This section describes several common usage scenarios for the Novell Compliance Management Platform.
Section 2.3, Configuring Sentinel Link to use Sentinel as the Sender and EAS as the Receiver
Section 2.4, Using the IDM Driver for Sentinel and the Identity Vault Collector
Section 2.5, Sending Alerts When Rogue Administration Occurs
Section 2.6, Configuring the Identity Reporting Module to Work with Novell Access Manager