GRCPlatfrom 5.4 AdminGuide
GRCPlatfrom 5.4 AdminGuide
For additional information about using Adobe Reader, see “View and navigate
PDFs” from the Help menu in Adobe Reader.
Supported Browsers
Internet Explorer 8 or 9
Firefox 19 or 20
*Chrome
Note: Chrome is classified as extended support due in part to the accelerated rate at
which Google releases versions.
Microsoft Silverlight 5
The right arrow advances to the next PDF file in the portfolio.
Procedure
1. Right-click the image of the thumbnail and click Open File.
The thumbnail in the display panel has an Open label on it to indicate the file is
open in another Adobe Reader window.
Procedure
1. From the Adobe Reader toolbar, click Files.
The list of files in the portfolio is displayed. The files are listed alphabetically.
2. Double-click the file you want to open.
The file in the Files list is labeled with Open to indicate the file is open in
another Adobe Reader window.
3. Use the bookmarks in the Bookmark panel to navigate through the PDF file.
Procedure
Do one of the following:
l View Licensing on the Licensing Information page:
1. Click the Administration workspace.
2. From the Navigation Menu, click Application Builder > Manage
Applications > Licensing Information.
Document Conventions
The following table describes the document conventions used in the RSA Archer
Help Center.
Click, Drag, and Use the mouse to choose an To add a field to the sub-form's
Drop object and then move it to the layout, select the field from the
appropriate location. Available Fields list, drag the
selection to the appropriate spot
in the layout and release the
mouse button.
Drill Down Obtain more information by Click the pie piece to drill down
clicking an object. into the chart data.
Select Choose the checkbox or option To set the current theme as the
button. active appearance theme for the
application, select Active
Theme.
Product Terminology
The following tables provide definitions and examples for frequently used terms in
the Platform.
Displaying Information
Alias Names
Numerous operations in the Platform require references to objects—everything
from solutions, applications, and fields to individual values list values—to specify
the target for a particular activity. One example is mail merge, in which you must
create templates with unambiguous references to individual fields in an application.
Another example is the process of mapping external data to fields in the Data Feed
Manager. To provide a constant name that is also human readable, all Platform
objects, such as workspaces, applications, fields, and notification templates, support
an alias.
An alias is a short name for a unique object in the system that is human readable,
but also can be used in code or as a reference in configuration processes. All alias
names must contain only alphanumeric characters, beginning with a letter and
containing no spaces. The maximum length is 40 characters.
An alias name must be unique in the entity type. The following are additional points
of consideration:
l Field aliases must be unique in the level.
l Values List Value aliases must be unique in a Values List.
l Level, Data Driven Event, Report, and Workflow Stage aliases must be unique
in an application.
You can edit the alias name for non-system provided entities. Alias name for
system-provided entities are read only.
CAUTION: Alias name are used in configuration processes, system processes, and
web service API integrations. Modification of the alias name can cause these
functions to fail.
Note: The filter criteria resets to the default setting upon leaving the list page.
Procedure
1. Hover your mouse over the column that you want to filter and click .
2. Select the type of filter that you want to apply.
3. Enter the filter criteria.
4. To apply the filter criteria to the listing, click Filter.
Note: When a user's locale is assigned to use a double-byte character set, for
example, Japanese, the Rich Text Editor toolbar is not displayed. Instead, text is
displayed and can be entered in plain text. You can format the appearance of the
content in the text fields using HTML tags. Additionally, you can paste fully
formatted text into the text area.
Icon Description
The Find and Replace tool enables you to search for a text
string and replace the string with a different text string.
The Cut tool deletes the currently selected text but retains a
copy of the text in the system clipboard. Text that is cut from a
field remains available for pasting until the clipboard content is
replaced by another copy or cut operation.
Icon Description
The Paste tool enables you to paste the contents of the system
clipboard into the rich text field at the current insertion point,
automatically stripping all HTML and other formatting and
leaving only plain text. All line breaks are converted to <br>
tags and all other HTML tags are removed.
