Analyzing Hardware Inventory report and hardware scan files

Similar documents
More on relevance checks in ILMT and BFI

Interpreting relevance conditions in commonly used ILMT/BFI fixlets

BigFix Query Unleashed!

How AppScan explores applications with ABE and RBE

IBM Security Identity Manager New Features in 6.0 and 7.0

Using Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting

HTTP Transformation Rules with IBM Security Access Manager

Introduction to IBM Security Network Protection Manager

IBM Security Access Manager Single Sign-on with Federation

IBM Security Guardium: : Sniffer restart & High CPU correlation alerts

What's new in AppScan Standard version

IBM BigFix Client Reporting: Process, Configuration, and Troubleshooting

QRadar Open Mic: Custom Properties

Remote Syslog Shipping IBM Security Guardium

Deploying BigFix Patches for Red Hat

Configuring your policy to prevent appliance problems

IBM Security Guardium: Troubleshooting No Traffic Issues

IBM Security Network Protection

Junction SSL Debugging With Wireshark

What's new in AppScan Standard/Enterprise/Source version

IBM Security Support Open Mic

IBM Security Network Protection v Enhancements

Security Support Open Mic: ISNP High Availability and Bypass

IBM BigFix Relays Part 1

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation

XGS & QRadar Integration

QRadar Feature Discussion IBM SECURITY SUPPORT OPEN MIC

IBM Threat Protection System: XGS - QRadar Integration

Disk Space Management of ISAM Appliance

Let s Talk About Threat Intelligence

SWD & SSA Updates 2018

IBM Security Network Protection Open Mic - Thursday, 31 March 2016

Understanding scan coverage in AppScan Standard

ISAM Advanced Access Control

IBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC. 13 Dec 2017

IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions

XGS: Making use of Logs and Captures

XGS Administration - Post Deployment Tasks

BigFix 101- Server Pricing

IBM Security Identity Governance and Intelligence Clustering and High Availability

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.

Security Support Open Mic Client Certificate Authentication

IBM BigFix Relays Part 2

Integrated, Intelligence driven Cyber Threat Hunting

Security Support Open Mic Build Your Own POC Setup

Optimizing IBM QRadar Advisor with Watson

IBM MaaS360 Kiosk Mode Settings

Identity Governance Troubleshooting

How to properly deploy, configure and upgrade the NAB

Configuring zsecure To Send Data to QRadar

Fabrizio Patriarca. Come creare valore dalla GDPR

IBM Security Directory Server: Utilizing the Audit.log

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

IBM Guardium Data Encryption

IBM Security Access Manager v8.x Kerberos Part 2

May the (IBM) X-Force Be With You

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

Securing communication between SDS VA and its remote DB2 DB

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

IBM Application Security on Cloud

Enhancements and new features in ILMT/SUA IBM License Metric Tool & Software Use Analysis Questions and Answers Enablement Team

Securing global enterprise with innovation

How to Secure Your Cloud with...a Cloud?

GX vs XGS: An administrator s comparison of the two products

Let's talk about QRadar Apps: Development & Troubleshooting IBM SECURITY SUPPORT OPEN MIC

Be effective in protecting against the cybercrime

The New Era of Cognitive Security

Advanced and Customized Net Conference with Microsoft Office Live Meeting 2007

Continuous Diagnostics and Mitigation demands, CyberScope and beyond

Technology Guide. For the Spring 2018 Virtual Learning Session. 1 P a g e

The McGill University Health Centre (MUHC)

Performance tuning in SDS VA with a remote DB2 DB

Modern Realities of Securing Active Directory & the Need for AI

Optimize your BigFix Deployment via Customization and Integration. Lee Wei

Migration from version 7.5 to 9.0. IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team

Personal Conference Number User Guide

Version Moodle Module v3.0 for Web Conferencing Configuration and Installation Guide

Ponemon Institute s 2018 Cost of a Data Breach Study

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

IBM WebSphere Service Registry and Repository V8.5.6 offers enhancements to improve REST service support and user productivity

Penetration testing a building automation system

BlueJeans Events Instructions for Moderators. October 2017

Customized Net Conference Powered by Cisco WebEx Technology Event Center

IBM Security QRadar Version Architecture and Deployment Guide IBM

BigFix OS Deployment. Windows 7 Migration Guide

Let s talk about QRadar 7.2.5

IBM. Migration Cookbook. Migrating from License Metric Tool and Tivoli Asset Discovery for Distributed 7.5 to License Metric Tool 9.

WebEx Participant Guide

IBM BigFix Compliance

Deploying Lookout with IBM MaaS360

IBM UrbanCode Deploy V6.2 provides the tools needed to automate the application deployment pipeline

Notice on Names and Logos Used in This Presentation

Service Description. IBM Aspera Files. 1. Cloud Service. 1.1 IBM Aspera Files Personal Edition. 1.2 IBM Aspera Files Business Edition

WebEx Audio. Features

Cisco WebEx Training Center on the Mac OS Getting Started. Join a Session. Schedule a Session. Start a Session. Connect to the Audio Conference

IBM Cloud Lessons Learned: VMware Cloud Foundation on IBM Cloud VMworld 2017 We are a cognitive solutions and cloud platform company that leverages th

Outsmarting the Smart City DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUNS MODERN CITIES

About MiTeam. MiTeam Stream. MiTeam on MiCollab for PC, MAC Client, and Web Client. MiTeam Stream tabs. Create a Stream.

