RSA Archer Application Design Best Practices

Document created by Elena Komarova Employee on Jan 6, 2017Last modified by Connor Mccarthy on Aug 9, 2018
Version 9Show Document
  • View in full screen mode

Access Training

 

 

In order to register for a class, you need to first create an EMC account

If you need further assistance, contact us

 

Summary

This on-demand learning course offers the learner instruction on best practices to consider when developing RSA Archer applications.

 

Overview

The RSA Archer Platform offers incredible flexibility in terms of what can be built and configured.  However, savvy administrators know that there are often ways to turn something good into something great.  This course contains best practice suggestions to consider when configuring applications and the associated data displays within  RSA Archer.

 

Audience

All

 

Delivery Type

On-Demand Learning

 

Duration

40 minutes

 

Prerequisite Knowledge / Skills

Students should have completed the following courses prior to taking this training:

RSA Archer Administrator I
RSA Archer Administrator II

RSA Archer Platform Fundamentals for Business Users

 

Course Objectives

Upon successful completion of this course, participants should be able to:

  • Identify ways to create a clean Archer application design, including field settings, layout, and dashboard considerations
  • Explain best practices regarding access control
  • Explain the best approach to leveraging existing components
  • Create a timeline for a development project
  • Download a quality checklist to use when configuring/verifying application design

 

Course Outline

  • Unit 1: Usability & Layout
    • General application design
    • Field configuration
    • Calculated field recommendations
    • Notification recommendations
    • Workflow recommendations

 

  • Unit 2: Reporting & Dashboards
    • Reporting configuration
    • Workspace and iView configuration

 

  • Unit 3: Access Control
    • Out of the box access control
    • Access control recommendations

 

  • Unit 4: Design Considerations
    • On-Demand Applications vs Sub-Forms
    • Avoiding Findings generation overload

 

  • Unit 5: General Process Best Practices
    • Development timeline considerations
    • RSA Archer Configuration Best Practices document download

 

 

 

 

 

Access Training

 

 

In order to register for a class, you need to first create an EMC account

If you need further assistance, contact us

Attachments

    Outcomes