Skip navigation
Log in to follow, share, and participate in this community.

Recent Activity

RSA Information Design and Development
  This section provides resolutions to common problems that you may encounter while configuring Archer SecOps 1.2 or Archer SecOps 1.3 with Security Analytics Incident Management.  Setting the CA TruststoreProblem: After adding the endpoint for Security Analytics Incident Management, the CA truststore fails to set. Resolution:  Ensure that the SSH…
RSA Information Design and Development
View PDF    Malware Analysis Functions Malware Scoring Modules Roles and Permissions for Analysts  Configure Investigation Views and PreferencesConfigure Malware Summary of Events View Configure Navigate View and Events View  Conduct an InvestigationBegin an Investigation  Filter Information in the Navigate ViewManage User-Defined Meta Groups…
RSA Information Design and Development
View PDF    RSA ECAT Integration Configure ECAT to Receive RSA Live Feeds Configure ECAT Alerts via Message Bus Configure Contextual Data from ECAT via Recurring Feed Configure ECAT Alerts via Syslog into a Log Decoder
RSA Information Design and Development
View PDF    Introduction Best Practices Activate or Deactivate FIPS Back Up and Restore Data for Hosts and Services Change IP Address or Hostname of a Host  DISA STIG Hardening GuideIntroduction  ProceduresConfigure STIG Hardening for 10.6 Updated from Earlier Version Configure STIG Hardening for New 10.6 Installation Generate the OpenSCAP Report…
RSA Information Design and Development
View PDF    System Security and User Management  How Role-Based Access Control WorksRole Permissions  Set Up System SecurityStep 1. Configure Password Complexity Step 2. Change the Default admin Passwords Step 3. Configure System-Level Security Settings  Step 4. (Optional) Configure External AuthenticationConfigure Active Directory Configure PAM…
RSA Information Design and Development
  Below, all of the Security Analytics 10.6.5 User Guides are listed. Each guide is available as either a PDF or as a group of HTML topics. Clicking the HTML link for a guide opens its Table of Contents.   Additionally, documentation for reports, rules, parsers, meta data, and other content-related items is available as well. See the RSA Content…
RSA Information Design and Development
View PDF    Event Stream Analysis (ESA) Overview  Configure ESAStep 1. Add Event Stream Analysis Service Step 2. Add a Data Source to an ESA Service Step 3. Configure Advanced Settings for an ESA Service Step 4. Configure an ESA to Connect to the Context Hub on Another ESA  Additional ESA Procedures Change Default Storage PasswordsChange MongoDB…
RSA Information Design and Development
Click to view content  In most cases, the administrator will receive a request for custom meta from threat hunter. At this point, administrator performs the following steps to set up custom meta collection from a data feed. Reviews the request for custom meta with the threat hunter (requester). Collect custom meta. Create Custom Meta Keys Using Custom Feed This…
RSA Information Design and Development
Click to view content   This topic tells administrators how to change the default storage password for the Data Science database. In Security Analytics, this procedure is optional. However, it is always a best practice to change any default password for added security. In organizations that do not allow default passwords, this procedure is mandatory. Prerequisites…
Load more items