13.07.2015 Views

Installing CA Enterprise Log Manager - CA Technologies

Installing CA Enterprise Log Manager - CA Technologies

Installing CA Enterprise Log Manager - CA Technologies

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

About This GuideSectionConfiguring Basic Users andAccessConfiguring ServicesConfiguring EventCollectionCreating FederationsWorking with the EventRefinement LibraryConsiderations for <strong>CA</strong> AuditUsersConsiderations for <strong>CA</strong>Access Control Users<strong>CA</strong> IT PAM ConsiderationsDisaster Recovery<strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong> <strong>Manager</strong>and VirtualizationDescriptionProvides instructions for identifying a user storeand creating the initial administrative user forthe configuration of other user and accessdetails.Provides instructions for configuring servicesincluding global and local filters, the event logstore, report server, and subscription options.Provides concepts and instructions for using orconfiguring the event refinement librarycomponents including the mapping and parsingfiles, and the <strong>CA</strong> adapters.Describes different types of federations andprovides instructions for creating federatedrelationships between <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong><strong>Manager</strong> servers and viewing a federationgraph.Provides high-level information about workingwith message parsing and data mapping files.Describes the interactions you can implementbetween <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong> <strong>Manager</strong> and <strong>CA</strong>Audit, how to configure iRecorders and policies,and how to import data from your <strong>CA</strong> AuditCollector database.Describes how to integrate with <strong>CA</strong> AccessControl, how to modify <strong>CA</strong> Audit policies to sendevents to <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong> <strong>Manager</strong>, how toconfigure a <strong>CA</strong> Access Control iRecorder to sendevents to <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong> <strong>Manager</strong>, and howto import <strong>CA</strong> Access Control events form a <strong>CA</strong>Audit Collector database,Describes the process of installing <strong>CA</strong> IT PAMsuch that the EEM component on themanagement <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong> <strong>Manager</strong>handles authentication.Describes backup, restoration, and replacementprocedures for ensuring recovery of your logmanagement solution in case of disaster.Describes the process to use to create andconfigure a virtual machine to contain a <strong>CA</strong><strong>Enterprise</strong> <strong>Log</strong> <strong>Manager</strong> server.14 Implementation Guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!