Managing security configuration


Security configuration for the Analyzer and Collector components is defined in the XML files (one is stored in the Analyzer, another – in the Collector).

By using the security configuration file, a Security user can perform the following activities:

  • Back up and restore a security configuration
  • Transfer an existing configuration to another instance of BMC Real End User Experience Monitoring
  • Share configuration elements with other system owners

Note

The procedures explained in this topic are actual for both Collector and Analyzer components.

To edit the security configuration file

  1. On the Administration page, click Managing configuration and then click Download security configuration:

    Downloading the security configuration file
    sec-file.png
  2. Download the ZIP file with configuration files in XML format.
  3. Unpack the ZIP file and edit the XML file. BMC recommends that you backup your current configuration before proceeding with this procedure.
  4. Make changes to the XML file and save it. The names of the parameters are self-explanatory and correspond to security features.
  5. Archive the XML file into a new ZIP file. The file names do not matter.
  6. On the Administration page, click Managing configuration and then click Upload security configuration.
  7. The Upload security configuration page opens. If you select Purge system data box, the system purges all the collected traffic data along with all calculated statistics.
  8. Click Upload.

    The updated XML file replaces the existing system configuration.

To restore to security configuration to factory settings

  1. On the Administration page, click Managing configuration and then click Restore to factory configuration.
  2. On the Restore to factory configurationpage, specify the following options:
    • Purge system data — If you select this option, the system purges all the collected traffic data along with all calculated statistics.
    • If you leave all boxes unselected, the system restores the its initial factory configuration. All user configurations are lost.
       It is highly recommended that you back-up your configuration before resetting the system.
    • Delete account settings (excluding your own account) — If you select this option, the system deletes all existing user accounts, except the one you are currently logged with.

      Warning

      There is no backup for the account settings, so this operation is irreversible.

  3. Click OK to apply changes.

Related topics

Configuring-access-policies-Console
Enhancing-access-management-Analyzer
Enhancing-access-management-Collector

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*