Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

You can configure the different kind of Risks which can impact the performance of devices.

To configure Risk:

  1. Select Operations Configuration > GeneralRisk.
  2. On the RISK page, select the Tenant and the other required details. For more information about fields on the RISK page, see Field Description.
  3. Click SUBMIT. The new Risk is configured.

    Risk
    Figure:  RISK page

     Field Description

    The following table describes the fields on the RISK page.

    Field

    Description

    Risk Name

    Type in the name for the Risk.

    Definition

    Type in the definition of the Risk.

    Example

    Type in the example related to the Risk.

    Vulnerability

    Type in the possible causes of the Risk.

    Active

    Indicates the status of the Risk.

    • If selected, the Risk is active.
    • If not selected, the Risk is inactive.

ACTIONS

This section explains all the icons displayed on the ACTIONS panel of the RISK page:

SHOW LIST

Click SHOW LIST to display the LIST table showing all the configured Risks for the selected Tenant.


Figure:  RISK page: List of risks

  • To modify a Risk, click the configured Risk Name. Make appropriate changes and click SUBMIT.
  • Click the Include Inactive check box to view the inactive Risks.

    Note:

    When the Risks are displayed under the LIST table, the ADD NEW action is displayed on the ACTIONS panel. Click ADD NEW to configure a new Risk.


  • No labels