View
6
Download
2
Category
Preview:
Citation preview
Chapter 2: Priviledged Access Management and
Priviledged Identity Management (PIM)
1
Steps for PIM
1. Create a Mail-enabled security group
2. Enable Priviledged Access3. Create an Access Policy4. Approve access
Recommended