Previous Topic: Configuring Security for the Event Traffic Controller

Next Topic: User Rights


Accessing a Remote Host

Events that monitor remote hosts display a Host Access Security button. This button launches the Remote Host Access Security dialog, which allows you to specify a security context for the Windows and CA NSM hosts that are defined to the Event Traffic Controller.

Both the Event Manager log and the Windows event logs are treated as remote resources and are protected by Windows security; therefore, each user must have a security context to access these remote resources.

Note: Even if you have not entered a security context in the Remote Host Access Security dialog, one may already be set up for a variety of reasons. One example is that you are running CA Automation Point under a certain user ID and password and the same user ID and password also exist on a remote machine.