27.5 Installing and Enabling Monitoring for Access Manager Components