IBM Support

How to configure InfoSphere Guardium to ignore DB2HMON and DB2DASSTM.EXE activities

Question & Answer


Question

When enables LOG FULL DETAILS action by default settings, InfoSphere Guardium may collect too many activities from the target database servers. Some of the users may want to ignore capturing activities of DB2 administration processes such as DB2HMON or DB2DASSTM.EXE. How can we reduce or omit the unnecessary DB2 process activities from capturing by S-TAP?

Cause

When you install a policy rule to enable LOG FULL DETAILS action to any application, the S-TAP might collect too many activities, and it may consume unnecessary disk resource.

Answer

You can ignore capturing the activity of some specific processes by defining INGNORE S-TAP SESSION policy. Here is the overview scenario.

Overview:

    1. Create a group for trusted applications
    Create a group named My Trusted Applications, and add DB2HMON and DB2DASSTM.EXE to this group.

    2. Create a policy for the group
    Create a policy named Ingore My Trusted Application, and apply My Trusted Application group to Ingnore S-TAP Session action.

    3. Install the policy
    Install the Ignore My Trusted Application policy.

    [NOTE] The group name My Trusted Application and the policy name Ignore My Trusted Application can be changed as you like.
    The detail instruction is here:
    1. Create a group for trusted applications
      Create a group named My Trusted Applications, and add DB2HMON and DB2DASSTM.EXE to this group.

      1.1. Login to the Guardium web console by admin role.
      1.2 Click Monitor/Audit > Build Reports tabs, and click on Group Builder icon.
      1.3 Type My Trusted Applications at Group Description field, select SOURCE PROGRAM at Group Type Description pull down list, and then press Add button.
      1.4 Select DB2HMON at Add an existing Member to Group pull down list, and press Add button. Also add DB2DASSTM.EXE in the same way. Then check both DB2HMON and DB2DASSTM.EXE are listed in Group Members list.
      Now, the new group My Trusted Applications is ready.

    2. Create a policy for the group
      2.1 Click Monitor/Audit > Build Audit Policies tabs, and click New... button in Policy Finder.
      2.2 In the Policy Definition, type Ignore My Trusted Application in the Policy description field, and click Apply button.

      2.3 Click Edit Rules... to open a Policy Rules pane.

      2.4 From the Policy Rules pane, click Add Access Rule... button.

      2.5 From the Access Rule Definition pane, type Rule for Ignoring My Trusted Application at Description field, select (public) My Trusted Application at the and/or Group pull down list at Src App. field, and then click Add Action button.
      2.6 Select IGNORE S-TAP SESSION pull down list at the Action field in the Add New Action, and click Apply button.

      2.7 Click Save button.

      Now, a new policy rule is defined. See if the action is correctly defined.

    3. Install the policy
      Install the Ingore My Trusted Application policy.

      3.1 Click Protect > Security Policies tabs, and click on Install Policy icon.

      3.2 From the Policy Installer pane, select Ignore Trusted Application policy, which was defined in the previous step, and then select Install from the pull down list.

      [NOTE] If you have any policy installed, all the installed policies are listed sequentially. Select the appropriate position which this policy should be applied. The following figure shows an example to choose Ignore Trusted Application policy before Policy_1 and v8.
      3.3 Soon after selecting an installation action, the confirmation message "Are you sure you want to install this policy and apply it to all Inspection Engines?" will be popped up. Click OK to proceed the installation.

      Now, the policy has been installed.

      Verification

      The following report was captured after the Ignore Trusted Application rule has been installed and the DB2DASSTM.EXE process has been restarted at 18:45. You can see that DB2DASSTM.EXE is no longer reported in Full SQL By DB User report even though the process is running.



        C:\>tasklist | findstr /I DB2DASSTM.EXE
        db2dasstm.exe 452 Console 0 35,400 K

        C:\>

[{"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"--","Platform":[{"code":"PF033","label":"Windows"}],"Version":"8.0","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]

Document Information

Modified date:
16 June 2018

UID

swg21497163