AnsweredAssumed Answered

To determine UnAuthorized Access

Question asked by Hosam Thiab on Dec 21, 2017
Latest reply on Jan 3, 2018 by Boris Lekumovich

Do we have any OOTB feature to identify or flag the change of access if it is being done outside RSA IAM solution?

Outcomes