ibm tivoli security compliance manager: tivoli risk manager

22
Tivoli ® Security Compliance Manager Tivoli Risk Manager Adapter Guide Version 5.1

Upload: nguyenminh

Post on 01-Jan-2017

230 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Tivoli® Security

Compliance

Manager

Tivoli

Risk

Manager

Adapter

Guide

Version

5.1

���

Page 2: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager
Page 3: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Tivoli® Security

Compliance

Manager

Tivoli

Risk

Manager

Adapter

Guide

Version

5.1

���

Page 4: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Note

Before

using

this

information

and

the

product

it

supports,

read

the

information

in

“Notices,”

on

page

7.

First

Edition

(July

2004)

This

edition

applies

to

version

5,

release

1,

modification

0

of

IBM

Tivoli

Security

Compliance

Manager

(product

number

5724-F82)

and

to

all

subsequent

releases

and

modifications

until

otherwise

indicated

in

new

editions.

©

Copyright

International

Business

Machines

Corporation

2004.

All

rights

reserved.

US

Government

Users

Restricted

Rights

Use,

duplication

or

disclosure

restricted

by

GSA

ADP

Schedule

Contract

with

IBM

Corp.

Page 5: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Contents

Preface

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. v

Who

should

read

this

book

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. v

What

this

book

contains

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. v

Publications

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. v

IBM

Tivoli

Security

Compliance

Manager

library

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. v

Related

publications

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. vi

Accessing

publications

online

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. vi

Accessibility

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. vii

Contacting

software

support

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. vii

Conventions

used

in

this

book

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. vii

Typeface

conventions

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. vii

Operating

system

differences

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. vii

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager

.

.

.

.

.

.

.

.

. 1

Adapter

overview

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. 1

Adapter

distribution

package

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. 1

Installation

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. 2

Software

requirements

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. 2

Before

you

install

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. 2

Installation

steps

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. 2

Checking

the

installation

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. 4

Uninstalling

the

adapter

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. 4

Appendix.

Notices

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. 7

Trademarks

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

.

. 9

©

Copyright

IBM

Corp.

2004

iii

Page 6: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

iv

IBM

Tivoli

Security

Compliance

Manager:

Tivoli

Risk

Manager

Adapter

Guide

Page 7: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Preface

The

IBM

Tivoli

Security

Compliance

Manager

Tivoli

Risk

Manager

Adapter

Guide

explains

how

to

route

compliance

violation

information

detected

by

IBM®

Tivoli®

Security

Compliance

Manager

to

IBM

Tivoli

Risk

Manager.

Tivoli

Risk

Manager

can

be

used

to

monitor

your

systems

or

to

route

violation

information

to

IBM

Tivoli

Data

Warehouse.

Tivoli

Security

Compliance

Manager

is

a

data

collection

service

that

gathers

and

stores

a

wide

variety

of

information

from

multiple

participating

systems.

Information

types

can

include

any

data

stored

on

a

system,

such

as

operating

system

versions,

software

patch

levels,

and

security-related

data.

System

and

security

administrators

can

use

the

Tivoli

Security

Compliance

Manager

service

to

monitor

specific

data

checkpoints

on

any

given

machine

(or

group

of

machines).

Who

should

read

this

book

The

target

audience

for

this

insert-book-type-here

guide

includes:

v

System

administrators

v

Application

specialists

v

Security

analysts

v

IT

planners

v

Auditors

What

this

book

contains

This

document

contains

the

following

chapters:

v

“Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager,”

on

page

1

This

chapter

provides

information

on

installing,

configuring,

and

uninstalling

the

Tivoli

Risk

Manager

adapter

for

Tivoli

Security

Compliance

Manager.

v

“Notices,”

on

page

7

This

appendix

contains

the

legal

notices

and

copyright

information.

Publications

Read

the

descriptions

of

the

IBM

Tivoli

Security

Compliance

Manager

library,

the

prerequisite

publications,

and

the

related

publications

to

determine

which

publications

you

might

find

helpful.

After

you

determine

the

publications

you

need,

refer

to

the

instructions

for

accessing

publications

online.

