Guardium File Activity Monitoring provides tools to discover, classify, and build policies for files. In this lab, you use the Quick Search GUI window to find files that contain sensitive information, select a set of these files, and create a policy that monitors attempts to access these files.
This lab is useful for Guardium users and administrators who need to monitor access to files that contain sensitive information. The lab is based on Guardium version 10.1.5.
Guardium 10.1.4 includes a new group builder application that provides powerful tools you can use to add users to a group and review which resources use a given group. In this course, you learn to how to build and populate Guardium groups.
Guardium Data Security policies help flag suspicious database activity. When you configure policy rules to ignore trusted database activity, you can reduce the load on the network and Guardium managed units. In this lab, you create a policy with rules to discard trusted activity and flag untrusted activity.
In this video, Shay Harel, Director of Data Security Engineering, explores the new features and updates in IBM Guardium v11.
- Active threat analytics
- Risk spotter
- Policy analyzer
- Smart Assistant
- CyberArk integration
- Data protection for files (Sharepoint and NAS)
- Vulnerability Assessment enhancements
- External STAP with Kubernetes
- Monitor DBaaS without STAP
- New platform support database
- Miscellaneous updates
Guardium policies often have multiple rules. By default, after a rule is triggered, processing stops. If you do not want to stop processing after the first rule triggers, you must configure your policy to continue to the next rule. In this lab, you configure and test a policy to examine the continuation functionality.
IBM Guardium provides powerful functions you can use to monitor and control database access. Guardium can terminate sessions performing suspicious database access commands and even quarantine suspicious users. In this lab, you explore the session termination and quarantine functionality.
Guardium provides over 600 preconfigured reports. As well as being useful in themselves, these reports can serve as templates to create a report customized to your specific needs. This saves time and effort. In this course, you clone a Guardium query. Then, you customize the fields and conditions of this query and generate a report from the new query.
Guardium gathers a large amount of data about your database environment. You use reports and queries to learn the details of your data security environment. In this virtual lab, you create a dashboard, simple query, and report that is used to examine user data you generate.
In this video, you learn about the Windows S-TAP debug log changes that were implemented in Guardium versions 10 to 11.
Guardium data security policies help flag suspicious database activity and events. In this virtual lab, you create a policy that will detect and alert on database login failures that occur multiple times over a short time period.