For security auditing, CA Access Control keeps audit records for intercepted events according to the audit rules defined in the database and the enforcement mode it operates in. The records in the audit log accumulate according to these audit rules.
Full auditing provides audit records for all intercepted events of any of the following:
Note: Intercepted login events are not cached; they always follow the auditing process for interception events.
The decision whether to log an event depends on the CA Access Control interception mode.
| Copyright © 2012 CA. All rights reserved. |
|