IBM

Tivoli

Security

Compliance

Manager

library

The

publications

in

the

IBM

Tivoli

Security

Compliance

Manager

library

are:

v

IBM

Tivoli

Security

Compliance

Manager

Installation

Guide:

All

Components

(GC32-1592-00)

Explains

how

to

install

and

configure

Tivoli

Security

Compliance

Manager

software.

v

IBM

Tivoli

Security

Compliance

Manager

Installation

Guide:

Client

Component

(GC32-1593-00)

©

Copyright

IBM

Corp.

2004

v

Page 8: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Explains

how

to

install

and

configure

the

Tivoli

Security

Compliance

Manager

client

component

software.

v

IBM

Tivoli

Security

Compliance

Manager

Administration

Guide

(SC32-1594-00)

Explains

how

to

manage

and

configure

Tivoli

Security

Compliance

Manager

services

using

the

administration

console.

v

IBM

Tivoli

Security

Compliance

Manager

Collector

Development

Guide

(SC32-1595-00)

Explains

how

to

design

and

implement

custom

Tivoli

Security

Compliance

Manager

collectors.

v

IBM

Tivoli

Security

Compliance

Manager

Warehouse

Enablement

Pack,

Version

1.1

Implementation

Guide

for

Tivoli

Data

Warehouse,

Version

1.2

(SC32-1596-00)

Explains

how

to

integrate

Tivoli

Security

Compliance

Manager

with

Tivoli

Data

Warehouse.

v

IBM

Tivoli

Security

Compliance

Manager

Release

Notes

(GI11-4695-00)

Provides

late-breaking

information,

such

as

software

limitations,

workarounds,

and

documentation

updates.

Related

publications

This

section

lists

publications

related

to

the

Tivoli

Security

Compliance

Manager

library.

The

Tivoli

Software

Library

provides

a

variety

of

Tivoli

publications

such

as

white

papers,

datasheets,

demonstrations,

redbooks,

and

announcement

letters.

The

Tivoli

Software

Library

is

available

on

the

Web

at:

http://www.ibm.com/software/tivoli/library/

The

Tivoli

Software

Glossary

includes

definitions

for

many

of

the

technical

terms

related

to

Tivoli

software.

The

Tivoli

Software

Glossary

is

available,

in

English

only,

from

the

Glossary

link

on

the

left

side

of

the

Tivoli

Software

Library

Web

page

http://www.ibm.com/software/tivoli/library/

IBM

DB2

Universal

Database

IBM

DB2

Universal

Database™

is

required

when

using

Tivoli

Security

Compliance

Manager.

Additional

information

about

DB2®

can

be

found

at:

http://www.ibm.com/software/data/db2/

Accessing

publications

online

The

publications

for

this

product

are

available

online

in

Portable

Document

Format

(PDF)

or

Hypertext

Markup

Language

(HTML)

format,

or

both

in

the

Tivoli

software

library:

http://www.ibm.com/software/tivoli/library

To

locate

product

publications

in

the

library,

click

the

Product

manuals

link

on

the

left

side

of

the

library

page.

Then,

locate

and

click

the

name

of

the

product

on

the

Tivoli

software

information

center

page.

Product

publications

include

release

notes,

installation

guides,

user’s

guides,

administrator’s

guides,

and

developer’s

references.

Note:

To

ensure

proper

printing

of

PDF

publications,

select

the

Fit

to

page

check

box

in

the

Adobe

Acrobat

Print

window

(which

is

available

when

you

click

File

Print).

vi

IBM

Tivoli

Security

Compliance

Manager:

Tivoli

Risk

Manager

Adapter

Guide

Page 9: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Accessibility

Accessibility

features

help

a

user

who

has

a

physical

disability,

such

as

restricted

mobility

or

limited

vision,

to

use

software

products

successfully.

With

this

product,

you

can

use

assistive

technologies

to

hear

and

navigate

the

interface.

You

also

can

use

the

keyboard

instead

of

the

mouse

to

operate

all

features

of

the

graphical

user

interface.

Contacting

software

support

Before

contacting

IBM

Tivoli

Software

Support

with

a

problem,

refer

to

the

IBM

Tivoli

Software

Support

site

by

clicking

the

Tivoli

support

link

at

the

following

Web

site:

http://www.ibm.com/software/support/

If

you

need

additional

help,

contact

software

support

by

using

the

methods

described

in

the

IBM

Software

Support

Guide

at

the

following

Web

site:

http://techsupport.services.ibm.com/guides/handbook.html

The

guide

provides

the

following

information:

v

Registration

and

eligibility

requirements

for

receiving

support

v

Telephone

numbers,

depending

on

the

country

in

which

you

are

located

v

A

list

of

information

you

should

gather

before

contacting

customer

support

Conventions

used

in

this

book

This

reference

uses

several

conventions

for

special

terms

and

actions

and

for

operating

system-dependent

commands

and

paths.

