Previous Topic: Modify an Existing CA Audit Policy to Send Events to CA Enterprise Log Manager

Next Topic: How to Configure a CA Access Control iRecorder to Send Events to CA Enterprise Log Manager

Check and Activate the Changed Policy

After you change an existing policy to add a rule action, check (compile) it and then activate it.

To check and activate a CA Access Control policy

  1. Select the Rules tab in the lower right pane, and then select a rule to check.

    This picture shows the Rules tab with the Suspicious Events policy selected for checking and activation.

  2. Click Check Policies to check the changed rule with the new actions to ensure that it compiles properly.

    Make any needed modifications to the rule and ensure that it compiles correctly before you activate it.

  3. Click Activate to distribute the checked policy that contains the new rule actions you added.
  4. Repeat this procedure for each rule and policy with collected events you want to send to CA Enterprise Log Manager.