0
votes
2
answers
744
views

How can I create and add a self signed certificate to a tomcat keystore

Step 1. Create a self signed certificate Use the keytool command for generating a certificate as follows: /securonix/securonix_product/jdk1.7.0_60/bin/keytool -genkey -alias sxmr2_app -keyalg RSA -keystore key.keystore -keysize 2048 -ext san=ip:150.160.8.17 Finally the IP address of the server is u...
21 Sep, 12:14 Avinash Pali25
0
votes
1
answer
102
views

Mcafee DLP Email Protection Database import

How to extract information from the database when we have unique event id splitted across rows having different evidence values like email subject, email recipient, attachments etc? Also when we have multiple email recipients?
01 Aug, 09:52 Jaydeep15
0
votes
0
answers
82
views

Has anyone worked on Opentext content server logs?

Has anyone worked on Opentext content server logs?
21 Jul, 14:52 Abhilash Tum...15
0
votes
0
answers
159
views

Does Securonix integrate with Netskope

Does Securonix integrate with Netskope?
24 May, 20:20 vidit15
0
votes
0
answers
2.2k
views

Does Securonix integrate with MobileIron

Does Securonix integrate with MobileIron?
24 May, 20:20 vidit15
0
votes
0
answers
148
views

Does Securonix Integrate with Dell Credant

Does Securonix Integrate with Dell Credant
24 May, 20:19 vidit15
0
votes
0
answers
146
views

Does Securonix Integrate with Avecto

Does Securonix Integrate with Alecto?
24 May, 20:17 vidit15
0
votes
0
answers
151
views

Does Securonix Integrate with WSSO 10g?

Does Securonix Integrate with WSSO 10g?
24 May, 20:15 vidit15
0
votes
0
answers
132
views

Does Securonix integrate with Ping

Does Securonix integrate with Ping?
24 May, 20:14 vidit15
0
votes
0
answers
143
views

Does Securonix integrate with Imperva DAM(Database)

Does Securonix integrate with Imperva DAM(Database)?
24 May, 20:10 vidit15
0
votes
3
answers
432
views

Error in 5.0 Installation on local machine

Installation Documents and version: The versions of softwares used in Installation of local instance. Java version: Java1.8.0_73 Tomcat: tomcat 8.0.28 SQL Server: Mysql server 5.7 Securonix home: One available on xx.xx.xx.xx (downloaded on 02/08/2016) Profiler:One available on xx.xx.xx.xx (downloade...
29 Mar, 01:49 tgulati ♦♦196
0
votes
0
answers
307
views

Risk score mismatch and refresh

Hi Team, I am facing an issue with the risk score on high risk user dashboard. The risk score keeps on refreshing at regular intervals. Also, in some cases, the risk score on high risk user dashboard for user is 5.2 wherein the score for the policies violated is 0.0 and 0.2. After some time, it refr...
18 Feb, 22:29 omi15
0
votes
0
answers
363
views

MySQL Function that Converts LDAP Timestamps to Importable Format(s)

While on site with a client, we noticed that some Windows AD attributes we were receiving came in an interesting format. For example, the accountExpires attribute is stored in what is called Windows/LDAP timestamp. It measures time that has passed since Jan. 1, 1601 (weird) in 100s of nanoseconds (m...
08 Feb, 09:33 Anthony Herbert15
1
vote
3
answers
3.0k
views

Clustering Procedure - Master Child Architecture

The following are the steps we followed for setting up Master-Child Architecture. First make sure you have the latest version of Profiler 4.6.8 Build:20140918 and up. After successfully installing the application on all the servers and right before you start up tomcat on the servers do the following...
25 Nov '15, 01:02 Praful ♦♦126
0
votes
0
answers
2.2k
views

Effective Solutions In web design services - What's Needed

Once you have made your head about obtaining your website working, it?s time for you to decide who is going to generate it. With the help of some Google tips and Java scripts you are able to make a website within a handful of hours but when you are prepared about your business, an inadequate quality...
15 Nov '15, 16:00 DaleMarsh415
0
votes
1
answer
739
views

How to create self signed certificates in Master Child Architecture

How to create self signed certificates in Master Child Architecture
27 Oct '15, 15:00 Mandar17
0
votes
0
answers
4.1k
views

