Previous Topic: Agentless Log Collection

Next Topic: Policy Violation Alerts

Compliance Reports

All predefined reports are associated with one or more report tags. Use report tags to identify reports that can help you assess compliance with specific standards.

Out-of-the-box PCI Reports

Procedures

More Information

Example: Run PCI Reports

 

Compliance Reporting

Out-of-the-box SOX Reports

Procedures

More Information

Using Tags

View a Report

Scheduling a Report

Compliance Reporting

Example: Create a Report from Existing Queries

Business-Relevant Grouping with UI-Defined Method

Procedures

More Information

Preparing to Use Reports With Keyed Lists

Add Keys for Custom Reports or Queries

Update a Keyed List Manually

Customize Keyed Values for Administrators

View a Report Using a Keyed List

Business-Relevant Grouping with Imported List Method

Procedures

More Information

Update a Keyed List with Export/Import

Example: Update a Keyed List with a CSV File

 

Create Keyed Values for Critical_Assets

Example: Create an Alert for Business Critical Sources

Business-Relevant Grouping with IT PAM Dynamic Keyed List Method

Procedures

More Information

Update Keyed List with a Dynamic Values Process

Edit a Query

Example: Create a Report from Existing Queries

How to Schedule a Report Job

Enabling Dynamic Values Import

Create a CA IT PAM Process to Generate a Values List

Configure CA IT PAM Integration for Dynamic Values

Create Keyed Values for Critical_Assets

Connection to External User Store

Procedures

More Information

How to Manage Referenced User Accounts

Configuring the User Store

Role-based Access to Reports

Procedures

More Information

Create an Access Filter

For a walk through of a scenario to restrict access to PCI Reports for members of a custom PCI-Analyst role, see Restricting Access for a Role: PCI-Analyst Scenario

For a walk through of a scenario to restrict access to reports from one region's Windows Domain Controllers for the individual acting as the Windows administrator, see Restricting Data Access for a User: Win-Admin Scenario

For the process of creating custom roles and related access policies, see Configuring Custom User Roles and Access Policies

 

 


Copyright © 2010 CA. All rights reserved. Email CA about this topic