Previous Topic: Security DefinitionsNext Topic: Users


Systems

Security administrators and auditors must know at a glance the origin of their data. The Systems category in the Investigator provides an inventory of all your security systems that are managed through CA Chorus for Security and Compliance Management.

Example: Identify the data loaded in the product

You want to identify the origin of the data that is loaded into CA Chorus as part of the CIA load process. You know that it is from CA ACF2, but you want to identify the specific systems. This information helps you see the breadth of the data available in the Investigator.

  1. Add the Investigator module to your dashboard, and click Start New Investigation.
  2. Select Security from the drop-down list.
  3. Select Definitions, Systems from the folder list.
  4. Click View Filter (magnifying glass icon).
  5. Filter the data by completing the following steps:
    1. Select Security Application from the Search System drop-down list from the center pane.
    2. Select contains from the second drop-down list, and type ACF.
  6. Click Search.

    The list of CA ACF2 systems that are loaded in CA Chorus appears.