Security alerts in CCMS

I want to trigger an alert when a specific role is assigned to a user.
How can I do with CCMS monitor templates.
Appreciate your help.
Thanks
Srinivas

Hi Srinivas,
I want to trigger an alert when a specific role is assigned to a user.
How can I do with CCMS monitor templates.
Please check below, you can use the MTE name "user master record"
Security Monitor (SAP Library - The Alert Monitor)
if you have Technical Monitoring, you can push the data to MAI, by following below procedures
How To create Custom CCMS Metrics In Technical Monitoring
Thanks
Jansi

Similar Messages

  • Email alerts in CCMS.

    HI,
       I have configured CCMS for triggering the alerts as  an email.
    I am receiving an email when I triggerd manually but I have configured metod as an auto reaction method but I am not receving any mails automatically. can any one help on this issue.
    will give reword point
    Thanks
    Suresh

    hi suresh,
    see this links
    https://www.sdn.sap.com/irj/sdn/advancedsearch?cat=sdn_weblog&query=ccms - 41k
    - 44k
    - 20k
    Example Configuration: Forwarding Alerts to the ALM
    Use
    This procedure shows as an example the configuration steps that you must perform to forward alerts to Alert Management. In this example, you want to assign different alert categories to two monitoring areas:
    ·        An alert category CCMS CPU is to be created in the ALM for alerts in nodes that belong to the monitoring object CPU.
    ·        An alert category CCMS DIALOG is to be created in the ALM for alerts of the MTE class R3DialogResponseTime (average response time of the dialog service).
    Since the alert category is transferred as a parameter of the method definition for the auto-reaction method CCMS_Send_Alert_to_ALM, you must therefore create two different method definitions from the template, which you can then assign to the relevant nodes.
    For a general description of this process and important prerequisites, see Forwarding Alerts to Alert Management (ALM).
    Procedure
    Proceed as follows to display CCMS alerts using ALM. CEN stands for the central monitoring system.
    Creating an RFC Connection Between the CCMS and the ALM
           1.      You require a user for the RFC connection between client 0 of the central monitoring system (CEN) and the work client of the ALM system. To provide this, start user maintenance in the work client of the ALM system by calling transaction SU01.
           2.      Create the communication user ALERT, and enter the following parameters:
    Tab Page
    Entry
    Address
    Enter any last name.
    E-Mail/ Other communication
    Specify an e-mail address. This is to be the sender’s address of the e-mails with which you are informed of inbound alerts by the ALM.
    You can also use Other Communication to specify the addresses of other types of communication (fax, SMS).
    Logon Data
    Enter any initial password, and repeat your entry.
    Roles/Profiles
    Assign the role SAP_BC_ALM_ALERT_USER to the user.
    You can also create the corresponding role. The authorization objects for sending alerts are S_OC_SEND and S_RFC.
           3.      Save your entries.
           4.      In client 0 of the central monitoring system (CEN), create an RFC connection to the work client of the ALM system. To do this, start Display and Maintain RFC Destinations by calling transaction SM59.
           5.      Choose the Create button and then enter the following parameters:
    Input Field
    Entry
    RFC Destination
    Enter any name for the RFC destination.
    Connection Type
    Enter 3 for Connection to ABAP System.
    Description
    Enter any description for the RFC destination; confirm your entries up to now by choosing Enter ().
    Technical Settings
    Specify the desired server or the desired logon group of the ALM system.
    Logon/Security
    Specify the logon data of the ALERT user created above. Ensure that you specify the client in which you created the user.
           6.      Save your entries.
           7.      Make this RFC destination known as the RFC destination of the Alert Management Systems in client 0 of CEN. To do this, start transaction SALRT1, and enter the destination created above in the input field RFC Dest.of Alert Server.
    Configuring Alert Management
