You can also produce ad hoc reports that address special situations. For example, if you suspect that one of your users has suspicious access patterns, you might audit the user and produce a one-time report of the activity.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|