Typeface

conventions

The

following

typeface

conventions

are

used

in

this

reference:

Bold

Lowercase

commands

or

mixed

case

commands

that

are

difficult

to

distinguish

from

surrounding

text,

keywords,

parameters,

options,

names

of

Java™

classes,

and

objects

are

in

bold.

Italic

Variables,

titles

of

publications,

and

special

words

or

phrases

that

are

emphasized

are

in

italic.

Monospace

Code

examples,

command

lines,

screen

output,

file

and

directory

names

that

are

difficult

to

distinguish

from

surrounding

text,

system

messages,

text

that

the

user

must

type,

and

values

for

arguments

or

command

options

are

in

monospace.

Operating

system

differences

This

book

uses

the

UNIX®

convention

for

specifying

environment

variables

and

for

directory

notation.

When

using

the

Windows®

command

line,

replace

$variable

with

%variable%

for

environment

variables

and

replace

each

forward

slash

(/)

with

a

backslash

(\)

in

directory

paths.

If

you

are

using

the

bash

shell

on

a

Windows

system,

you

can

use

the

UNIX

conventions.

Preface

vii

Page 10: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

viii

IBM

Tivoli

Security

Compliance

Manager:

Tivoli

Risk

Manager

Adapter

Guide

Page 11: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager

This

chapter

describes

the

Tivoli

Risk

Manager

adapter

for

IBM

Tivoli

Security

Compliance

Manager,

including

installation

and

configuration

instructions.

Adapter

overview

The

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager

uses

the

JDBC

type

provided

by

the

Tivoli

Risk

Manager

event

monitor

to

monitor

a

Tivoli

Security

Compliance

Manager

database

for

policy

snapshot

violations.

To

provide

a

simple

table

for

this

purpose,

a

new

database

table

view

called

scm_rma.vio_alert

is

created.

This

table

view

is

based

on

tables

in

the

jac_sys

schema.

This

view

provides

a

record

of

unsuppressed

violations

for

policy

snapshots.

The

adapter

is

comprised

of

three

parts:

v

The

database

changes

needed

to

create

the

new

scm_rma.vio_alert

view

on

the

database

server

v

The

configuration

file

changes

and

additions

on

the

Tivoli

Risk

Manager

servers

where

alerts

are

received

and

correlated

v

The

configuration

file

changes

and

additions

on

the

systems

where

the

adapter

runs

Adapter

distribution

package

The

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager

is

distributed

as

an

archive

file

in

both

zip

and

tar

format.

The

archive

file

contains

the

files

listed

in

Table

1.

Table

1.

Files

provided

in

the

adapter

archive

file

File

name

Description

client/itscmrma.zip

Contains

the

following

two

files:

eventmonitor.properties

Customized

properties

file

used

by

the

Tivoli

Risk

Manager

Event

Monitor

Configuration

Wizard

to

configure

an

instance

of

the

event

manager

to

monitor

the

Tivoli

Security

Compliance

Manager

database

table

scm_rma.vio_alert.

itscm.xml

The

Tivoli

Security

Compliance

Manager

event

definition

file.

server/itscm.baroc

The

baroc

file

that

defines

the

ITSCM_PolViolation

event

class

to

the

Tivoli

Risk

Manager

server.

server/itscm_stanzas_categories.xml

The

file

that

defines

the

SECPOLVIOLATION

category.

The

stanza

contained

in

this

file

is

added

to

the

categories.xml

file

during

installation

and

configuration.

sql/scmrma.sql

The

file

that

contains

the

SQL

statements

needed

to

modify

the

database

used

by

Tivoli

Security

Compliance

Manager

to

create

the

scm_rma.vio_alert

view.

©

Copyright

IBM

Corp.

2004

1

Page 12: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Installation

This

section

describes

the

steps

required

to

install,

configure,

check,

and

uninstall

the

adapter.

