Configuring Risk 1
- Enterprise IT
- Shilpa K (Deactivated)
- Mayuresh Balaji Kamble (Unlicensed)
You can configure the different kind of Risks which can impact the performance of devices.
To configure Risk:
- Select Operations > Configuration > General > Risk.
- On the RISK page, select the Tenant and the other required details. For more information about fields on the RISK page, see Field Description.
- Click SUBMIT. The new Risk is configured.
Figure: RISK pageField Description
The following table describes the fields on the RISK page.
Field
Description
Risk Name
Type in the name for the Risk.
Definition
Type in the definition of the Risk.
Example
Type in the example related to the Risk.
Vulnerability
Type in the possible causes of the Risk.
Active
Indicates the status of the Risk.
- If selected, the Risk is active.
- If not selected, the Risk is inactive.
ACTIONS
This section explains all the icons displayed on the ACTIONS panel of the RISK page:
SHOW LIST
Click SHOW LIST to display the LIST table showing all the configured Risks for the selected Tenant.
Figure: RISK page: List of risks
- To modify a Risk, click the configured Risk Name. Make appropriate changes and click SUBMIT.
Click the Include Inactive check box to view the inactive Risks.
Note:
When the Risks are displayed under the LIST table, the ADD NEW action is displayed on the ACTIONS panel. Click ADD NEW to configure a new Risk.
Confluence Cloud Migration Alert: Please refer to known issues you may encounter in Confluence Cloud: https://eitdocs.atlassian.net/wiki/x/wDGwAQ