    You want to forward alerts from the areas Dialog and CPU to the ALM in the context of monitoring. Since each area is overseen by different employees, you require two different alert categories in the ALM. You want to specify a fixed user as the recipient for both categories. In addition, an escalation user is to be informed after 120 minutes.
           8.      Change the alert categories, by calling transaction ALRTCATDEF in the work client of the ALM system.
           9.      Switch to change mode by choosing the Display/Change button .
       10.      You are on the Change Alert Categories screen. Since all alerts from the monitoring infrastructure have the alert classification CCMS ALERTS in the ALM, choose the classification by double-clicking it.
       11.      To create a new alert category, select the existing category CCMS TEMPLATE as a template in the table in the upper right, and choose Copy Alert Category (). Enter CCMS CPU as the name of the new category. Create the category CCMS DIALOG in the same way.
       12.      Both new alert categories are now displayed in the list of existing categories. To start the method, choose the node by double clicking it. Activate the indicator Escalation Active in the Properties group box and enter any Escalation Recipient and a Tolerance Time in Minutes.
    The report RSALERTPROC must be scheduled as a job for the relevant classifications and categories so that escalation can be performed. The Escalate option must be selected in the report for this. If the report is not executed as an escalation job, the escalation option is available for selection on the Properties tab page in the configuration transaction ALRTCATDEF, but the alert is not escalated.
    The report is also used for the reorganization and multiple sending of unconfirmed alerts. It may, therefore, be useful to schedule multiple jobs with different variants of the report RSALERTPROC, depending on their function. For example, you could schedule a job for the escalation every five minutes, and another for the reorganization every weekend.
       13.      To set fixed recipients for the selected category, choose the Fixed Recipients () button, and then choose New Entries on the screen that appears after this, Change “Fixed Alert Recipients“: Overview. Specify fixed recipients for both new categories.
    Note that if you are using the external communication methods e-mail, SMS, and fax, all recipients and the RFC user must have a valid communication method, which is maintained in SAPconnect, in user maintenance (transaction SU01).
       14.      Ensure that the Dynamic Text indicator is activated in the Properties of the alert categories, since the text for the alert is determined not in the ALM, but rather in the CCMS.
       15.      If alerts are to be confirmed using the external communication methods e-mail and SMS, you must set the sender for the alert information. To do this, choose Settings ® Configuration in the menu of the transaction ALRTCATDEF. The View: Change “Alerts Configuration”: Detail screen appears. Enter the user ALERT in the Inbound Processing group box. This means that ALERT is the sender of the alert information.
       16.      Save your entries.
       17.      In Alert Management, you can determine the times at which you want to be informed about an alert, and whether external communication methods (mail, SMS, fax) are also to be used. This is done in a BSP Application, which you can call using transaction ALRTINBOX ® Personalization or with the following URL:
    /sap/bc/bsp/sap/alertinbox
    The protocol Prot is either http or https. The Hostname is the name of the application server on which the BSP application is to be executed, including the domain and extension.
    Example:
    http://myServer.sap-ag.de:1080/sap/bc/bsp/sap/alertinbox
       18.      A screen on which you can specify the desired delivery method depending on the time appears. By default, alerts that occur are sent to the recipient, irrespective of time, in the UWL, application, or Alert Inbox and are also sent by e-mail, if this external communication method is configured. You also have the following options:
    ¡        Choose the time-independent delivery radio button and, if applicable, the additional external delivery types (Mail, SMS, Fax).
    External communication methods must be configured in SAPconnect. The communication data, such as e-mail addresses, must also be maintained in the user settings for the recipient and the RFC user in transaction SU01.
