1
vote
3
answers
1.9k
views

Clustering Procedure - Master Child Architecture

The following are the steps we followed for setting up Master-Child Architecture. First make sure you have the latest version of Profiler 4.6.8 Build:20140918 and up. After successfully installing the application on all the servers and right before you start up tomcat on the servers do the following...
25 Nov '15, 01:02 Praful ♦♦126
0
votes
1
answer
268
views

How can I create and add a self signed certificate to a tomcat keystore

Step 1. Create a self signed certificate Use the keytool command for generating a certificate as follows: /securonix/securonix_product/jdk1.7.0_60/bin/keytool -genkey -alias sxmr2_app -keyalg RSA -keystore key.keystore -keysize 2048 -ext san=ip:150.160.8.17 Finally the IP address of the server is u...
18 Nov '15, 12:16 Kayzadv25
0
votes
0
answers
274
views

Effective Solutions In web design services - What's Needed

Once you have made your head about obtaining your website working, it?s time for you to decide who is going to generate it. With the help of some Google tips and Java scripts you are able to make a website within a handful of hours but when you are prepared about your business, an inadequate quality...
15 Nov '15, 16:00 DaleMarsh415
0
votes
1
answer
326
views

How to create self signed certificates in Master Child Architecture

How to create self signed certificates in Master Child Architecture
27 Oct '15, 15:00 Mandar17
0
votes
0
answers
2.6k
views

Do not Count on To See Anymore Game Boy Games On The 3DS Virtual Console

Are you unbelievably bored? Are you uninterested in spending time on social networking websites like Fb? Then it's time you checked out a number of the finest free games supplied by web sites on the Internet. Once you start playing these online games, your boredom will surely seem miles away. At Dai...
23 Oct '15, 05:54
0
votes
0
answers
232
views

Domain/URL categorization data

We have a log source that contains Internet domain names. I want to correlate that with the Internet domain categorization data and use the category names (banking, social, webmail, etc) in the policies to flag violations. https://www.trustedsource.org/download/ts_wd_reference_guide.pdf Does anyone ...
28 Sep '15, 13:21 rmurthy11
0
votes
1
answer
185
views

Why will the display order of attributes not appear as specified?

No matter what I chose to display on the UI or the order I have given.
23 Sep '15, 21:40 Anthony Herbert15
0
votes
1
answer
378
views

Restoring the data from failed child node to a good child node

I have 1 Master node and 3 Child nodes. One of the child nodes (child 2) goes down again and again due to hardware issues. How can I restore the data from the failed child node(child 2) to a good child node?
22 Sep '15, 14:51 Rugved15
0
votes
1
answer
486
views

Changing host-name/DNS-alias for a node post clustering set-up

What are the changes that are needed to be performed to change a hostname/dns alias name for a node once clustering is set-up?
20 Sep '15, 23:00 Aditya90
0
votes
1
answer
438
views

Changing DB name for a node post clustering set-up

What are the changes that are needed to be performed to change a database name for a node once clustering is set-up?
20 Sep '15, 22:50 Aditya90
0
votes
1
answer
3.1k
views

How to fix Splunk connection Error? ["No appropriate protocol (Protocol is disabled or cipher suites are inappropriate")]

For some users, Splunk integration may not work out of the box. Java 1.7 (which powers Tomcat, and Securonix) has SSL disabled by default. This results in the following error while attempting to connect to Splunk in Securonix: No appropriate protocol (protocol is disabled or cipher suites are inappr...
29 Jul '15, 11:50 aravind25
0
votes
1
answer
954
views

What are the most common installation problems encountered?

A partial list of things I've seen: 1. Java JDK not supported - Currently 1.7.0u51 works, however 1.7.0.55 fails. 2. Schema exists, but not all MySQL scripts complete( no data or upgrade file run) 3. JAVA_HOME variable not defined, or not set correctly 4. The password for the DB not specified/in...
14 Jul '15, 12:02 bhanureddy15
0
votes
0
answers
303
views

What is the use of Configure >Settings >Holidays

Hi, What is the use of Configure >Settings >Holidays option in RTI 4.6 And Where/how we can implement (Ex. In Policy violation, Behaviour Outlier, etc.)
14 Jul '15, 07:56 sunil15
0
votes
0
answers
302
views

How to import events from Windows 7 into RTI 4.6

Hi, How we can make direct connection to import events like System, Application, Security (one at a time Ex. Security events only) from windows 7 into RTI 4.6 without domain controller (i.e windows 7 in WORKGROUP).
14 Jul '15, 06:33 sunil15
0
votes
1
answer
468
views

How to enable MySQL replication

How to enable MySQL replication
25 Jun '15, 10:44 Praful ♦♦126
0
votes
1
answer
401
views

How should i enable single sign on (SSO) in Securonix?

