing Client Proxy software

Installing Client Proxy software Revision A McAfee Client Proxy 2.3.4 Installation Guide (McAfee epolicy Orchestrator) Installing Client Proxy software Client Proxy software Client Proxy consists of server and client software, whose deployment

More information

Patch Management using Dell Management Console v1.0

Patch Management using Dell Management Console v1.0 Patch Management using Dell Management Console v1.0 Dell Technical White Paper By Abhijit Pathak Dell Product Group - Enterprise Revision History Version Date Description Author(s) 1.0 13 April 2009 First

More information

BigFix OS Deployment. Windows 7 Migration Guide

BigFix OS Deployment. Windows 7 Migration Guide BigFix OS Deployment August, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product names, trade names,

More information

GX vs XGS: An administrator s comparison of the two products

GX vs XGS: An administrator s comparison of the two products : An administrator s comparison of the two products Panelists Bill Klauke IPS Product Lead, Level 2 Support Matthew Elsner XGS Development Yuceer (Banu) Ilgen XGS Development Jeff Dicostanzo AVP Support

More information

Integrated, Intelligence driven Cyber Threat Hunting

Integrated, Intelligence driven Cyber Threat Hunting Integrated, Intelligence driven Cyber Threat Hunting THREAT INVESTIGATION AND RESPONSE PLATFORM Zsolt Kocsis IBM Security Technical Executive, CEE zsolt.kocsis@hu.ibm.com 6th Nov 2018 Build an integrated

More information

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES Agenda Welcome Threat Intelligence EcoSystem Cyber Resiliency

More information

May the (IBM) X-Force Be With You

May the (IBM) X-Force Be With You Ann Arbor, Michigan July 23-25 May the (IBM) X-Force Be With You A QUICK PEEK INTO ONE OF THE MOST RENOWNED SECURITY TEAMS IN THE WORLD Marlon Machado Worldwide Standardization Leader, Application Security

More information

Open Mic Webcast. IBM Sametime Media Manager Troubleshooting Tips and Tricks. Tony Payne Sr. Software Engineer May 20, 2015

Open Mic Webcast. IBM Sametime Media Manager Troubleshooting Tips and Tricks. Tony Payne Sr. Software Engineer May 20, 2015 Open Mic Webcast IBM Sametime Media Manager Troubleshooting Tips and Tricks Tony Payne Sr. Software Engineer May 20, 2015 Agenda Troubleshooting Basics Setting a diagnostic trace Finding the right trace

More information

IBM United States Software Announcement , dated February 17, 2015

IBM United States Software Announcement , dated February 17, 2015 IBM United States Software Announcement 215-031, dated February 17, 2015 The IBM CICS Transaction Gateway V9.2 open beta offering enables continuous integration testing for JSON web services and all remote

More information

IBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute)

IBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) Note Before

More information

IBM Security Directory Server: Utilizing the Audit.log

IBM Security Directory Server: Utilizing the Audit.log IBM Security Directory Server Open Mic Webcast #1 November 4, 2014 IBM Security Directory Server: Utilizing the Audit.log Panelists Roy Spencer L2LDAP Technical Lead Ram Reddy L2LDAP Senior Engineer Benjamin

More information

Tivoli Endpoint Manager for Patch Management - AIX. User s Guide

Tivoli Endpoint Manager for Patch Management - AIX. User s Guide Tivoli Endpoint Manager for Patch Management - AIX User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation

More information

Let's talk about QRadar Apps: Development & Troubleshooting IBM SECURITY SUPPORT OPEN MIC

Let's talk about QRadar Apps: Development & Troubleshooting IBM SECURITY SUPPORT OPEN MIC Let's talk about QRadar Apps: Development & Troubleshooting IBM SECURITY SUPPORT OPEN MIC Slides and additional dial in numbers: http://ibm.biz/joinqradaropenmic August 23, 2017 NOTICE: BY PARTICIPATING

More information

Tanium Discover User Guide. Version 2.x.x

Tanium Discover User Guide. Version 2.x.x Tanium Discover User Guide Version 2.x.x June 27, 2017 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is

More information

IBM BigFix Compliance

IBM BigFix Compliance IBM BigFix Compliance A single solution for managing endpoint security across the organization Highlights Ensure configuration compliance using thousands of out-of-the-box bestpractice policies with automated

More information

How to Secure Your Cloud with...a Cloud?

