Upload
others
View
6
Download
2
Embed Size (px)
Citation preview
Chapter 2: Priviledged Access Management and
Priviledged Identity Management (PIM)
1
Steps for PIM
1. Create a Mail-enabled security group
2. Enable Priviledged Access3. Create an Access Policy4. Approve access