    ¡        Choose the time-dependent delivery radio button and, if applicable, the additional external delivery types (Mail, SMS, Fax). You can specify a factory calendar and the type of delivery with the corresponding time periods.
       19.      You can also specify a substitute.
       20.      Save your entries.
    Configuring SAPconnect
    If alerts are to be sent to users using the external communication methods e-mail, SMS, and fax, these must be configured in SAPconnect (transaction SCOT). The communication data, such as e-mail addresses, must also be maintained in the user settings for the recipient and the RFC user in transaction SU01.
    This configuration is performed in the work client of the ALM system.
    For detailed documentation about SAPconnect, see:
    ·        Quick Guide to SMTP Configuration
    ·        Guidelines for HTTP Configuration
    Tailoring the Auto-Reaction Method
    Since you want to assign two different alert categories to different nodes, first copy the original method CCMS_Send_Alert_to_ALM twice, so that you can then set the CATEGORY parameter of the two copies to the value CCMS CPU or CCMS DIALOG.
       21.      In the work client of CEN, start the Customizing transaction for the monitoring architecture by starting transaction RZ21.
       22.      In the Methods group box, select Method Definitions and choose Display Overview.
       23.      Select the method CCMS_Send_Alert_to_ALM and choose Copy (). Specify ZCCMS_Send_Alert_to_ALM_CPU as the name. Create a second copy with the name ZCCMS_Send_Alert_to_ALM_DIALOG in the same way.
       24.      In the list, select the new method definition ZCCMS_Send_Alert_to_ALM_CPU, and choose the Edit Data button (). Switch to change mode by choosing Display « Change ().
       25.      Switch to the Execution tab page. Ensure that the Any Server radio button is activated in the Execute Method group box for nodes that are supplied with values by the CCMS AgentsSAPCCMSR.
       26.      Switch to the Parameters tab page. Specify the parameter value CCMS CPU for the parameter CATEGORY.
       27.      Switch to the Release tab page, and release the method as an auto-reaction method. Save your entries.
       28.      Adjust the method definition ZCCMS_Send_Alert_to_ALM_DIALOG in the same way; choose the parameter value CCMS DIALOG for the CATEGORY parameter here. Save your entries.
    Assigning the Method as a Local Auto-Reaction Method
    In this example, you want to assign the created method definitions to the monitoring object CPU and the MTE class R3DialogResponseTime (see Assigning Methods to MTE Classes or Individual MTEs).
       29.      In the work client of CEN, start the Alert Monitor by calling transaction RZ20.
       30.      In the monitor list, expand the SAP CCMS Monitor Templates monitor set, and start the Entire System monitor by double-clicking it.
       31.      Expand the subtree of any application server and select the subtree Operating System ® CPU there. Choose Properties. In this way, you set properties for the monitoring object CPU, which are inherited by all monitoring attributes of this object that do not have their own method assignment.
       32.      The system displays the Monitoring: Properties and Methods screen. Select the name of the MTE Class (CPU) in the header data of the screen by double-clicking it. In this way, you change the properties of the MTE class CPU, not just the properties of the subtree of the selected server.
       33.      The Monitoring: Methods screen appears. Switch to change mode by choosing Display « Change ().
       34.      In the Auto-Reaction Method group box, choose the Method Name radio button and enter ZCCMS_Send_Alert_to_ALM_CPU in the associated field. Save your entries.
       35.      Set the method assignment for the MTE class R3DialogResponseTime, to which you assign the auto-reaction method ZCCMS_Send_Alert_to_ALM_DIALOG, in the same way. There are nodes of this MTE class in every subtree of an application server under R3Services ® Dialog ® Response Time.
    Result
    You have set up the forwarding of selected alerts (CPU, dialog response time) to Alert Management. If an alert occurs in one of the assigned nodes of the alert monitor, the specified recipients are immediately informed in the Alert Inbox (transaction ALRTINBOX) using the ALM. If escalation is activated and the alerts are not confirmed within a defined period of time, the escalation users receive the alerts.
    thanks
    sagar
    pls reward me points if usefull.

