Activating the audit process workflow for threat analytics
This procedures describes how to schedule and distribute the audit processes required for using Guardium threat diagnostic tools.
About this task
There are two preconfigured audit processes that control the distribution of threat analytics
reports to the appropriate reviewers:
Suspected Malicious STP Cases
Suspected SQL Injection Cases