All Activity

2 updates since last visit
Jeremy Kerwin
Here is my situation. I have a feed from a commercial threat intel provider that matches IPs and domains to threat actors. I'm in the investigate module, investigating an alert on a dst.ip address that is alerting to a particular threat group, let's say APT1. The source of the event is from the firewall stating that the proxy server is connecting… (Show more)
in RSA NetWitness Platform
Shlomo Katz
Version 7.1.1 P1 I have a role that grants the HelpDesk the ability to make requests for anybody in the company. Currently I have the  AVEKSA: Access Request Administrator as the entitlement. However, this give them the ability to approve the request as well.   Question: What is the best way to grant them the ability to make requests but not… (Show more)
Lenore Tumey
A customer ran a vulnerability scanning tool in their network, and it reported the following on their Authentication Manager servers (port 7002):   “Vulnerability: SSL Certificate Cannot Be Trusted: The SSL certificate for this service cannot be trusted.” “Vulnerability: SSL Self-Signed Certificate: The SSL certificate chain for this service… (Show more)
in RSA SecurID Access
Susan Read-Miller
Click to view contentThe NIST National Vulnerability Database (NVD) is the U.S. government repository of standards-based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and…
in RSA Exchange for RSA Archer
RSA Link Team
Click to view contentThis document provides information on how to engage the RSA Customer Support team for assistance. …
in RSA Customer Support
Matters Most
Kamlesh Kumar Gupta
Audience Product Course Name / Description Delivery Options Delivery  Type Role Cost Level Customers AA RSA Adaptive Authentication Case Management Overview This self-paced, on-course serves as an introduction to the Case Management application under the suite of Back Office applications for RSA Adaptive Authentication (AA) both on Cloud…
in RSA University
Matters Most
RSA Customer Support
Click to view contentArticle Content Article Number 000037854 Applies To RSA Product Set: Identity Governance & Lifecycle RSA Version/Condition: 7.1+   Issue After upgrading to RSA Identity Governance & Lifecycle 7.x, sub menus defined in drop-down request buttons in RSA Identity Governance & Lifecycle may have truncated text. For example, The request button…
Matters Most
Clive Morrish
Click to view contentHi,   I have the following requirement that I'm struggling to configured within IG&L.   Customer has the concept of Agents and Agency Staff.    Agency Staff are identified by the Employee Type Agents are identified by the Employee Type and any named Supervisors. For example Tracy, Steven and Richard are all treated as agents     These need… (Show more)