The sample and best practice policies are provided as a basis for your own security policy. To deploy a policy, you should customize it for your environment.
To customize a policy for your environment:
Look for and identify warnings or errors that occurred during the deployment process and modify the policy to account for these.
The policies use roles for authorization. You need to assign users in your organization to these roles.
Important! When you undeploy a policy, do not delete the users or groups you created. This may affect the normal behavior of the ACL lists and accessor associations in other policies that use those same users and groups.
This utility identifies conflicts between CA ControlMinder and other installed programs and resolves them by creating a bypass for that program.
Copyright © 2013 CA Technologies.
All rights reserved.
|
|