This section contains the following topics:
Data Integrity Checking on Raw Events
External ODBC Database Connection
CA Enterprise Log Manager has been renamed CA User Activity Reporting Module. All features and functionality introduced in CA Enterprise Log Manager versions up to 12.5.01 are still included.
You can check raw event data for tampering. CA User Activity Reporting Module uses digital signatures to validate the event data. If the database is corrupted or if its signature is missing or corrupted, the data integrity check considers the data tampered.
You can schedule integrity checks to occur at set times and on selected CA User Activity Reporting Module servers, or on demand. This functionality is an extension of the existing data integrity checking feature that only applied to archived event data.
You can directly query an external ODBC database. This feature allows you to target CA User Activity Reporting Module reports and queries to ODBC databases in addition to the internal event log store.
You must configure a connection to each ODBC database you want to target.
You can deploy event collection for virtual machines using the Virtual Automation API for CA User Activity Reporting Module. You can use the API to trigger a preset collection profile, which contains all the information necessary to provision event collection.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|