icon_CloudMgmt icon_DollarSign icon_Globe icon_ITAuto icon_ITOps icon_ITSMgmt icon_Mainframe icon_MyIT icon_Ribbon icon_Star icon_User icon_Users icon_VideoPlay icon_Workload icon_caution icon_close s-chevronLeft s-chevronRight s-chevronThinRight s-chevronThinRight s-chevronThinLeft s-chevronThinLeft s-trophy s-chevronDown

BMC AMI Security Policy Manager 2.x: Fundamentals Using (WBT)

The BMC AMI Security Policy Manager product is a security policy manager engine that gathers real-time data and reports events that do not match your company's security and compliance policies.

BMC AMI Security Policy Manager runs in the environment it examines to minimize risks of data or information loss. Once scans have been completed, detailed reporting is provided with recommended configuration changes to mitigate threats and potentially exploitable settings.

In this course, the learners will be able to understand the product interface in detail. Learn about various customizations and rexx functions through web-based content, quizzes, and videos.

Major release:

BMC AMI Security 2.x

Good for:

Users

Course Delivery:

Web Based Training (WBT) | 1 時間

Course Modules

  • Introduction to BMC AMI Security Policy Manager
    • Describe the functionality of BMC AMI Security Policy Manager (SPM)
    • Define the key features of SPM
    • Explain the roles and permissions required to run SPM effectively
    • List down the software requirements for SPM
    • Define Resident Security Server (RSS)
    • Demonstrate logging in and navigating across BMC AMI Security Policy Manager
  • Compliance Testing
    • Define Compliance Testing
    • Describe the AutoStart parameter
    • Explain security policy rule configuration
    • Define rule definition and rule members
    • Explain the supported rules for DISA STIGs
  • Rexx Functions
    • Describe Rexx functions
    • Explain RSSINIT, RSSRESP, RSSREXEC, and RSSEMAIL functions
    • Explain how to run Rexx queries locally
    • Describe the function of LOCALREXX rule code
  • Reports
    • Define the different types of reports for RACF, TSS, and ACF2
    • Explain in detail about the reports and information on:
      • Data sets
      • Sensitive Commands
      • Resources
      • System Settings
      • Users
      • Compliance
      • RACF, TSS, and ACF2