  • Can not see 5 security alert on OTN

    I can not see following alerts since 5/16/2003 from the URL
    http://otn.oracle.com/deploy/security/alerts.htm
    Could OTN please check to see what happend?
    oracle connection manager control SUID vulnerability
    oracle internet directory buffer overflow vulnerabilities
    oracle internet application server and web/portal vulnerabilities
    oracle enterprise manager backup and recovery vulnerability
    oracle SQL*net and net8 listener vulnerability

    Thanks- this was fixed.
    OTN

  • Reader X - Getting Security Alert with a data filled PDF form

    My site uses PDF forms that have their data filled in dynamically by the classic asp code on the site. Before Reader X version, they were filled and displayed without a problem. With Reader X they display the security warning: "Data from this site is blocked to avoid potential security risks....." and the Options button to trust the site. I get this even thoguh it's the same site they are on already and I'm using an SSL cert for all files and I'm also using a direct link to generate the PDF.
    I know the user can just click the options and make the problem go away but many users seem unable to read and or panic when they see the alert.
    Is there a security setting or trust setting I can add or set in my form so that I will not get this security alert??

    No, apart from creating a certified document, but the user would still have to add you as a trusted source. If a document could override this, it would be rather pointless to have it in the first place.

  • Outlook Security Alert - "the name on the security certificate is invalid or does not match the name of the site"

    Due to our company changing names, we recently moved to a new domain. All users were at first getting a certificate error when opening Outlook "the name on the security certificate is invalid or does not match the name of the site." After our network
    admin made some changes, nobody receives this error anymore except one user. The URL at the top of the security alert is the old domain, mail.olddomain.com. I checked the users Exchange Proxy Settings in Outlook, everything is showing the URL's of the new
    domain so I'm not sure where this is coming from. I'm assuming it has to be something on her local machine since she is the only one who still gets the error.
    Thanks in advance for any help.
    Exchange server 2008
    Outlook 2010

    Hi,
    Please follow all above suggestions to confirm whether the issue happens in OWA. And run Test E-mail AutoConfiguration in Outlook to check whether there is any URL settings using the old domain.
    If the issue doesn’t happen in OWA and your URL configurations are all same as others and set correctly, please create a new Outlook profile to have a try.
    Thanks,
    Winnie Liang
    TechNet Community Support

  • Exchange 2010/Outlook 2010 Security Alert (...there is a problem with the site's security certificate.)

    I've been looking to resolve this issue for a while now and was hoping someone could help me understand my options.
    We have Exchange 2010 & Outlook 2010 in our environment. I've created a SSL cert for our ActiveSync from a reputable CA and unfortunately, as you may not be surprised, we are seeing an alert each time we open Outlook that states:
    "Security Alert; Information you exchange with this site cannot be viewed or changed by others. However, there is a problem with the site's security certificate.
    The name on the security certificate is invalid or does not match the name of the site."
    Of course my internal server name does not match my external server name. So the SSL I had created for use with OWA and ActiveSync is rejected by my internal Outlook clients.
    After doing some research I believe this is related to the Autodiscover service being configured with my internal server name and not my external name. 
    I've found some info about adding New-AutodiscoverVirtualDirectory and Set-ClientAccessServer commands and then found this article that might help.  (Configure
    Outlook Anywhere to Use Multiple SSL Certificates) but nothing is specific to my configuration and I'm concerned about what will happen to my existing configuration if this fails. 
    What happens when you run Set-ClientAccessServer? Does it retain and keep the old server config in place and add a new one or does it wipe it out? Will all of my devices need to be reconfigured?
    Same with New-AutodiscoverVirtualDirectory.  Does this simply add another virtual directory or is it going to overwrite my existing config?
    Then there is the question of whether or not any of this will actually address my issue at all.
    absolutezero273c

