Protectors

Documentation for Protegrity Protectors.

Configuration Parameters for Protector

Update the mandatory and optional parameters to configure the protectors.

Installing Resilient Package (RP) Agent on Linux or Unix and Windows

Set up the RP Agent to handle package downloads from the ESA.

Installing Resilient Package (RP) Proxy on Linux or Unix and Windows

Set up the RP Proxy to cache Resilient Packages. This component helps reduce the processing load on the ESA when a lot of protectors want to export packages.

Configuration Parameters for RPP outside of the ESA

List details about the configuration parameters for RPP outside of the ESA.

Installing Log Forwarder on Linux and Windows

The Log Forwarder is the log processing tool that collects the logs from the protectors and forwards them to the Audit Store.

Memory Utilization in Resilient Protectors

Memory consumption by resilient protectors during policy enforcement.

Verification of Signed Protector Build

Verify the integrity of Protegrity generated protectors before installing the protectors to ensure security.

Protection Method Reference

A general overview of protection methods supported by Protegrity products. It guides you through Protegrity protection methods, providing a comparison of all the protection methods.

Application Protector

Learn about the different Application Protectors.

Big Data Protector

Learn about the Big Data Protector.

Data Warehouse Protectors

Learn about the Data Warehouse Protectors.

Last modified : January 31, 2025