This section walks you through the recommendations for:
Important! Trim only the tables that capture transaction details, such as audit log information. Do not trim tables that capture user information, which is necessary to perform risk evaluation.
|
Copyright © 2013 CA.
All rights reserved.
|
|