How should i enable single Sign on (SSO) in Securonix?
19 Jun '15, 09:10 Praful ♦♦126
0
votes
0
answers
315
views

Securonix trial request

Hey Guys, I am working in a Securonix project and need to learn by doing some research, for which I need a trial version of securonix web platform to install in my homelab. I am unable to download at community page as it is asking for account and I am unable to register an account. Requesting your k...
17 Jun '15, 08:54 bedantmishra15
0
votes
1
answer
419
views

Watchlist functionality and usage

Can someone share their experience working with the watchlists, what exactly happens when users are added to a watchlist? I am in need of giving the security analysts (who do not have admin privileges in Securonix) the ability to update watchlists. The analysts want to assign a high risk score to ce...
27 Apr '15, 15:44 mnair71
0
votes
3
answers
2.0k
views

UniversalForwarder freezes after java.lang.OutOfMemoryError: GC overhead limit exceeded

We're finding the UniversalForwarder (UL) freezes up after Java garbage collection out of memory errors. Our current Java command line to start UL is as follows: java -jar $SECURONIX_HOME/agent/UniversalForwarder.jar -server -Xms16g -Xmx20g -XX:+UseG1GC -XX:MaxPermSize=512m -XX:+AggressiveOpts -XX:+...
22 Apr '15, 16:03 Aditya90
0
votes
1
answer
436
views

Migrating exploded Profiler.war from webapps to another Tomcat server.

How to migrate the exploded Profiler.war (Profiler folder) from webapps to another server's webapps folder?
21 Apr '15, 21:20 AKadakia15
0
votes
1
answer
3.0k
views

top N charts are not getting displayed on master child architecture

I have created a datasource and enable top N charts . Datasource is configured on Child node. I have imported activities but top N chart showing 'No data to display' message on chart. How can I resolve this?
01 Apr '15, 03:08 Praful ♦♦126
0
votes
1
answer
582
views

users are not getting synced with child nodes

I configured master child architecture, But Users are not getting synced with child nodes? How can I debug this?
01 Apr '15, 03:02 Praful ♦♦126
0
votes
1
answer
607
views

Uncorrelated User Account Status ="Suspended"

We imported access entitlements for various applications in GE Capital, but some apps have uncorrelated users whose Account Status = "Suspended." Other uncorrelated users in that same app have Account Status = "Active." What does this mean exactly, and how is Securonix pulling this information when ...
01 Apr '15, 02:00 Praful ♦♦126
0
votes
3
answers
962
views

Tracking identity enablement/disablement

In our identity feed, we have a flag indicating if userid is enabled or disabled. I want changes to this flag's state to affect the user table's dateenabled and datedisabled fields. I could do it via a scheduled SQL function on the server side, such as check flag status and if current state's time s...
18 Mar '15, 15:43 JasonBlue17
0
votes
5
answers
1.2k
views

What is best way to import a watchlist?

Been given a flat file of employee identifiers to be used as one of our watchlists; requirements are for new idenitifiers to be added to the watchlist on an ad-hoc basis. The watchlist will then be used from a policy to identify risky behavior by any members. What is best way to incorporate a file-b...
12 Mar '15, 18:45 JasonBlue17
0
votes
0
answers
406
views

Unchanged terminated users records are updated upon each import

What would cause virtually every terminated user's record to be updated on each import even though no changes were made in the source data, and how to correct? Problem details: Upon every user import, over 26K users are reported as having been updated. However, the source data show that all but a fe...
12 Mar '15, 17:48 JasonBlue17
0
votes
1
answer
532
views

how to update configuration of child node

I noticed time difference between imported activity and actual time of event. I have to change time zone of Child node. Can I do this from Master?
28 Feb '15, 09:21 mnair71
0
votes
1
answer
516
views

Control user sync process

How can I control sync process in Master? I would like to run sync user job only once in 3 hours.
28 Feb '15, 09:18 mnair71
0
votes
3
answers
1.2k
views

How to archive data in Securonix?

How can I archive data in Securonix.
28 Feb '15, 09:13 mnair71
0
votes
2
answers
550
views

incremental import from DB

Hi, I’m trying to build an incremental upload for events on other data source I wrote the following query for the import in order to have only first 30 seconds – select * from cartis.CARDS_MESSAGES_RO4 where timestamp_peula > to_date('01-jan-2015 00:00:00', 'DD-MON-YYYY HH24:MI:SS') and timestamp...
26 Feb '15, 03:35 acohen15
posts per page153050