Deployment & Administration
This category includes courses that help to deploy and administer Guardium.
Deployment & Administration Courses:
Overview of the most commonly used timestamps in Guardium reports.
This video demonstrates how to capture a SLON file for diagnosis on Guardium version 10.0.
This course demonstrates how to download and install the Guardium S-TAP for IBM i.
This video demonstrates how to configure and activate ATAP to collect encrypted traffic on Redhat Linux 6.3.
This Open Mic addresses the Guardium File Activity Monitor (FAM), and common issues users face during configuration.
Originally presented 25 May 2017
This video quickly demonstrates how to capture and save a slon file for IBM Security Guardium. You may want to create a slon file to upload to technical support for reproduction.
This video demonstrates when and how to use the various support clean DAM_data commands on a Guardium appliance. Using this command can cause data loss and should not be used unless absolutely necessary.
This course contains a step by step guide for installing a Guardium GUI certificate signed by an internal organization certificate authority.
Correlation alerts in Guardium are query based, as opposed to real-time policy alerts. There are various considerations for configuration of correlation alerts. There are also some overhead cost to be considered. This Open Mic is a discussion of correlation alerts in IBM Security Guardium, including an example of setting up a Repeating Inactive S-Tap alert.
This video comprehensively examines the design of both standard and advanced S-TAP verification processes, including common reasons for failure and how to troubleshoot when the process fails.
This course demonstrates the hands-on lab available in the course Detect database login failures with Guardium. The demonstration covers creating a policy that will detect and alert on database login failures that occur multiple times over a short time period,
This Open Mic presented by David Plummer of Guardium Tech Support provides an overview to Guardium load balancing, including:
- Prerequisites
- How it works
- grdapi commands
- Activity report
- Other related information and general overview
In this IBM Security Guardium walkthrough, you learn about the data protection journey including Discovery, Classification, Vulnerability Assessment, monitoring, and protection.
This Open Mic discusses how to troubleshoot situations where the S-TAP shows 'no traffic', including various steps you can take on your system to understand the reason for the issue or at least the scope of the issue, and what to do if all else fails.
Originally presented 18 July, 2017
This video demonstration guides you step-by-step through how to install and configure IBM Security Guardium. This video uses the Arabic language.
Remote Syslog Shipping is a process to transport Guardium syslog to remote Security Information and Event Management (SIEM) systems. This Open Mic addresses how to configure remote syslog shipping in Guardium and basic troubleshooting of common issues.
This video demonstration guides you step-by-step through installing IBM Security Guardium agents (GIM and S-TAP).
The correct approach for upgrading Guardium depends on multiple factors, which include the version you are upgrading from, the hardware of your system, and any special partitioning requirements you might have. A common way to upgrade Guardium to the latest version is the upgrade patch method. Use an upgrade patch to upgrade all systems in a managed environment. The upgrade patch preserves all data and configurations with the exception of UI customizations due to a new UI architecture.
In this course, you learn how to plan a Guardium 11 upgrade, how to install the upgrade patch, and how to troubleshoot common installation failures.
Franklin Almonte
In this video, you learn about the Windows S-TAP debug log changes that were implemented in Guardium versions 10 to 11.
Updating your Guardium environment is an important part of maintaining your site, and can provide new features and enhancements as well as fixing bugs. In this video series, you learn how to download a Guardium patch from IBM Fix Central and upload patch files to your Guardium environment.
In this video, you will learn how IBM Guardium supports monitoring capabilities for Database as a Service (DBaaS) and containerized databases, offering a consistent approach to data protection for on-premise and cloud environments.
In this course, you learn how to monitor your Guardium environment with system alerts. You will see how to set up the Inactive S-TAPs Since alert.
In Guardium, when a database user name in a report is blank, the cause should be investigated by the Guardium administrator. In this course, you will learn various causes and solutions for missing DB USER information, illustrated with specific examples.
In this video, you will learn about some major performance improvements and stability improvements in the Guardium Windows S-TAP V10 series.
In Guardium, you may have a situation where the database user name in a report is blank, or there is a question mark, or may be a string of random characters. In this course, you will learn how to import the new missing DB user dashboard and use it to troubleshoot and take actions to resolve the problem.
In this video, you learn how to enable IP-to-Hostname alias mapping.
In this video, you learn how to configure the Guardium archive.
Regular upkeep of your data security environment is required to keep the system aligned with the ever-changing IT environment, including new data servers, new uses of sensitive data, new users, and new applications. Organizations that use IBM Guardium for data security and compliance can take advantage of a rich set of APIs to automate processes and maintain the system in a more efficient manner.
In this course, you learn how Guardium APIs can speed deployment and automate repetitive tasks such as creating a datasource, updating users, and modifying groups.
The lab environment reflects Guardium 10.5.
Franklin Almonte
IBM Guardium 10.1.4 introduces the capability for all managed units, agents, and clients to communicate by using Transport Layer Security (TLS) Protocol version 1.2. This capability enhances security in your data center.
In this series of three videos, you learn how to enable TLS1.2 in your IBM Guardium environment.
Duration: 15 minutes
Guardium 10.x includes functionality you can use to monitor file activity. In this course, you view the discovery and classification capabilities of the file activity monitoring (FAM) tools and learn how to set up a blocking rule to prevent someone from deleting files in a directory and logs the attempt. You also learn how to create and install policies to monitor files.
IBM Guardium 10.1.4 has new functionality to protect Oracle 11 databases that reside on Amazon AWS. In this video series, you will learn how to discover cloud databases. Then you will see how to classify and audit sensitive objects.
S-TAP and K-TAP are Guardium components that can intercept database communications between clients and the database server. This course includes the following materials:
- Guardium: Linux S-TAP installation guidance
- Troubleshooting the Guardium S-TAP Verification Process
- How can a SLON capture be created on an InfoSphere Guardium Appliance
This course covers:
- How to capture must gathers from Guardium
- Collecting a guard_diag for a Guardium S-TAP installed on UNIX
- How to Upload Data to a Support Ticket (PMR)
- Using Guardium cli commands iptraf and tcpdump to troubleshoot network issues
Guardium processes large amounts of information about database access. In this video, you will learn to take steps to prevent your Guardium internal database filling up, troubleshoot when it is filling up and take action to reduce the space when needed.
This video demonstrates the process of
deploying the Guardium external S-TAP on Amazon Web Services (AWS) Elastic Kubernetes Service (EKS) in order to monitor AWS cloud databases
with Guardium.
In this video, Leila Johannesen demonstrates a new feature in Guardium
11.2 that allows customers to compare a list of databases with the
databases that are known to Guardium.
In this video, you will see how to check available disk space in Guardium. This is
important information to have to prevent database full issues.
In this video, you learn how to check the Guardium purge period. This is important information in helping to prevent database full issues.
In this video, you see how to check that the latest Guardium GPU patch
is installed. This is an important task and can be particularly helpful
in preventing database full issues.
In this video, you will see how to check the Aggregation/Archive log for errors. This could be particularly helpful in preventing database full issues.
In this video, you will see how to set Guardium notifications to alert you when your database reaches a specified threshold. This is particularly useful in preventing database full issues.
In this video, you will see how to check Guardium database usage and how much data is in the top tables. This is critical information to prevent database full issues.
In this video, you see how to check the Guardium policy for actions that can fill the database. This is an important step in preventing database full issues.
In this video, you will see how to use Guardium reports to show how data is spread across tables and across time. This is important information to help prevent database full issues.
In this video, you will see how to check and turn auto_stop_services on in Guardium. This is important to help prevent database full issues.
This course covers five enhancements for Guardium Deployment Health available in the version 11.3 release.