Do not Count on To See Anymore Game Boy Games On The 3DS Virtual Console

Are you unbelievably bored? Are you uninterested in spending time on social networking websites like Fb? Then it's time you checked out a number of the finest free games supplied by web sites on the Internet. Once you start playing these online games, your boredom will surely seem miles away. At Dai...
23 Oct '15, 05:54
0
votes
0
answers
569
views

Domain/URL categorization data

We have a log source that contains Internet domain names. I want to correlate that with the Internet domain categorization data and use the category names (banking, social, webmail, etc) in the policies to flag violations. https://www.trustedsource.org/download/ts_wd_reference_guide.pdf Does anyone ...
28 Sep '15, 13:21 rmurthy11
0
votes
1
answer
464
views

Why will the display order of attributes not appear as specified?

No matter what I chose to display on the UI or the order I have given.
23 Sep '15, 21:40 Anthony Herbert15
0
votes
1
answer
664
views

Restoring the data from failed child node to a good child node

I have 1 Master node and 3 Child nodes. One of the child nodes (child 2) goes down again and again due to hardware issues. How can I restore the data from the failed child node(child 2) to a good child node?
22 Sep '15, 14:51 Rugved15
0
votes
1
answer
1.1k
views

Changing host-name/DNS-alias for a node post clustering set-up

What are the changes that are needed to be performed to change a hostname/dns alias name for a node once clustering is set-up?
20 Sep '15, 23:00 Aditya100
0
votes
1
answer
1.2k
views

Changing DB name for a node post clustering set-up

What are the changes that are needed to be performed to change a database name for a node once clustering is set-up?
20 Sep '15, 22:50 Aditya100
0
votes
1
answer
5.8k
views

How to fix Splunk connection Error? ["No appropriate protocol (Protocol is disabled or cipher suites are inappropriate")]

For some users, Splunk integration may not work out of the box. Java 1.7 (which powers Tomcat, and Securonix) has SSL disabled by default. This results in the following error while attempting to connect to Splunk in Securonix: No appropriate protocol (protocol is disabled or cipher suites are inappr...
29 Jul '15, 11:50 aravind25
0
votes
1
answer
1.4k
views

What are the most common installation problems encountered?

A partial list of things I've seen: 1. Java JDK not supported - Currently 1.7.0u51 works, however 1.7.0.55 fails. 2. Schema exists, but not all MySQL scripts complete( no data or upgrade file run) 3. JAVA_HOME variable not defined, or not set correctly 4. The password for the DB not specified/in...
14 Jul '15, 12:02 bhanureddy15
0
votes
0
answers
549
views

What is the use of Configure >Settings >Holidays

Hi, What is the use of Configure >Settings >Holidays option in RTI 4.6 And Where/how we can implement (Ex. In Policy violation, Behaviour Outlier, etc.)
14 Jul '15, 07:56 sunil15
0
votes
0
answers
566
views

How to import events from Windows 7 into RTI 4.6

Hi, How we can make direct connection to import events like System, Application, Security (one at a time Ex. Security events only) from windows 7 into RTI 4.6 without domain controller (i.e windows 7 in WORKGROUP).
14 Jul '15, 06:33 sunil15
0
votes
1
answer
851
views

How to enable MySQL replication

How to enable MySQL replication
25 Jun '15, 10:44 Praful ♦♦126
0
votes
1
answer
714
views

How should i enable single sign on (SSO) in Securonix?

How should i enable single Sign on (SSO) in Securonix?
19 Jun '15, 09:10 Praful ♦♦126
0
votes
0
answers
634
views

Securonix trial request

Hey Guys, I am working in a Securonix project and need to learn by doing some research, for which I need a trial version of securonix web platform to install in my homelab. I am unable to download at community page as it is asking for account and I am unable to register an account. Requesting your k...
17 Jun '15, 08:54 bedantmishra15
0
votes
1
answer
705
views

Watchlist functionality and usage

Can someone share their experience working with the watchlists, what exactly happens when users are added to a watchlist? I am in need of giving the security analysts (who do not have admin privileges in Securonix) the ability to update watchlists. The analysts want to assign a high risk score to ce...
27 Apr '15, 15:44 mnair71
posts per page153050