*Note: this course is based upon IBM Security® Guardium® Data Protection v11.4.ĭatabase administrators, security administrators, security analysts, security technical architects, and professional services using Guardium. Hands-on exercises reinforce the skills learned. This course provides the foundational level processes, procedures, and practices necessary to configure Guardium to monitor and protect sensitive data. Guardium provides a broad range of data security and protection capabilities that can protect sensitive and regulated data across environments and platforms. It discovers and classifies sensitive data from across an enterprise, providing real time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data. Note: Comments defined for inspection engines, installed policies, or audit process results can be viewed from the individual definitions, but they cannot be displayed on a report.IBM Security® Guardium® Data Protection (Guardium) supports a zero trust approach to security. For each sharable user comment, this report lists the date created, the type of item to which it applies (an alert, for example), the user who created the comment, and the contents of the comment. Sharable user comments are all comments except for inspection engine, installed policy, and audit process results comments. Use a tabular report to display a larger time period. If you alter the run-time parameters to include a larger timeframe, you may receive a message indicating that there is too much data. This graphical report is intended to display recent activity only. See Current Status Monitor on the Predefined Reports - Common page.īy default, displays the request rate for the last two hours. This report appears on the default layout for both administrators and users. This report has no run-time parameters, and is based on a system-only query that cannot be modified. Running Query Monitor (in the Guardium Administration Guide)įor each S-TAP reporting to this Guardium appliance, this report identifies the S-Tap Host, S-Tap Version, DB Server Type, Status (active or inactive), Last Response Received (date and time), Primary Host Name, and true/false indicators for: KTAP, TEE, MS SQL Server Shared Memory, DB2 Shared Memory, Local TCP monitoring, Named Pipes Usage, and Encryption. For information about an application portlet, click the help button on its toolbar.Ĭurrent Status Monitor (on Predefined Reports - Common page)ĭata Sources (on Predefined Reports - Common page) No additional training for multiple products. Integration with other security products. Heterogeneous support is a great asset to leverage across the infrastructure to reduce risk. Some tabs contain both report and application portlets. Guardium is the leader in database and big data security. A secure, tamper-proof audit trail that supports the Separation of Duties (SOD) required by. The reports are presented in tab > menu order. Database Activity Monitoring with IBM Security Guardium. For a description of the reports on the default user layout, see Predefined user Reports. This page provides a short description of all predefined reports on the default administrator layout. Predefined admin Reports Predefined admin Reports Guardium Insights can complement and enhance existing Guardium® Data Protection deployments or be installed on its own to help solve compliance and cloud data activity monitoring challenges.
0 Comments
Leave a Reply. |