If JavaScript is disabled, please continue to the
sitemap
.
Infor Risk and Compliance User Access Monitoring Guide
Home
Back
Back
Forward
Forward
Search
Copy URL
PDF
Print this page
Topic URL copied to clipboard
Show the Table of Contents
Hide the Table of Contents
About This Document
About User Access Monitoring
Authorizations Insight
User Activity Insight
Access Manager Insight
Infor Certification Manager
Extraction
Connections
Creating an online connection
Creating an offline connection
Mapping extracted data to an existing connection
Script-Based Codeless Extraction
Connection Security
Securing a new connection
How Connection Security impacts functionality
Extracting Data
Extraction Types
Scheduling an extraction
Default Filters for Extraction
Extraction options
Insights and Dependencies
User Activity Insight
Access Manager
Certification Manager
Reports
Extracted Data Report
Rules and Analysis
Rule Books
Creating rule books
Entering rule book details
Configuring Violation Notification Settings
Rule Book Security
Rule Book Owners
Locking rule books
Actions on Rule Books
Importing rule books
Exporting rule books
Rules
User Monitoring Rule formats
Creating rules
Entering rule details
Building Rule Conditions
Configuring Analysis Notification Settings
Parameter Library
Creating parameters
Viewing Parameter Details
Adding owners to the parameter library
Deleting parameters from the parameter library
Parameter Lists
Creating parameter lists
Adding parameters to a parameter list
Adding values to parameters in a parameter list
Editing a parameter list
Duplicating a parameter list
Deleting parameters from a parameter list
Deleting a parameter list
Adding Parameters To Rule Conditions
Importing parameter lists
Exporting parameter lists
Export File Naming Convention
Analysis
Scheduling an analysis
Scope Filters
Pre-analysis Check
Configuring Analysis Notification
Violations
Reviewing Analysis Results
Primary Violating Objects
Mitigating Violations
Configuring Violation Notifications
Violation Browser
Violation Reports
Generating reports
User Reports
Violation Summary
Violation
Violation Detail
Role/Responsibility Reports
Violation Summary
Violation
Violation Details
User Activity Insight Reports
User Activity
User Violation with Transaction History
Subscribing to Reports
Dashboards
New and Closed Violations
New Violations by Priority
New Violations Trend
Remediation Approach Trend
Time to Close Violations
Compensating Controls
Assigning compensating controls to rules
Importing compensating controls
Exporting compensating controls
Reports
Rules by Compensating Control
Exclusions
Creating an exclusion
Violation Browser
Report
On the rule directly
Using parameter lists for exclusions
Bulk Exclusion
Reports
Generic Exclusion Documentation
Violation Remediation Details
User Exclusion Review (SAP)
What if Analysis
Creating a what if analysis
What If Analysis Archive
Reports
What If Violation Details Report
Requests
Creating a Request
Role/ Responsibility Assignment Management
Creating an ERP specific user request
Request Status
Requests Workflow
Requests that Generate Violations
Requests that do not Generate Violations
The Approval Process
Mitigating Violations (Requestor or Approver)
Remove/Revoke the Violating Responsibility
Request Completion
Delete Request
Failed Requests
Reports
IRC Request Status
Request Details
Dashboard Panels
Access Approval Trend
New Request Activity
Requests Needing Approval
Approval Process
Participants in the Approval Process
Approval Process Owner Role
Approval Process Templates
Creating approval process templates
Approval Stages
Modifying an Approval Stage
Creating a New Approval Stage
Approval Templates without Stages
Configuring Request Options
User Creation
Reports
Approval Process Summary Report
Approvers Report
Functional Areas
Functional Area Variables
Creating a functional area
Creating additional sub functional areas
Adding values and approvers to sub functional areas
Deleting sub functional areas
Adding functional variables to approval stages
Reports
Functional Area Report
Functional Area - Roles Report
Out of Office Settings
Settings by logged in user for alternate approver
Settings by the administrator for alternate approver
Alternate Approvers in the Request Process
Emergency Access
Emergency Access User Role
Managing Emergency Access Functional Areas
Self-Assigning Emergency Access Responsibilities
Reports
Emergency Access Activity
Open link in new tab
Open link in new window
Copy link to clipboard