You can search for untrusted records manually in the audit log, or you can set special notification instructions to be informed when certain programs become untrusted. The special notification is especially helpful so that users do not have to contact you to use a program that has become untrusted; instead, you can check the file as soon as you receive a notification that it has become untrusted.
Note: To set up special audit notifications, see the Endpoint Administration Guide.
Copyright © 2013 CA Technologies.
All rights reserved.
|
|