Software

requirements

The

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager

is

supported

on

the

same

platforms

as

the

Tivoli

Risk

Manager

client.

A

Tivoli

Risk

Manager

Version

4.2

server

or

distributed

correlation

server

must

be

available.

Before

you

install

The

following

software

must

be

installed

on

the

system

where

the

adapter

is

to

be

installed:

v

The

Tivoli

Risk

Manager

Version

4.2

client

v

A

suitable

JDBC

driver

for

the

IBM

DB2

database

product

being

used

by

Tivoli

Security

Compliance

Manager

v

The

Tivoli

Risk

Manager

Event

Monitor

Configuration

Wizard

The

wizard

can

be

downloaded

from

the

Tivoli

Risk

Manager

Adapter

Web

site.

Installation

steps

Installation

of

the

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager

requires:

1.

“Modifying

the

Tivoli

Security

Compliance

Manager

database”

2.

“Configuring

the

Tivoli

Risk

Manager

server”

3.

“Configuring

the

Tivoli

Risk

Manager

client”

on

page

3

Modifying

the

Tivoli

Security

Compliance

Manager

database

On

the

system

where

the

DB2

database

server

used

by

Tivoli

Security

Compliance

Manager

is

installed,

or

from

a

system

that

has

access

to

the

DB2

database

server,

perform

the

following

steps:

1.

Copy

the

sql/scmrma.sql

file

from

the

adapter

archive

file

to

the

system.

2.

Log

in

using

the

user

ID

and

password

associated

with

the

DB2

instance

that

owns

the

Tivoli

Security

Compliance

Manager

tables.

3.

Run

the

following

command

as

the

DB2

user:

db2

-tvf

scmrma.sql

Running

the

SQL

script

creates

the

scm_rma.vio_alert

database

view

used

by

the

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager.

Note:

If

changes

are

made

to

the

definitions

of

any

of

the

jac_sys

tables

used

by

the

scm_rma.vio_alert

view,

the

view

must

be

dropped

and

then

created

again.

Configuring

the

Tivoli

Risk

Manager

server

On

each

Tivoli

Risk

Manager

server

that

is

to

receive

alerts

from

the

adapter:

1.

On

UNIX

systems,

source

the

Tivoli

Risk

Manager

environment

file:

.

/etc/Tivoli/rma_eif_env.sh

2.

Copy

the

server/itscm.baroc

file

from

the

adapter

archive

file

to

the

$RMHOME/RISKMGR/etc/baroc

directory

on

the

Tivoli

Risk

Manager

server

system.

3.

Make

a

backup

copy

of

the

$RMHOME/RISKMGR/etc/categories.xml

file.

2

IBM

Tivoli

Security

Compliance

Manager:

Tivoli

Risk

Manager

Adapter

Guide

Page 13: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

4.

Using

a

text

editor,

insert

the

lines

contained

in

the

server/itscm_stanzas_categories.xml

file

from

the

adapter

archive

file

into

the

$RMHOME/RISKMGR/etc/categories.xml

file.

The

lines

that

are

added

must

be

within

the

<categories>

stanza

before

the

</categories>

tag.

5.

Make

a

backup

copy

of

the

$RMHOME/RISKMGR/etc/riskmgr_baroc.lst

file.

6.

Using

a

text

editor,

add

the

following

line

to

the

$RMHOME/RISKMGR/etc/riskmgr_baroc.lst

file:

itscm.baroc

7.

If

you

are

configuring

the

Tivoli

Risk

Manager

event

server

to

receive

Tivoli

Security

Compliance

Manager

alerts,

then

configure

the

Tivoli

Enterprise

Console®

rule

base

using

the

instructions

provided

in

the

Tivoli

Risk

Manager

documentation.

8.

Restart

the

Tivoli

Risk

Manager

agent.

Configuring

the

Tivoli

Risk

Manager

client

Before

installing

the

adapter,

perform

the

following

steps.

1.

On

UNIX

systems,

source

the

Tivoli

Risk

Manager

environment

file:

.

/etc/Tivoli/rma_eif_env.sh

2.

Run

the

following

command

to

store

an

obfuscated

version

of

your

database

password

in

a

file:

$RMHOME/RISKMGR/bin/wrmstashpw

$RMHOME/RISKMGR/etc/itscmDB.pwd

your_password

This

prevents

the

password

from

being

stored

in

the

Tivoli

Risk

Manager

configuration

files

in

clear

text.

