The Investigator displays the following searchable policy administration event records to help ensure the integrity of your implemented policy. For CA ACF2, you configure rules to set policy, and for CA Top Secret, you configure permissions to set policy.
Includes a record for each time a policy is modified.
Event Code: 41
Includes a record for each time a user tries but is denied when modifying policy.
Event Code: 42
Note: For a comprehensive list of security events and the event triggers, see the security events chapter in your external security manager documentation.
Example: Identify violations to vital data sources
To protect your employees and comply with various government regulations, you monitor activity for vital data sources, such as the personnel file and payroll file. To do so, you review the violations in the Investigator and compare the count with historical data. Additionally, you drill further into some records to investigate questionable activity.
Your Policy Administration Violation events appear for the last week.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|