    Sorry.
    "[PS] C:\Windows\system32>Set-ClientAccessServer -Identity MailExt -AutoDiscoverServiceInternalUri "https://MailExt
    .contoso.com/autodiscover/autodiscover.xml"
    The operation couldn't be performed because object 'MailExt' couldn't be found on 'DomainController2.contoso.local'.
        + CategoryInfo          : NotSpecified: (0:Int32) [Set-ClientAccessServer], ManagementObjectNotFoundException
        + FullyQualifiedErrorId : 4D980455,Microsoft.Exchange.Management.SystemConfigurationTasks.SetClientAccessServer"...is the error I get.
    I've created the split zones and populated the Forward Lookup Zones as follows:
    CONTOSO.COM
    MailExt(CNAME)MailInt.contoso.local
    _tcp _autodiscover(SRV)MailExt.contoso.com
    CONTOSO.LOCAL
    MailInt(A)192.168.1.10
    MailExt(CNAME)MailInt.contoso.com
    One thing I did notice is that there isn't a _tcp _autodiscover entry for MailInt in my Forward Lookup Zones.  It was recommended that I make that entry for _tcp _autodiscover(SRV)MailExt.contoso.com in another post I read somewhere.
    I believe what I am trying to do is create a new autodiscover object as is shown here:
    I see there is a Get-ClientAccessServer & Set-ClientAccessServer command but I need to add a CAS. Does the Set-ClientAccessServer add or simply modify?
    Or would that require the New-AutodiscoverVirtualDirectory command? I read
    this page that discussed creating new virtual directories but that seemed a little risky without knowing all the ins and outs of how this service functions and to what degree this would affect the existing configuration.
    I was able to use the Set-ClientAccessServer command and change the actual internal autodiscoverUri to https://MailExt.contoso.com/autodiscover/autodiscover.xml but the name still says MailInt and I continue to get the SSL cert warnings because it is looking
    at MailInt.contoso.local.
    absolutezero273c

  • Safari is frozen by a fake security alert, how do I resolve?

    Safari is frozen by a fake security alert.  How do I resolve on my MacBook Air using IOS 8.1.2 
    Error Message:
    "Safari - Alert
    Your Browser has been Locked because of Possible Infections found in your Machine. Due to which your Browser Might be Corrupted because of Suspicious Activity found.
    Major Security Issue
    For Immediate Assistance through our Apple Certified Technicians CALL:
    +1-855-337-8048 (Toll Free)"
    Thank you!

    The following comes from user stevejobsfan0123.
    Occasionally, a browser window may pop up with a scam message. Common pop-ups include a message saying the government has seized your computer and you must pay to have it released (often called "Moneypak"), or a phony message saying that your computer has been infected, and you need to call a tech support number (sometimes claiming to be Apple) to get it resolved. First, understand that these pop-ups are not caused by a virus, and your computer has not been affected. This "hijack" is limited to your web browser. Also understand that these messages are scams, so do not pay any money, call the listed number, or provide any personal information. Most of these scammers, if you actually call the number, will ask you to install software giving them remote control over your computer. Do not do this either. This article will outline the solution to dismiss the pop-up.
    Quit Safari
    Though you will probably have to quit Safari, you can first try closing the tab by pressing Command + W. Sometimes, however, these pop-ups will not go away by attempting to close the tab, nor by clicking "OK" or "Cancel." Furthermore, several menus in the menu bar may become disabled and show in gray, including the option to quit Safari. You will likely have to force quit Safari. To do this, press Command + option + esc, select Safari, and press Force Quit.
    Relaunch Safari
    If you relaunch Safari, the page will reopen. To prevent this from happening, hold down the 'Shift' key while opening Safari. This will prevent windows from the last time Safari was running from reopening.
    This will not work in all cases. The shift key must be held at the right time, and in some cases, even if done correctly, the window reappears. In these circumstances, after force quitting Safari, turn off Wi-Fi or disconnect Ethernet, depending on how you connect to the Internet. Then relaunch Safari normally. It will try to reload the malicious webpage, but without a connection, it won't be able to. Navigate away from that page by entering a different URL, i.e. www.apple.com, and trying to load it. Now you can reconnect to the Internet, and the page you entered will appear rather than the malicious one.
    None of this Worked!
    If pressing Command + W does not work, and force quitting Safari and restarting the application with the Shift key held down does not get rid of the pop-up you will have to reset Safari. Normally, this can be done by launching Safari, then in the menu bar, going to Safari > Reset Safari. However, most pop-ups of this variety will block access to many of the drop-down menus in the menu bar. You will need to locate a file on the computer and move it to the trash. Make sure you quit Safari first (force quit if necessary).
    To start, open Finder. The press Command + Shift + G, or in the menu bar, select Go > Go to Folder. Type the following file path:
    ~/Library/Preferences
    Look for a file named com.apple.Safari.plist, and drag it to the trash. Then restart your Mac. After it reboots, try launching Safari. A new preferences file should have been automatically created, so no more action is required on your part, and the pop-up should now be gone.
    The Source of the Scam
    In addition to the FBI scam, there are a few webpages with bogus technical support pop-ups or "security alerts," claiming you have a virus as described earlier. These webpages include but are not limited to:
    macsecurityissue.com
    helpmetek.com
    applesecurityalert.com
    websternal.net
    newsalert.report-o.com
    mac-system-alerts.com
    geek-techies.com
    system-connect.com
    instants-pc-fix.com
    flasherrordetector.websiteviruscleaner.com
    safaricontact-help.com
    system-logs.info
    customer-help.in

