NetIQ Summary Project Plan

Excel steps Task Names below SIEM Architecture ReviewApprove SOWBegin engagement with NetIQRemediation tasksDefine monitoring criteriaSplunk hardware requirementsUpgrade NAM environmentUpgrade NAM 4.3 – 4.4Install QR agent on NAM environmentTest log elements to QRDetermine if NetIQ is neededAcquire VM ShellsImplement NetIQ analyticsConsumer authenticationColleague authenticationTest log delivery and parsing with / SplunkIdentify log sources and data elementsColleague authenticationConsole… Continue reading NetIQ Summary Project Plan

Sample SSAE-16 Change Checklist

Sample Considerations Change Risk:  Low Risk Only impact one customer group If the change fails, only a few users from a single customer site will be affected and recovery will be quick and low effort Can be implemented at any time Requires approval for completeness of change instructions from colleague or supervisor Change Risk:  Medium… Continue reading Sample SSAE-16 Change Checklist

Email EOP Verification Considerations

A DMARC policy allows a sender’s domain to indicate that their emails are protected by SPF and/or DKIM, and tells a receiver what to do if neither of those authentication methods passes – such as to reject the message or quarantine it. DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged… Continue reading Email EOP Verification Considerations