The Security Management Guide explains the security mechanisms implemented throughout the product.
This guide is intended for a security expert who uses Operations Center in an organization. Most likely, this person has a separate role from the Operations Center administrator. The security expert evaluates how the features in Operations Center comply with existing company security policies.
We want to hear your comments and suggestions about this manual and the other documentation included with this product. Please use thefeature at the bottom of each page of the online documentation.
This guide is part of the Operations Center documentation set. For the most recent version of the Security Management Guide and a complete list of publications supporting Operations Center, visit our Online Documentation Web Site at Operations Center 5.5 online documentation.
The Operations Center documentation set is also available as PDF files on the installation CD or ISO; and is delivered as part of the online help accessible from multiple locations in Operations Center depending on the product component.
We encourage you to use the following additional resources on the Web:
You can learn more about the policies and procedures of NetIQ Technical Support by accessing its Technical Support Guide.
Use these resources for support specific to Operations Center:
In NetIQ documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. The > symbol is also used to connect consecutive links in an element tree structure where you can either click a plus symbol (+) or double-click the elements to expand them.
When a single pathname can be written with a backslash for some platforms or a forward slash for other platforms, the pathname is presented with a forward slash to preserve case considerations in the UNIX* or Linux* operating systems.
A trademark symbol (®, ™, etc.) denotes a NetIQ trademark. An asterisk (*) denotes a third-party trademark.