VLC Configuration steps A) On Each VLC do following steps: 1) Enable yum
repositories on VLC’s.# vi /etc/yum.repos.d/CentOSBase.repo #set enable
to 1 2) Install Keepalived on both VLC’s.# yum install keepalived 3)
Configure keepalived config on VLC-1...
CategorySub Category#Use CaseLog Source#RSA Supported#Business Use
CasesAccess/AuthenticationIdentity ManagementMonitor for use of disabled
usernamesActive Directory , Databases, Applications, Web Proxy, HR
dataIntegrating Windows AD and monitoring f...
Here in this space an attempt is being made to list some Use cases,
custom as well as Out of box (Live) for their effectiveness and usage in
Threat monitoring within an enterprise. S.NoUse caseRSA OOB
RuleDescriptionEvent Sources1DNS Amplificationesa...
In Today's highly competitive environment, business owners are
constantly required to ensure their services and offerings are audited
and reported for compliance and regulation conformance. Below is an
attempt to understand how RSA portfolio helps ma...
I do not see any challenge in this setup. However, always discuss with
Customer about their BCP logic which has to be considered like RPO/RTO
and data availability. This has an impact on their provisioning of
bandwidth availability between two sites....
As per my research till now, i could find below information which could
help in at least detection of any variants, which should be enough for
you to isolate the machine quickly on your network and then perform
investigations: > Check for traffic on ...
Have a look at below URL mentioning Event filter at Log collection
layer. Hope this helps. Though it talks only about event ID or logging
level filter, this should help you in some cases if you know what logs
to filter https://community.rsa.com/docs/...
Hi Javier, regards to detecting malware, there are two ways Network
layer and Endpoint layer in Netwitness suite of products. For actual
identification of any malware executable which is fileless in nature can
be identified by RSA netwitness endpoint...