If

you

omit

this

step,

you

must

specify

the

password

later

when

using

the

Tivoli

Risk

Manager

Event

Monitor

Configuration

Wizard.

The

password

that

is

entered

in

the

wizard

is

stored

in

clear

text

in

the

configuration

files.

To

install

the

adapter:

1.

Stop

the

Tivoli

Risk

Manager

agent.

2.

Run

the

Tivoli

Risk

Manager

Event

Monitor

Configuration

Wizard.

Windows

launch.bat

UNIX

and

Linux™

launch.sh

3.

On

the

Select

Manual

Configuration

or

Import

from

Archive

panel,

select

Typical

Configuration.

4.

On

the

Typical

Configuration

Import

from

Archive

panel,

enter

the

location

of

the

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager

ZIP

file

in

the

Archive

File

field

and

click

Next.

This

is

the

client/itscmrma.zip

file

from

the

adapter

archive

file.

5.

Enter

the

appropriate

data

for

the

JDBC

configuration

on

the

JDBC

Table

panel.

This

includes

modifying

the

JDBC

Driver

and

JDBC

URL

fields

as

needed,

replacing

HOSTNAME

with

the

fully

qualified

name

of

the

database

server

used

by

Tivoli

Security

Compliance

Manager.

Specify

the

DB2

instance

ID

in

the

JDBC

Username

field.

Specify

the

name

of

the

password

file

(itscmDB.pwd

in

the

example

previously)

in

the

JDBC

Password

File

field.

Click

Next.

Note:

Specifying

an

actual

password

on

this

panel

results

in

the

password

being

stored

in

the

configuration

files

in

clear

text.

6.

After

the

wizard

installs

the

adapter

files

and

updates

the

Tivoli

Risk

Manager

agent

configuration,

click

Finish.

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager

3

Page 14: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

7.

Modify

the

$RMHOME/RISKMGR/etc/rmclasspath.conf

file

to

add

the

library

files

needed

by

your

JDBC

driver.

The

JDBC

Driver

provided

by

DB2

requires

the

following

files:

DB2

Version

8.1

DB2INSTDIR/java/db2java.zip

DB2INSTDIR/java/db2jcc.jar

DB2

Version

7.2

DB2INSTDIR/java12/db2java.zip

8.

Verify

that

the

$RMHOME/RISKMGR/etc/itscmjdbc.xml

file

that

was

created

by

the

Tivoli

Risk

Manager

Event

Monitor

Configuration

Wizard

has

the

correct

host

name,

user

ID,

and

password

file

for

your

DB2

database

server,

and

that

the

URL

connection

string

is

correct

for

the

JDBC

driver

that

is

being

used.

Correct

any

problems.

9.

Restart

the

Tivoli

Risk

Manager

agent.

Checking

the

installation

To

verify

that

the

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager

has

been

properly

installed

and

configured:

1.

Check

that

the

Tivoli

Risk

Manager

agent

is

running.

2.

Create

a

snapshot

with

one

or

more

violations.

3.

Verify

that

the

correct

events

were

registered

on

the

Tivoli

Risk

Manager

server.

Uninstalling

the

adapter

To

uninstall

the

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager:

1.

Stop

the

Tivoli

Risk

Manager

agent.

2.

Open

a

command

prompt

and

change

to

the

following

directory:

RM_INST_DIR/RISKMGR/etc

3.

Replace

the

rmagent.xml

file

with

the

previously

saved

version.

If

multiple

changes

have

been

made

to

the

file

since

the

adapter

was

originally

added,

you

can

simply

remove

the

connector

and

source

stanzas

associated

with

this

adapter.

Those

stanzas

are

similar

to

the

following:

<connector>

<from

name="itscm"/>

<to

name="summarization"/>

</connector>

<source

name="itscm"

class="com.tivoli.RiskManager.Agent.Transports.Receivers.rmaMonitorReceiver">

<set

key="RMA_conf"

value="/opt/RISKMGR/etc/itscm.conf"/>

</source>

4.

Remove

the

other

files

used

by

the

adapter.