  • Oracle Security Alert #48

    Does Oracle Security Alert #48 (bug 2642117) - Buffer Overflow in DIRECTORY parameter of Oracle9i Database Server effect Oracle 8i v 8.1.6.0 database?
    I know the Oracle Alert states it effects Oracle 8i v 8.1.7, but I'm not sure if that would mean it effects older releases like v 8.1.6.0.
    Thanks

    Some clips:
    "Products Affected
    Oracle9i Database Release 2v, Version 9.2.x
    Oracle9i Database Release 1v, Version 9.0.x
    Oracle8iDatabase,Version 8.1.x
    Oracle8 Database, Version 8.0.x"
    "Currently there are no plans to release a patch for 8.0.5.x, 8.1.5.x, 8.1.6.x."

  • Air application throws security alert every time 'HTTPS' request made to server.

    Have a look at the following screenshot.
    On click of next button, application internally sends an https request. Appliction throws Security Alert dialog. The text can also be seen clearly.
    Strange thing about this alert dialog is that, it appears every time when application send a request in given session.
    If I run the same thing in flex (i.e. in browser), it asks for SSL handshake and that is also only once. So why it is happening here in case of Air.
    Regards,
    Prithvee Zankat.

    Back up all data. From the Safari menu bar, select
    Safari ▹ Reset Safari...
    Check these boxes:
    Clear history
    Remove all website data
    Uncheck all other boxes. Press return. Test.
    If Safari crashes immediately on launch and you can't do as above, hold down the shift key and launch it by clicking its icon in the Dock, then try. Failing that, ask for guidance.

  • Wrong PDF on Security Alerts Page

    On the Security Alerts page (http://otn.oracle.com/deploy/security/alerts.htm) there is a link next to "Buffer Overflow Vulnerability in Oracle9iAS Reports Server Alert #35, 05 June 2002" which links to a document called http://otn.oracle.com/deploy/security/pdf/reports6i_alert.pdf
    This document is actually a copy of the document for a different vulnerability "Buffer Overflow Vulnerability in Oracle Net (Oracle9i Database Server) Alert #34, 05 June 2002"
    Please fix it so we can read about the 9iAS Reports Server Alert!
    Thanks,
    -Otto

    Hi Otto,
    This should now be fixed on OTN but please let us know if you encounter any difficulties.
    Regards,
    OTN Team

  • Norton security alert high memory use for a specific file shared by millions

    current version microsoft xp. computer frequently goes into a scan type mode followed by a norton security alert high memory usage. causes major slowdown in system use

    current version microsoft xp. computer frequently goes into a scan type mode followed by a norton security alert high memory usage. causes major slowdown in system use

