When CA Data Protection detects unauthorized behavior or activity that it needs to control, the first question it asks is ‘Whose policy do I apply?’ To answer this question, CA Data Protection must map the user to a CA Data Protection user account. The mechanism for doing this depends on the type of activity.
This section contains the following topics:
Internal and External Email Addresses
Copyright © 2015 CA Technologies.
All rights reserved.
|
|