Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Scroll ignore | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
Scroll export button | ||||||||
---|---|---|---|---|---|---|---|---|
|
You can configure the different kind of Risks which can impact the performance of devices.
To configure Risk:
- Select Operations > Configuration > General > Risk.
- On the RISK page, select the Tenant and the other required details. For more information about fields on the RISK page, see Field Description.
- Click SUBMIT. The new Risk is configured.
Figure: RISK pageField Description
The following table describes the fields on the RISK page.
Field
Description
Risk Name
Type in the name for the Risk.
Definition
Type in the definition of the Risk.
Example
Type in the example related to the Risk.
Vulnerability
Type in the possible causes of the Risk.
Active
Indicates the status of the Risk.
- If selected, the Risk is active.
- If not selected, the Risk is inactive.
ACTIONS
This section explains all the icons displayed on the ACTIONS panel of the RISK page:
SHOW LIST
Click SHOW LIST to display the LIST table showing all the configured Risks for the selected Tenant.
Figure: RISK page: List of risks
- To modify a Risk, click the configured Risk Name. Make appropriate changes and click SUBMIT.
Click the Include Inactive check box to view the inactive Risks.
Note title Note: When the Risks are displayed under the LIST table, the ADD NEW action is displayed on the ACTIONS panel. Click ADD NEW to configure a new Risk.
Scroll ignore | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
|