13.07.2015 Views

Installing CA Enterprise Log Manager - CA Technologies

Installing CA Enterprise Log Manager - CA Technologies

Installing CA Enterprise Log Manager - CA Technologies

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

EiamAdmin user nameEiamAdmin is the default superuser name assigned to the installer of the <strong>CA</strong><strong>Enterprise</strong> <strong>Log</strong> <strong>Manager</strong> servers. While installing the first <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong><strong>Manager</strong> software, the installer creates a password for this superuser account,unless a remote <strong>CA</strong> EEM server already exists. In that case, the installer mustenter the existing password. After installing the soft appliance, the installeropens a browser from a workstation, enters the URL for <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong><strong>Manager</strong> and logs in as EiamAdmin with the associated password. This first usersets the user store, creates password policies, and creates the first user accountwith an Administrator role. Optionally, the EiamAdmin user can perform anyoperation controlled by the <strong>CA</strong> EEM.entitlement managementEntitlement management is the means of controlling what users are allowed todo once they are authenticated and logged on to the <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong> <strong>Manager</strong>interface. This is achieved with access policies associated with roles assigned tousers. Roles, or application user groups, and access policies can be predefined oruser-defined. Entitlement management is handled by the <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong><strong>Manager</strong> internal user store.EPHI-related reportsThe EPHI-related reports, are reports that focus on HIPAA security, where EPHIstands for Electronic Protected Health Information. These reports can help youdemonstrate that all individually identifiable health information related topatients this is created, maintained, or transmitted electronically is protected.event aggregationevent categoriesevent collectionevent filteringEvent aggregation is the process by which similar log entries are consolidatedinto a single entry containing a count of the number of occurrences of the event.Summarization rules define how events are aggregated.Event categories are the tags used by the <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong> <strong>Manager</strong> to classifyevents by their function before inserting them into the event store.Event collection is the process of reading the raw event string from an eventsource and sending it to the configured <strong>CA</strong> <strong>Enterprise</strong> <strong>Log</strong> <strong>Manager</strong>. Eventcollection is followed by event refinement.Event filtering is the process of dropping events based on CEG filters.event forwarding rulesEvent forwarding rules specify that selected events are to be forwarded tothird-party products, such as those that correlate events, after being saved inthe event log store.Glossary 257

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!