UNIX

and

Linux

rm

itscm*

Windows

del

itscm*

This

command

removes

the

following

files:

4

IBM

Tivoli

Security

Compliance

Manager:

Tivoli

Risk

Manager

Adapter

Guide

Page 15: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

itscm.conf

itscm.pos

itscm.xml

itscmjdbc.xml

itscmDB.pwd

5.

Optionally,

if

no

other

Tivoli

Risk

Manager

adapters

are

using

JDBC,

remove

the

JDBC

library

file

path

names

from

the

$RMHOME/RISKMGR/rmclasspath.conf

file.

If

you

are

uncertain,

do

not

modify

the

file.

6.

Restart

the

Tivoli

Risk

Manager

agent.

Tivoli

Risk

Manager

Adapter

for

Tivoli

Security

Compliance

Manager

5

Page 16: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

6

IBM

Tivoli

Security

Compliance

Manager:

Tivoli

Risk

Manager

Adapter

Guide

Page 17: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Appendix.

Notices

This

information

was

developed

for

products

and

services

offered

in

the

U.S.A.

IBM

may

not

offer

the

products,

services,

or

features

discussed

in

this

document

in

other

countries.

Consult

your

local

IBM

representative

for

information

on

the

products

and

services

currently

available

in

your

area.

Any

reference

to

an

IBM

product,

program,

or

service

is

not

intended

to

state

or

imply

that

only

that

IBM

product,

program,

or

service

may

be

used.

Any

functionally

equivalent

product,

program,

or

service

that

does

not

infringe

any

IBM

intellectual

property

right

may

be

used

instead.

However,

it

is

the

user’s

responsibility

to

evaluate

and

verify

the

operation

of

any

non-IBM

product,

program,

or

service.

IBM

may

have

patents

or

pending

patent

applications

covering

subject

matter

described

in

this

document.

The

furnishing

of

this

document

does

not

give

you

any

license

to

these

patents.

You

can

send

license

inquiries,

in

writing,

to:

IBM

Director

of

Licensing

IBM

Corporation

500

Columbus

Avenue

Thornwood,

NY

10594

U.S.A

For

license

inquiries

regarding

double-byte

(DBCS)

information,

contact

the

IBM

Intellectual

Property

Department

in

your

country

or

send

inquiries,

in

writing,

to:

IBM

World

Trade

Asia

Corporation

Licensing

2-31

Roppongi

3-chome,

Minato-ku

Tokyo

106,

Japan

The

following

paragraph

does

not

apply

to

the

United

Kingdom

or

any

other

country

where

such

provisions

are

inconsistent

with

local

law:

INTERNATIONAL

BUSINESS

MACHINES

CORPORATION

PROVIDES

THIS

PUBLICATION

“AS

IS”

WITHOUT

WARRANTY

OF

ANY

KIND,

EITHER

EXPRESS

OR

IMPLIED,

INCLUDING,

BUT

NOT

LIMITED

TO,

THE

IMPLIED

WARRANTIES

OF

NON-INFRINGEMENT,

MERCHANTABILITY

OR

FITNESS

FOR

A

PARTICULAR

PURPOSE.

Some

states

do

not

allow

disclaimer

of

express

or

implied

warranties

in

certain

transactions,

therefore,

this

statement

may

not

apply

to

you.

This

information

could

include

technical

inaccuracies

or

typographical

errors.

Changes

are

periodically

made

to

the

information

herein;

these

changes

will

be

incorporated

in

new

editions

of

the

publication.

IBM

may

make

improvements

and/or

changes

in

the

product(s)

and/or

the

program(s)

described

in

this

publication

at

any

time

without

notice.

Any

references

in

this

information

to

non-IBM

Web

sites

are

provided

for

convenience

only

and

do

not

in

any

manner

serve

as

an

endorsement

of

those

Web

sites.

The

materials

at

those

Web

sites

are

not

part

of

the

materials

for

this

IBM

product

and

use

of

those

Web

sites

is

at

your

own

risk.

IBM

may

use

or

distribute

any

of

the

information

you

supply

in

any

way

it

believes

appropriate

without

incurring

any

obligation

to

you.

©

Copyright

IBM

Corp.

