May 11, 2020

This page provides information about product lifecycle dates for IBM product versions and releases. (IBM Security SiteProtector System , IBM Security. To connect to SiteProtector for the first time, you must download, install, and start the SiteProtector Console on your computer. The SiteProtector System includes several components.

Author: Dom Mezit
Country: Iran
Language: English (Spanish)
Genre: Automotive
Published (Last): 8 June 2008
Pages: 272
PDF File Size: 10.92 Mb
ePub File Size: 13.77 Mb
ISBN: 726-2-46678-919-5
Downloads: 75958
Price: Free* [*Free Regsitration Required]
Uploader: Moogukus

The “Manage Login and Sessions” permission now controls the following System Administration settings: Single sign-on and two-factor authentication You can now configure SiteProtector to use your Windows credentials to log you in to SiteProtector.

Usage instructions are included with the Certificate Management tool. Dual Authorization and quarantine rules Bim authorization is now available for creating, promoting, enabling, and disabling quarantine rules.

Installing and starting the SiteProtector Console

There is a new “Manage Email Settings” permission that controls whether you can specify an email server or configure email notifications. Notification categories were changed from severity levels to clearer descriptions: The Event Collector manages events from sensors and vulnerability data from scanners in real time.

The Agent Manager does the following things: The content that they contained is integrated into the online help. Download and install the Certificate Management tool.


Installing and starting the SiteProtector Console

Due to the way event data is summarized, there can be a difference between summary event data and detailed event data. The SecureSync component provides a structured method for implementing a failover and disaster recovery solution for the SiteProtector System. Archive integrity is now enforced for archived events and for the Event Archiver. Also, any communication session that fails due to a revoked certificate is slteprotector logged.

Health check alert for the Agent Manager when certificates are close to expiring Health check alert for the X-Press Update Server when certificates are close to expiring Notifications about certificate expiration health checks can be set to repeat periodically.

To access the tool: An Agent Manager is installed automatically with the Express and the Recommended installation options. The SiteProtector report options include graphical summary and compliance information that managers need to assess the state of their security. New health checks The following health checks are new: If you run the Console without administrator rights, and you attempt an action that requires those rights, you must authenticate before you perform the action.

The existing, manually configured, two-factor authentication takes precedence over the new Windows authentication feature.

Sensor controller Manages the command and control activities of agents, such as the command to start or to stop collecting events.

You monitor events, schedule scans, generate reports, and configure agents from the Console. The Update Server eliminates the need to download updates for similar products more than once. Agent Manager This topic describes the Agent Manager. You can now explicitly check for revoked certificates.


The Siteprotechor is the main user interface for the SiteProtector System. The SiteProtector System is now supported on: Certificate changes and new Certificate Management tool.

Informational, Health warning, and Health failure. Inm SecurityFusion Module uses advanced analysis techniques and escalates high-impact attacks to help you focus on the most important attack activity. If your time zone has a minute offset, you can now specify that offset to improve the consistency of the reported summary and detailed event data.

IBM support – Software lifecycle – IBM Security SiteProtector System (and 3 others)

By default, the “Manage Email Settings” permission is assigned to the Administrator and Analyst user groups. If you use two-factor authentication but want to ib, Windows authentication instead, archive and remove the existing authentication. Dual authorization is now available for creating, promoting, enabling, and disabling quarantine rules.