.beu file
This file is generated by the Infor Portable Data Extractor
		Utility when data is extracted remotely.
Abort task
To stop a task with status as In Progress or Queued
Archival connection
An archival connection is the name of the connection, which has
		details such as the server and database name where the data will be
		archived.
Archive
An archive is a complete record of the data in part or all of a
		computer system, stored on an infrequently used medium.
Background extraction
This extraction type uses DEE 4.5 to extract data. Background
		processing means that SAP uses a background process to extract data instead of
		a dialog connection.
Baseline
A feature to take a snapshot of selected tables and
		their data after performing an extraction. 
	 
Bulk exclusion
Feature to exclude the same set of violating objects
		from all rules in a single rule book or from multiple rule books 
	 
Business Process Owner (BPO)
The Business Process Owner stands below the Rule Book Owner in
		the rule book ownership hierarchy. Business Process Owners have the same rights
		as Rule Book Owners; but cannot add or remove Rule Book Owners and Business
		Process Owners.
Compensating control
A Compensating Control is a list of instructions, procedures or
		agreements that supports the existence of a rule violation.
Connection
Connections enable you to connect Infor Risk & Compliance to
		your ERP application so that data extraction can be performed.
Connection owner
A user with the Connection Owner role can access the connections
		on the Connections page and can assign other connections owners and connection
		users. A connection owner also has the authority to delete or modify the owned
		connections.
Connection user
A connection user does not have the authority to delete or modify
		connections, or to add other connection users but can use the assigned
		connection for analysis.
Dashboard
A consolidated view of the findings of an analyses as
		panels or graphs. 
	 
Database
A database consists of an organized collection of data for one or
		more uses.
Data browser
An ad hoc querying tool for reviewing data extracted
		into Infor Risk & Compliance. 
	 
Data cleanup
When you extract data over a period of time, large volumes of
		data is accumulated. Deleting these previously extracted accumulated data,
		helps in improving the overall performance, and enables to run analysis against
		relevant data set. This feature is supported only for Process Insights and
		enables you to delete unwanted data through the Infor Risk & Compliance
		User Interface. 
	 
Data extraction
Extraction is the process of acquiring data from the underlying
		ERP system for analysis in Infor Risk & Compliance.
Disabling a rule book
Disable a rule book if you do not want the rules within it to be
		considered for analysis.
Enabling a rule book
A rule book needs to be enabled in order to be considered for
		analysis.
Exception browser
A primary source for navigating and remediating
		exceptions generated during analyses. 
	 
Exclusion List
A list of Infor Risk & Compliance users and roles that are
		marked as excluded.
Full extraction
In a full extraction, data from the previous extraction is
		replaced with the latest extracted data. This type of extraction is used if a
		previous extraction has failed or if you encounter some internal
		problems.
Functional area
A feature to define the hierarchical conditions or
		scopes based on your ERP data and manage these scopes through the Infor Risk
		& Compliance user interface, thereby giving you more control. 
	 
Global search
Functionality that enables signed-in users to search
		for data from Infor Risk & Compliance Platform or Infor Risk &
		Compliance Insights. 
	 
Import/Export history
The rule book Import/Export History option is designed to help
		you track your files and displays a list of import or export tasks
		performed.
Inbox
A central repository for pending tasks, scheduled
		reports, and notifications about task statuses. 
	 
Incremental extraction
An incremental extraction brings updates to the already extracted
		data and performs a full extraction for the incremental dates.
Infor Portable Data Extractor
Infor Portable Data Extractor is used to extract data remotely
		and can be used either as a stand-alone utility or can be installed on the same
		server as Infor Risk & Compliance.
Infor reports
Infor reports are formatted and organized presentation of data
		monitored and managed by Infor Risk & Compliance. The reports deliver
		information about violations based on the defined Business Controls through
		users and their capabilities within the ERP application.
Keywords
Feature to create specific words that can be
		associated with rules and parameter lists. Keywords are used while scheduling
		an analysis. 
	 
Locking rule books
Infor Risk & Compliance allows rule books to be locked so
		that they cannot be modified. Only Rule Book Owners, Business Process Owners
		and Super Users are authorized to lock and unlock their rule books.
Notifications
Notified by emails when events occur in Infor Risk &
		Compliance.
Offline connection
Offline connections are used to import a .beu file generated by
		the Portable Data Extractor Utility, import an .xml file if extraction is
		script-based (codeless), map the extracted data in a .beu file to an existing
		online or offline connection.
Offline extraction
Select the offline extraction option if you wish to extract data
		from a mapped connection.
Online connection
Online connections establish a direct connection between Infor
		Risk & Compliance and your ERP application.
Online extraction
This extraction enables you to extract data directly from the
		ERP.
Parameter lists
Consistent set of controls across an
		environment.
Password policies
A feature to set the password policies and account
		policies for Infor Risk & Compliance users. 
	 
Personal data protection
The Personal Data Protection page enables users, with
		the DPO (Data Protection Officer) role, to collect personal data pertaining to
		any specific object from all possible areas in the IRC application and also
		anonymize objects based on the request received.
Pre-Analysis check
Pre-Analysis check is done when if you attach parameter lists
		during analysis. When you click this button, Infor Risk & Compliance
		displays the Pre Analysis report. This report tells you whether the correct
		parameter list has been attached and whether it contains the required
		values.
Report filters
Parameters provided to scope down a report
Requests
An electronic message initiated by an authorized
		Infor Risk & Compliance user for various reasons. 
	 
Rule based extractions
Scoping extractions based on a rule book or a set of
		rule books. 
	 
Rule book
A rule book is a collection of rules. Rule books are an easy and
		efficient way of organizing and managing rules since grouping makes it easier
		to manage and operate rules as business needs change.
Rule book owner(RBO)
A Rule Book Owner is the creator of the rule book and is also its
		default owner. RBOs have full administrative permissions over the rule book.
		The RBO can add and remove other Rule Book Owners and Business Process
		Owners.
Scope filters
Scope filters are used to narrow the scope of the
		analysis.
Secured connections
Access to a secured connection is restricted to authorized
		users.
Standard Infor Risk & Compliance roles
Roles that contain pre-defined permissions that control which
		pages users can view and the action they can take from those pages.
Two-Step extraction
Two-step extraction consists of the following steps:1. Data is
		extracted from the DEE and stored in an .xml file.2. Extracted data from the
		.xml file is transferred to the Infor Risk & Compliance
		database.
Unlocked rule book
Unlock a rule book so that it can be modified. By default, a rule
		book is always unlocked.
Unsecured connection
Access to an unsecured connection is not restricted to specific
		users.
Upload
Upload data extracted from an offline connection to
		the Infor Risk & Compliance application server. 
	 
Violation browser
A primary source for navigating and remediating
		violations generated during analyses. 
	 
What If analysis
It helps to determine the impact of making a change before you
		actually make a change in the ERP application