AnsweredAssumed Answered

system reviews

Question asked by d4Xga0ayWag3a1PfIau0f4SH0DExYRNA5njty9vkh7E= on Jun 2, 2016
Latest reply on Jun 3, 2016 by Edwin Mullie

We are researching the best option for executing system reviews that includes who has access to an applications databases and servers.  The approach we are discussing is running a procedure against each database to collect this information on a daily basis and dumping to a staging database.  Then setup a multi-application collector to pull in the data to RSA Via.  I'm curious how others have collected system level access information within RSA Via?