Icon Description
The Text Color tool allows you to change the color of the
currently selected text. The tool face always displays an
example "swatch" of the most recently applied text color. To
change the color selection, click the drop-down arrow to the
right of the tool. The Color Selector dialog box opens. Select a
color, and the dialog box automatically closes.
The Align Left tool allows you to align the currently selected
paragraphs with the left margin.
The Align Center tool allows you to center align the currently
selected paragraphs.
The Align Right tool allows you to align the currently selected
paragraphs with the right margin.
Icon Description
The Insert Date tool allows you to insert the current date at the
current insertion point.
The Unlink tool allows you to remove the hyperlink from the
currently selected text.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Access Control
Contents
Preface 5
About this Guide 5
User Accounts 5
Access Roles 5
Security Parameters 6
User Groups 6
LDAP Synchronization 6
Alias Names 7
Product Documentation 8
Support and Service 8
Chapter 1: Users 11
Managing Users 11
Add a User 11
Define User Account General Information 13
Change User Account Domain 13
Update User Account Contact Information 14
Change User Time Zone and Locale 15
Time Zones 15
Change User Account Status 17
View User Logon History 17
Change User Account Password 18
Require a User Password Change 18
Assign a Security Parameter to a User 19
Manage User Subscriptions to Notifications 19
Enter Notes Related to a User Account 20
Enroll a User in a Group 21
Assign an Access Role to a User 22
End an Active User Session 23
Delete a User Account 24
User Account Status 25
Chapter 2: Access Roles 27
Managing Access Roles 27
Add an Access Role 28
Update the General Properties of an Access Role 29
Assign a Group to an Access Role 29
Specify the Rights to an Access Role 30
Delete an Access Role 31
Access Role Privileges 31
Chapter 3: Security Parameters 33
Managing Security Parameters 33
Add a Security Parameter 33
Define the General Properties of a Security Parameter 34
Define the Password Properties for a Security Parameter 35
Establish Authorization Properties 36
3
RSA Archer GRC Platform Access Control
4
RSA Archer GRC Platform Access Control
Preface
User Accounts
To log on to the Platform, a user must have a Platform account. The properties of a
user account include the user's profile, account password, access rights within the
system, and group memberships. Access Control administrators can modify the
properties of any user account.
Access Roles
An access role is a collection of application-level and page-level rights that an
administrator creates and assigns to any number of users and groups to control their
privileges (create, read, update, and delete) for individual pages within the system.
Examples of access roles include General User, which might allow access only to
applications, and Administrative User, which might allow access only to features
such as Access Control and Application Builder.
The Access Control feature also includes a special access role called System
Administrator, which cannot be deleted or modified. The System Administrator role
grants users unrestricted access to all system features and to all records stored in
applications, including records enrolled in content review. Only users who have
already been designated as System Administrators can assign the System
Administrator role to other users.
Preface 5
RSA Archer GRC Platform Access Control
An administrator can assign any number of access roles to a user. To simplify the
process of assigning permissions, the administrator can associate groups of users
with access roles. If the administrator assigns more than one role to a user or group,
the user or group has all of the privileges associated with the assigned access roles.
For example, if one role grants create, read, and update privileges in the Policies
applications and a second role grants only delete privileges, a user who is assigned
both roles possesses create, read, update, and delete privileges in the Policies
applications.
Security Parameters
In contrast to an access role, which is a collection of rights or privileges, a security
parameter is a collection of rules. A security parameter determines a user's
password creation restrictions, account lockout duration, allowable grace logons,
session time-out behavior, and active session time frames. Administrators can
create any number of security parameters, but only one parameter is assigned to
each user. A security parameter can be designated as the default parameter that is
used when new user accounts are created.
User Groups
Access Control administrators can create groups of application users for the
purpose of organizing user accounts and simplifying tasks within the system. A user
group is a collection of user accounts that can be constructed based on any criteria
appropriate for the organization. For example, an administrator might choose to
construct groups based on organizational structure or geographic placement of
operations.
Groups can also be nested to create a hierarchical structure of groups and
subgroups. For example, an administrator might create a Sales group that includes
all user accounts for members of the organization's Sales team. Nested under the
Sales group, the administrator can create subgroups, such as Midwest Sales Team
and East Coast Sales Team.