How to Secure Your Cloud with...a Cloud? A New Era of Thinking How to Secure Your Cloud with...a Cloud? Eitan Worcel Offering Manager - Application Security on Cloud IBM Security 1 2016 IBM Corporation 1 A New Era of Thinking Agenda IBM Cloud

More information

Oracle Fusion Middleware Oracle WebCenter Collaboration

Oracle Fusion Middleware Oracle WebCenter Collaboration Oracle Fusion Middleware Oracle WebCenter Collaboration Release Notes 10g Release 4 (10.3.3.0.0) E22881-03 May 2013 This document describes the supported software and known issues for Oracle WebCenter

More information

Dell Repository Manager Business Client Version 2.0 User s Guide

Dell Repository Manager Business Client Version 2.0 User s Guide Dell Repository Manager Business Client Version 2.0 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION

More information

Simplifying Blade Server Update with Dell Repository Manager

Simplifying Blade Server Update with Dell Repository Manager Simplifying Blade Server Update with Dell Repository Manager Dell Engineering December 2015 A Dell Technical White Paper Revisions Date December 2015 Description Initial release THIS WHITE PAPER IS FOR

More information

Using ZENworks with Novell Service Desk

Using ZENworks with Novell Service Desk www.novell.com/documentation Using ZENworks with Novell Service Desk Novell Service Desk 7.1 April 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or

More information

Deploying Lookout with IBM MaaS360

Deploying Lookout with IBM MaaS360 Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,

More information

Creating Resources on the ZFS Storage Appliance

Creating Resources on the ZFS Storage Appliance Oracle Enterprise Manager Ops Center Creating Non-Global Zones Using a SAN Storage Library 12c Release 3 (12.3.0.0.0) E65613-01 October 2015 This guide provides an end-to-end example for how to use Oracle

More information

McAfee Host Intrusion Prevention Administration Course

McAfee Host Intrusion Prevention Administration Course McAfee Host Intrusion Prevention Administration Course Education Services administration course The McAfee Host Intrusion Prevention Administration course provides attendees with indepth training on the

More information

Upgrading an ObserveIT One-Click Installation

Upgrading an ObserveIT One-Click Installation Upgrading an ObserveIT One-Click Installation This document was written for ObserveIT Enterprise version 7.6.1. This document uses screenshots and procedures written for Windows Server 2012 R2 and SQL

More information

HP-UX Software and Patching Management Using HP Server Automation

HP-UX Software and Patching Management Using HP Server Automation HP-UX Software and Patching Management Using HP Server Automation Software Version 7.84, released August 2010 Overview... 2 Patch Management for HP-UX Prerequisites... 2 HP-UX Patching Features... 2 Importing

More information

Patch Management for AIX

Patch Management for AIX Patch Management for AIX Supported Versions The Patches for AIX Fixlet site provides Fixlet messages for the latest Maintenance Level packages for AIX 5.1, 5.2 and 5.3. It also includes inventory-only

More information

BigFix 2018 Roadmap. Aram Eblighatian. Product Manager IBM BigFix. 14 May, 2018

BigFix 2018 Roadmap. Aram Eblighatian. Product Manager IBM BigFix. 14 May, 2018 BigFix 2018 Roadmap Aram Eblighatian Product Manager IBM BigFix 14 May, 2018 What's New in BigFix? BigFix Platform BigFix Platform v9.5.7 Released Oct. 2017 Gathering Performance improvements (WebUI and

More information

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Cybersecurity THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Gary Meshell World Wide Leader Financial Services Industry IBM Security March 21 2019 You have been breached; What Happens Next 2 IBM Security

More information