Protectors

Documentation for Protegrity Protectors.

Configuration Parameters for Protector

Update the mandatory and optional parameters to configure the protectors.

Installing Resilient Package (RP) Agent on Linux or Unix and Windows

Set up the RP Agent to handle package downloads from the ESA.

Installing Resilient Package (RP) Proxy on Linux or Unix and Windows

Set up the RP Proxy to cache Resilient Packages. This component helps reduce the processing load on the ESA when a lot of protectors want to export packages.

Configuration Parameters for RPP

The configuration parameters for RPP, such as log level, host and port, and service configuration.

Installing Log Forwarder on Linux and Windows

The Log Forwarder is the log processing tool that collects the logs from the protectors and forwards them to the Audit Store.

Policy Memory Utilization in Resilient Protectors

Advantages of Resilient Deployment architecture over the PEP Server based architecture.

Verification of Signed Protector Build

Verify the integrity of Protegrity generated protectors before installing the protectors to ensure security.

Protection Method Reference

A general overview of protection methods supported by Protegrity products. It guides you through Protegrity protection methods, providing a comparison of all the protection methods.

Application Protector

Learn about the different Application Protectors.

Big Data Protector

Learn about the Big Data Protector.

Data Warehouse Protectors

Learn about the Data Warehouse Protectors.

Last modified : January 31, 2025