![]() Analyze and act upon errors or exceptions.Use Guardium self-monitoring reports and alerts.Define and use monitoring features such as queries, reports, audit processes, and alerts.Differentiate the effects of policy rules and associated actions.Perform a Vulnerability Assessment test.Demonstrate detailed understanding of agent configuration and inspection engine parameters.ĭata monitoring, policy rules and reporting (15%).Install software tap (S-TAP) from command line.Install Guardium Installation Manager (GIM) and upgrade agents and modules with GIM.Configure the appliance for interfacing with standard systems (mail, SNMP, LDAP, SIEM). ![]()
0 Comments
Leave a Reply. |