This section summarizes the various methods how CA Data Protection maps events to users.
This section contains the following topics:
Mapping Application Events to Users
Mapping IM Conversations to Users
Mapping Email Addresses to Users
Copyright © 2015 CA Technologies.
All rights reserved.
|
|