It is recommended that you limit the number of terminals protected to those that are truly critical, such as dial-in ports, production scheduling ports, or end-user ports for sensitive applications. This may make your terminal maintenance more manageable.
Remember, CA Top Secret architecture is based on the user, and it is the user who is responsible and accountable for their actions no matter which terminal is used to access your corporate resources.
|
Copyright © 2009 CA.
All rights reserved.
|
|