Confirm Deletion
Are you sure you want to delete the saved search?
See the Informatica Dynamic Data Masking Release Guide to learn about new features and enhancements for current and recent releases, and to learn about behavior changes between versions.
Read the Dynamic Data Masking Release Notes to learn about the Emergency Bug Fixes that are included in the version.
Use the Dynamic Data Masking User Guide to learn how to protect sensitive information in a production environment. Learn how to create connection rules, security rules, and how to work with the rule set simulator.
Use the Informatica Dynamic Data Masking Administrator Guide to learn how to perform administrator tasks in Dynamic Data Masking. Understand how to configure security settings, create, and manage connections, and configure advanced Dynamic Data Masking settings.
Follow the instructions in the Informatica Dynamic Data Masking Installation and Upgrade Guide to install or upgrade Dynamic Data Masking. The guide also includes information on minimum requirements, prerequisite tasks, and post install and upgrade tasks.
This article describes how to create a Dynamic Data Masking security rule that captures the SET QUOTED_IDENTIFIER value to prevent a database error when you mask queries in a Sybase or Microsoft SQL Server database.
In Dynamic Data Masking™ version 9.8.4, the default masking functionality is enhanced in a way that changes its behavior. This H2L provides examples of different types of SQL statements to show the differences between the old and new default masking functionalities.
Use the Security Rule Set Simulator to test security rules and regular expressions for Microsoft Azure SQL Database.
This article describes how to configure IP address binding in Dynamic Data Masking.
This article describes how to create masking and blocking security rules in Dynamic Data Masking and test the rules with the Security Rule Set Simulator.
This article describes how to create a security rule set to limit the rows that a database request returns and to mask the returned data.
You can use a generic JDBC connection with Dynamic Data Masking. This article describes how you can automate the configuration of a generic JDBC client to work with Dynamic Data Masking. It includes the steps required to configure SQLWorkbench and includes three deployment tools that you can use. You can use the information as a …
This article describes how to use JMX to view Dynamic Data Masking Server event logs in JConsole.
You can configure Dynamic Data Masking to send user activity event logs in a Common Event Format (CEF) format to Secure@Source using a custom logger.
MicroStrategy is a business intelligence tool that includes performance management, dashboards, analysis, and reporting capabilities. This article describes how to capture MicroStrategy user context through Dynamic Data Masking.
You can use Nagios Core to monitor Informatica® Dynamic Data Masking servers on Windows and Linux machines. This article provides instructions for installing and configuring Nagios Core for monitoring Dynamic Data Masking.
Kerberos is an effective authentication protocol built on symmetric-key cryptography. This article describes how to enable Kerberos authentication for Hive and Impala databases in Dynamic Data Masking.
This article describes how to configure a Windows 7 or Windows Server 2008 client machine for Dynamic Data Masking when the client connects to the database with an ODBC connection.
This article describes an example architecture, development, and deployment of Dynamic Data Masking Multi-Server architecture.
This article describes how to create a custom logger and appender to log database access that occurs outside of normal business hours.