  • Java error - Oracle Security Alert for CVE-2010-4476

    I have come across this security alert described at http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.htm l
    In summary - Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number.
    This vulnerability affects:
    Java SE
    JDK and JRE 6 Update 23 and earlier for Windows, Solaris, and Linux
    JDK 5.0 Update 27 and earlier for Solaris 9
    SDK 1.4.2_29 and earlier for Solaris 8
    Java for Business
    JDK and JRE 6 Update 23 and earlier for Windows, Solaris and Linux
    JDK and JRE 5.0 Update 27 and earlier for Windows, Solaris and Linux
    SDK and JRE 1.4.2_29 and earlier for Windows, Solaris and Linux
    Java for MacOS X 10.6 update 3 updates Java to SE 6 to version 1.6.0_22.
    Is anyone aware of new Java update for Mac that will fix this problem? If one doesn't exist, does anyone know when a new update will be available?
    Thanks.

    Hi Hussein,
    have you applied this? Please can you update?
    Our environment: 11.5.10.2 (9.2.0.7)running on HP-UX PARISC. We are using Jinitiator. We are not yet migrated to J2SE Plugin.
    So, since the sercurity patch is for JRE, is that still required for our environment?
    Please advise?
    Edited by: oraDBA2 on Feb 13, 2011 9:12 PM

  • TNS Listener Poison attack : Oracle Security Alert for CVE-2012-1675

    Hi,
    I'm looking to implement the following oracle document about COST but not sure what we need to do for Standby Environment ,
    Can you guys please advise.
    Oracle Using Class of Secure Transport (COST) to Restrict Instance Registration [ID 1453883.1]
    Oracle Security Alert for CVE-2012-1675
    Thanks

    user097815 wrote:
    with regrads to the below thread which mostly talks about Oracle Security Alert for CVE-2012-1675 "TNS Listener Poison Attack"....i just wanted to find out if this effect DB that are externally or internally....meaning 95% of our DB are in network(internally) behind our firewall....and rest of the 5% are outside our firewall facing the world wide web....so does this apply to both of just one ?The attack is on the Listener itself - so if you want to prevent this attack, you need to secure that Listener, irrespective of its location.
    IMO, mandatory if you expose your Listener to an unsecured or public network (e.g. internet).
    As for Listeners running on your internal network - if this attack is used, securing your Listeners mean very little IMO. Because your internal network already needs to be compromised in order for the attack to occur. Which means you have far more serious problems then someone attacking your Listeners.

  • Oracle Security Alert for CVE-2012-1675

    Hi,
    I want to know more about recent release "Oracle Security Alert" : http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html
    Document available in https://support.oracle.com/CSP/main/article?cmd=show&type=NOT&id=1453883.1
    Fix is about Class of Secure Transport (COST). I need to know about elaborate steps to find out whether this change is need to apply to my databases or not.
    About my DBs : 10.2.4 , AIX, Nondefault Listener, Shared env , non RAC, local_listener is null & running in pfile.
    Thx,
    Gowin.

    Hello;
    Apply it. Very clean. Simple. No outage on Non-RAC. Biggest Impact is listener stop and start. Took about 3 minutes per server.
    Tested today and had zero issues. ( Assumed you understood a CONNECT was part of the test ). Zero issues.
    Had a thread on this here a few days ago :
    Oracle TNS Poison vulnerability
    See Oracle Support Note 1453883.1 for additional information.
    Best Regards
    mseberg
    With all due respect this isn't very hard. Make a decision.
    Edited by: mseberg on May 2, 2012 7:13 AM

  • Fwding alerts from CCMS to ALM

    Hi all,
    I am working on fwding alerts from CCMS to ALM.
    We have solman in place fully configured. I have followed guides from service.sap.com/alert page.I can see alerts generated from the alert test report RSALERTTEST in the mail box(say Outlook) but not in the alert inbox of RWB
    Can any one please help me on this.
    reg

    Did you configure ALM to run on your XI machine or on SolMan?
    If it runs on Sol Man you won't be able to see them on XI RWB.
    To find your alerts lokk at:
    http://<host>:<port>/sap/bc/bsp/sap/alrtinbox
    where host:port is the host where ALM runs. Note that the BSP service must be active in the trx. sicf.

Maybe you are looking for