In order to register for a class, you need to first create an EMC account
If you need further assistance, contact us
Summary
The RSA NetWitness Logs & Network Troubleshooting User Roles on-demand learning focuses on the RSA NetWitness trust model and how users, roles, and permissions control user access to the RSA NetWitness Logs & Network environment.
Overview
This on-demand learning focuses on the RSA NetWitness trust model and how users, roles, and permissions control user access to the RSA NetWitness Logs & Network environment. Use cases will be provided to demonstrate incorrect role configuration, symptoms, and fixes to correct the role.
Audience
All
Delivery Type
On-Demand Learning (self-paced eLearning)
Duration
30 minutes
Prerequisite Knowledge/Skills
Students should have completed the following courses prior to taking this training:
Learning Objectives
Upon successful completion of this course, participants should be able to:
- Describe the RSA NetWitness Logs & Network Trust Model
- Explain the difference between roles and permissions in the RSA NetWitness user interface and the roles and permissions on the RSA NetWitness services.
- Describe what roles require what permissions on the RSA NetWitness services
- Create custom roles
- Discuss requirements and best practices when creating custom roles
- Troubleshoot incorrectly configured roles
Course Outline
Role-Based Access Control
- Trusted connections
- Pre-configured roles
- Role permissions
Creating custom roles
- Why create a custom role?
- Best practices for creating custom roles
- Create a custom role
Troubleshooting roles
- Identifying symptoms of an incorrectly configured role
- Resolving an incorrectly configured role
In order to register for a class, you need to first create an EMC account
If you need further assistance, contact us