Instant Net Conference with Cisco WebEx Meeting Center

Transcription:

Analyzing Hardware Inventory report and hardware scan files IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu option. To ask a question by voice, you must either Call In or have a microphone on your device. You will not hear sound until the host opens the audio line. For more information, visit: http://ibm.biz/webexoverview_supportopenmic By : Pau Leen Lee ILMT Support Engineer Email : leepl@my.ibm.com 28 February 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING THE CALL, AS WELL AS TO IBM S USE OF SUCH RECORDING IN ANY AND ALL MEDIA, INCLUDING FOR VIDEO POSTINGS ON YOUTUBE. IF YOU OBJECT, PLEASE DO NOT CONNECT TO THIS CALL.

Panelists Presenter : Sherrie Clarke, ILMT L2 Support Engineer Panelists: Khalid Yahya, ILMT Advisory Software Engineer Leslie Popow, ILMT L2 Support Engineer Hope Maxwell-Daley, ILMT L2 Support Team Leader Moderator: Hope Maxwell-Daley

Goal of Session Advise users so they can a) Accomplish simple troubleshooting for hardware files b) Locate and distinguish different computer IDs c) Locate hardware files and know how to use them

Agenda of Session a) Hardware Inventory Summary b) Viewing hardware inventory from ILMT UI c) Checking Hardware computer in Big Fix console d) Viewing hardware information from database e) Checking related files

Hardware Refresher Understanding the hardware process in ILMT

Hardware software scans based on software identification (SWID) tags For hardware discovery - is being used by scanner Scanner is obtained during installation of BigFix client From BigFix client, it will enables both software and capacity scans These capacity scans are collected set of data which will appear in ILMT reporting 6 IBM Security

Viewing Hardware Inventory from ILMT UI You need to login to ILMT / BFI Web User Interface Click Reports > Infrastructure Hardware Inventory 7 IBM Security

Checking Computer ID from Big Fix Console Computer ID is assigned by Big Fix For ILMT, remote_id is being used 8 IBM Security

Adding Column for computer ID 9 IBM Security

Computer Properties Summary 10 IBM Security

Detecting From Database Queries to capture information from database

1) You would need to login to TEMADB or SUADB 2) DB2 connect SUADB 3) Run the following statement to see one sample hardware which is found in reporting: select * from sam.processors p join dbo.computers c on p.computer_id = c.id where c.remote_id = 148382888 <- use computer ID from Big Fix select * from sam.processors p where p.partition_network_address = LMT923' 12 IBM Security

Query1 output sample 13 IBM Security

Query2 output sample 14 IBM Security

Running the Scans Procedure in Big Fix Console to Run Hardware Scans

To check for the files in hardware repository, one needs to ensure that fixlet Run Capacity Scan has been done. To perform the Run Capacity Scan: a) Use the credentials to login to BigFix console b) Select Sites > External Sites > IBM License Reporting (ILMT) > Fixlets and Tasks and select Run Capacity Scan and Upload Results c) Select Take Action, and choose Click here to schedule regular capacity scans and uploads of results. d) Select the device computer involved 16 IBM Security

Determining Hardware output files 17 IBM Security

Checking COMPUTER ID from Hardware Inventory Console 18 IBM Security

How to check if capacity scan ran from logs How to check if capacity scan ran from UI There is no logging that can be seen from ILMT UI directly, however in case of error, you should take note of No Scan Data in ILMT UI Dashboard. 19 IBM Security

Questions for the panel Now is your opportunity to ask questions of our panelists. To ask a question now: Raise your hand by clicking Raise Hand. The Raise Hand icon appears next to your name in the Attendees panel on the right in the WebEx Event. The host will announce your name and unmute your line. or Type a question in the box below the Ask drop-down menu in the Q&A panel. Select All Panelists from the Ask drop-down-menu. Click Send. Your message is sent and appears in the Q&A panel. To ask a question after this presentation: You are encouraged to participate in the dw Answers forum: https://developer.ibm.com/answers/topics/ilmt/ 20 IBM Security

For more information More articles you can review: IBM developerworks articles: https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/ibm%20license%20metric%20tool IBM Knowledge Center https://www.ibm.com/support/knowledgecenter/en/ss8jfy_9.0.0/com.ibm.lmt.doc_9.0/com.ibm.license.mgmt.doc/ic -homepage_lmt.html Useful links: Get started with IBM Security Support IBM Support Portal Sign up for My Notifications Follow us: 21 IBM Security

THANK YOU FOLLOW US ON: https://www.facebook.com/ibmsecuritysupport/ youtube/user/ibmsecuritysupport @askibmsecurity securityintelligence.com xforce.ibmcloud.com Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.