Users Guide

& 7 e (g 9Ze
V: Le!-3mOB (g 9Ze |D: ANW!V NMdL:N #VGv J@O
Y. L 9Ze |D: 1.:6Y /fI v V@OY. Le!-B ON (g 9
Ze& 8. P.OAB fl! kqO) Xg |D; 3mUOY.
(g 3d
(g -j C:[: Encryption Key Manager!- d;; 3.OB _ (g !IQ
YgQ L%.! _}Oi OCG xw DO! X:. (g 9Ze& 9OY. (g -
j C:[: DO! Wq; 9OY. L' p:d. W DOL'; gkZ! 8:R v
V@OY. L DOG )b5 8:
!IUOY. DO! 9Ze& 2Y! DO )b! 8
: !IQ )b! 5^Oi DO; ]m vg C#RN! {s DOL'; Y[ D
Y% DO; -n uN [:Q L DO! 9Ze& 9OY. {s- |< (g 9Ze
NWB 8: !IQ )bN 3$H DON
8PGm DO )b! 8: !IQ )b&
JzQ C!G C#RN! {s DOL'; xw{8N v$UOY.
[:H pg xw DO; w}OB |< (g NWG $8 )b! J+ ?vv Jm D
O C:[!- gk !IQ x#; JzOv J5O Ob 'X 8:H (
g p:d./
zu/AWLJ!- DO <.&pOMOB :)3. GB ANW% [:; mAR v
5 V@OY. DO; ]m C#RN! {s L'; v$Oi DO ;k; 9gO)x
OB eb# ,SGB NW '!! _!Q D vv_ UOY. G` _ Encryption Key
Manager
!- 9Ze& 2m VB DO; &EOE* YYv J5O VGOJC@. L
DO: DOL'! C#RN; wTR v x@OY.
(g 8: E3/v
Y= E3/vB Encryption Key Manager 8: DO!- (g NW! bOGB L%
., (g NW DO; 2B '! W (g NW DOG Vk )b& &nOB % gkK
OY.
Audit.event.types
8.
Audit.event.types={type[;type]}
gk}
(g NW! 8;_ OB (g /|; v$OB % gkKOY. 8: E3/vN !I
Q *: Y=z0@OY.
7-1