By organizing users into groups, many key tasks in the system can be streamlined,
as the following examples illustrate:
l Assign access rights at the application, page, record, and field level to groups of
users rather than individual users.
l Enroll an entire group in a discussion forum with a single click of the mouse.
l Send a Training and Awareness event to members of a specific group, such as
the Incident Investigation group.
LDAP Synchronization
The Lightweight Directory Access Protocol (LDAP) enables an organization to
streamline the administration of user accounts and groups by automatically
synchronizing them with the user and group information stored on an LDAP server
that already may exist in the organization's technology infrastructure.
6 Preface
RSA Archer GRC Platform Access Control
Alias Names
Numerous operations in the Platform require references to objects—everything
from solutions, applications, and fields to individual values list values—to specify
the target for a particular activity. One example is mail merge, in which you must
create templates with unambiguous references to individual fields in an application.
Another example is the process of mapping external data to fields in the Data Feed
Manager. To provide a constant name that is also human readable, all Platform
objects, such as workspaces, applications, fields, and notification templates, support
an alias.
An alias is a short name for a unique object in the system that is human readable,
but also can be used in code or as a reference in configuration processes. All alias
names must contain only alphanumeric characters, beginning with a letter and
containing no spaces. The maximum length is 40 characters.
An alias name must be unique in the entity type. The following are additional points
of consideration:
l Field aliases must be unique in the level.
l Values List Value aliases must be unique in a Values List.
l Level, Data Driven Event, Report, and Workflow Stage aliases must be unique
in an application.
You can edit the alias name for non-system provided entities. Alias name for
system-provided entities are read only.
CAUTION: Alias name are used in configuration processes, system processes, and
web service API integrations. Modification of the alias name can cause these
functions to fail.
Preface 7
RSA Archer GRC Platform Access Control
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
8 Preface
RSA Archer GRC Platform Access Control
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 9
RSA Archer GRC Platform Access Control
Chapter 1: Users
Managing Users
Each user must have an account in the Platform to log on to the system. The
properties of a user account include the user profile, access rights within the
system, group memberships, notification subscriptions, and account password.
Access Control administrators can modify the properties of any user account.
Note: To determine how many user accounts are included in the Platform at any
given time, export the User Accounts All report to a .csv file and note the number
of line items in the spreadsheet.
Add a User
Complete this task to create new user accounts and to specify the properties of the
accounts.
Chapter 1: Users 11
RSA Archer GRC Platform Access Control
Procedure
1. Navigate to the Manage Users page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
2. Click Add New.
The Manage User page is displayed.
3. On the General Information tab, in the General Information section, enter
the name of the user in the following fields:
l First Name
l (optional) Middle Name
l Last Name
4. In the Account Maintenance section, complete Enter and Confirm in the
Password field.
The password must conform to the default security parameter password rules.
Also the entries must exactly match.
5. (Optional) Select the Send user a notification with password information
checkbox if you want the Platform to send the user an email containing the
password information.
The Default Email address is used for the notification email. for more
information see Update User Account Contact Information.
Note: If you do not select this checkbox, then be certain to inform the user of
the new password.
6. Click Apply.
Next Steps
To complete the configuration of the new user account, see the following:
l Define User Account General Information
l Change User Account Domain
l Update User Account Contact Information
l Change User Time Zone and Locale
l Change User Account Status
l Require User Password Change
l Assign a Security Parameter to a User
l Manage User Subscriptions to Notifications
l Enter Notes Related to a User Account
12 Chapter 1: Users
RSA Archer GRC Platform Access Control
Note: The system-generated user name is seven characters long, all lowercase. The
user name contains the first six characters of the Last Name field followed by the
first character of the First Name field. If the Last Name field is fewer than six
characters, the system appends additional characters from the First Name field to
make a seven-character user name. If the user name is not unique in the domain,
the system appends a number (up to 999) to the end of the name to make the name
unique.
