Contents Security Operations Previous Topic Next Topic Subscribe Log in to subscribe to topics and get notified when content changes. ... SAVE AS PDF Selected Topic Topic & Subtopics All Topics in Contents Share Find components installed with your application Several types of components are installed with Security Operations applications. Activating a Security Operations plugin adds or modifies several tables, user roles, properties, script includes, business rules, and other components. Before you beginRole required: adminNote: If application administration is active, you need both the admin and application admin roles (for example, sn_vuln.admin). Procedure Ensure your plugin is activated. In the filter navigator, type sys_metadata.list and press Enter. You are taken to the Application Files page. Click the to personalize the form to add the Package column. In the Search field, choose Display name and enter your plugin name. Security Incident Vulnerability Threat Core Configuration Compliance Right-click one of the items in the Package column and select Show Matching. In the Class column heading, click the and select Group by Class. Select the class of information you want to view. For example, click Class:Table to view all tables installed with the plugin. On this page Send Feedback Previous Topic Next Topic
Find components installed with your application Several types of components are installed with Security Operations applications. Activating a Security Operations plugin adds or modifies several tables, user roles, properties, script includes, business rules, and other components. Before you beginRole required: adminNote: If application administration is active, you need both the admin and application admin roles (for example, sn_vuln.admin). Procedure Ensure your plugin is activated. In the filter navigator, type sys_metadata.list and press Enter. You are taken to the Application Files page. Click the to personalize the form to add the Package column. In the Search field, choose Display name and enter your plugin name. Security Incident Vulnerability Threat Core Configuration Compliance Right-click one of the items in the Package column and select Show Matching. In the Class column heading, click the and select Group by Class. Select the class of information you want to view. For example, click Class:Table to view all tables installed with the plugin.
Find components installed with your application Several types of components are installed with Security Operations applications. Activating a Security Operations plugin adds or modifies several tables, user roles, properties, script includes, business rules, and other components. Before you beginRole required: adminNote: If application administration is active, you need both the admin and application admin roles (for example, sn_vuln.admin). Procedure Ensure your plugin is activated. In the filter navigator, type sys_metadata.list and press Enter. You are taken to the Application Files page. Click the to personalize the form to add the Package column. In the Search field, choose Display name and enter your plugin name. Security Incident Vulnerability Threat Core Configuration Compliance Right-click one of the items in the Package column and select Show Matching. In the Class column heading, click the and select Group by Class. Select the class of information you want to view. For example, click Class:Table to view all tables installed with the plugin.