2004

7

Page 18: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Licensees

of

this

program

who

wish

to

have

information

about

it

for

the

purpose

of

enabling:

(i)

the

exchange

of

information

between

independently

created

programs

and

other

programs

(including

this

one)

and

(ii)

the

mutual

use

of

the

information

which

has

been

exchanged,

should

contact:

IBM

Corporation

2Z4A/101

11400

Burnet

Road

Austin,

TX

78758

USA

Such

information

may

be

available,

subject

to

appropriate

terms

and

conditions,

including

in

some

cases,

payment

of

a

fee.

The

licensed

program

described

in

this

information

and

all

licensed

material

available

for

it

are

provided

by

IBM

under

terms

of

the

IBM

Customer

Agreement,

IBM

International

Program

License

Agreement,

or

any

equivalent

agreement

between

us.

Customers

are

responsible

for

ensuring

their

own

compliance

with

various

laws

such

as

the

Graham-Leach-Bliley

Act,

the

Sarbanes-Oxley

Act,

and

the

Health

Insurance

Portability

and

Accountability

Act.

It

is

the

customer’s

sole

responsibility

to

obtain

advice

of

competent

legal

counsel

as

to

the

identification

and

interpretation

of

any

relevant

laws

that

may

affect

the

customer’s

business

and

any

actions

the

customer

may

need

to

take

to

comply

with

such

laws.

IBM

does

not

provide

legal,

accounting

or

auditing

advice,

or

represent

or

warrant

that

its

products

or

services

will

ensure

that

customer

is

in

compliance

with

any

law.

Any

performance

data

contained

herein

was

determined

in

a

controlled

environment.

Therefore,

the

results

obtained

in

other

operating

environments

may

vary

significantly.

Some

measurements

may

have

been

made

on

development-level

systems

and

there

is

no

guarantee

that

these

measurements

will

be

the

same

on

generally

available

systems.

Furthermore,

some

measurement

may

have

been

estimated

through

extrapolation.

Actual

results

may

vary.

Users

of

this

document

should

verify

the

applicable

data

for

their

specific

environment.

Information

concerning

non-IBM

products

was

obtained

from

the

suppliers

of

those

products,

their

published

announcements

or

other

publicly

available

sources.

IBM

has

not

tested

those

products

and

cannot

confirm

the

accuracy

of

performance,

compatibility

or

any

other

claims

related

to

non-IBM

products.

Questions

on

the

capabilities

of

non-IBM

products

should

be

addressed

to

the

suppliers

of

those

products.

All

statements

regarding

IBM’s

future

direction

or

intent

are

subject

to

change

or

withdrawal

without

notice,

and

represent

goals

and

objectives

only.

This

information

contains

examples

of

data

and

reports

used

in

daily

business

operations.

To

illustrate

them

as

completely

as

possible,

the

examples

include

the

names

of

individuals,

companies,

brands,

and

products.

All

of

these

names

are

fictitious

and

any

similarity

to

the

names

and

addresses

used

by

an

actual

business

enterprise

is

entirely

coincidental.

If

you

are

viewing

this

information

softcopy,

the

photographs

and

color

illustrations

may

not

appear.

8

IBM

Tivoli

Security

Compliance

Manager:

Tivoli

Risk

Manager

Adapter

Guide

Page 19: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

Trademarks

The

following

terms

are

trademarks

or

registered

trademarks

of

International

Business

Machines

Corporation

in

the

United

States,

other

countries,

or

both:

DB2

DB2

Universal

Database

IBM

IBM

logo

Tivoli

Tivoli

logo

Tivoli

Enterprise

Console

Microsoft®,

Windows,

Windows

NT®,

and

the

Windows

logo

are

trademarks

of

Microsoft

Corporation

in

the

United

States,

other

countries,

or

both.

Java

and

all

Java-based

trademarks

and

logos

are

trademarks

or

registered

trademarks

of

Sun

Microsystems,

Inc.

in

the

United

States

and

other

countries.

Linux

is

a

trademark

of

Linus

Torvalds

in

the

United

States,

other

countries,

or

both.

UNIX

is

a

registered

trademark

of

The

Open

Group

in

the

United

States

and

other

countries.

Other

company,

product,

and

service

names

may

be

trademarks

or

service

marks

of

others.

Appendix.

Notices

9

Page 20: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

10

IBM

Tivoli

Security

Compliance

Manager:

Tivoli

Risk

Manager

Adapter

Guide

Page 21: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager
Page 22: IBM Tivoli Security Compliance Manager: Tivoli Risk Manager

����

Printed

in

USA