Previous Topic: Effects of FCCCompatMode

Next Topic: Configure Policies for Impersonation

Impersonation Event Configuration

Impersonation events are rule events that must be configured and included in policies in order to allow a privileged user to impersonate another user.

You must configure at least one of each of the following impersonation events in order to enable impersonation:

More information:

Configure a Rule for Impersonation Event Actions


Copyright © 2010 CA. All rights reserved. Email CA about this topic