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
2. (Optional) On the General Information tab, in the General Information
section, change the name of the user in the following fields:
l First Name
l (optional) Middle Name
l Last Name
3. (Optional) To modify the system-generated user name, change the name in the
User Name field.
The user name must be unique in the domain.
4. Click Apply.
Chapter 1: Users 13
RSA Archer GRC Platform Access Control
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
2. On the General Information tab, in the General Information section, from the
User Domain list, select the appropriate domain.
3. Click Apply.
Note: Users can modify their own contact information from the Preferences menu.
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
2. (Optional) On the General Information tab, in the Contact Information
section, complete the following fields:
l Address
l Company
l Title
3. (Optional) In the email fields, enter the email addresses used by the user. For
each email address that you enter, select an address type from the related list.
Note: The value in Default Email is used throughout the Platform when a user's
email is required, for example, when instructions are sent for resetting a
password from the User Login page.
14 Chapter 1: Users
RSA Archer GRC Platform Access Control
An email address must contain one "at" symbol (@) and at least one dot
(period).
4. (Optional) In the phone fields, enter the phone numbers used by the user. For
each phone number that you enter, select a phone type from the related list.
5. Click Apply.
Note: Users can change the time zone and locale assigned to their accounts from
the Preferences menu.
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
2. On the General Information tab, in the Localization section, from the Time
Zone list, select the user's current time zone.
3. From the Locale list, select the user's current location.
Note: When the Default Locale option is selected, the location is determined by
the Locale setting in the RSA Archer Control Panel.
4. Click Apply.
Time Zones
The default time zone is stored in the Platform as Coordinated Universal Time
(UTC), also referred to as Greenwich Mean Time (GMT). The Platform uses this
time standard for converting time and dates based on the instance or user locale. All
time is stored as UTC and converted based on the time zone of the user.
Each user account has a time zone associated with it. The Platform uses this time
zone to standardize dates and times entered by a user. When a date field includes
the time component, the time zone is used so that the date and time can be stored in
the database as UTC and displayed to other users based on the time zone associated
with the User Profile of the other user.
Chapter 1: Users 15
RSA Archer GRC Platform Access Control
All values for date fields entered in the Platform are stored in the database as UTC.
However, the Display Control type determines how the Platform handles time.
l For Date only, the Platform truncates the time.
l For Date and Time, the Platform converts the time based on the time zone
associated with the user profile.
User 1 enters the date 11/14/2012 and the time 10:13 P.M. in record A.
The date and time are converted based on the time zone of user 1. As a
result the date and time are stored in the database as 11/15/2012
04:13:00 UTC.
Data feeds and calculated fields use UTC. Using the previous example in a
calculated field with the DATEFORMAT function, the date and time is displayed
as 8/15/2012 04:13:00 UTC for all users regardless of their time zone. The date and
time are stored in a text field. When the date and time is stored in a text field, the
data is not converted because the Platform recognizes as only text.
The DATEFORMAT(NOW(),"yyyy-MM-dd hh:mm tt") function displays the
current date and time in UTC in the desired format. If you want to store it in a Date
Field with time enabled, convert the literal to a date time serial value.
16 Chapter 1: Users
RSA Archer GRC Platform Access Control
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
2. On the General Information tab, in the Account Maintenance section, from
the Status list, select the appropriate status.
3. Click Apply.
Procedure
1. Navigate to the Manage Users page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
2. Click the user account that you want to view.
3. On the General Information tab, in the Account Maintenance section, click
the link in the Last Login field.
The Login History page is displayed.
Chapter 1: Users 17
RSA Archer GRC Platform Access Control
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
2. On the General Information tab, in the Account Maintenance section, click
Change Password.
3. In the Change Your Password dialog box, complete the following:
a. In the New Password field, enter the password that you want to assign to
the user account. The password must conform to the security parameter
password rules assigned to this account.
b. In the Retype Password field, re-enter the new password that you want to
assign to the user account. The entry must exactly match the password that
you entered in the preceding field.
c. Click OK.
4. Click Apply.
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
18 Chapter 1: Users
RSA Archer GRC Platform Access Control
Note: If you are creating a new user account, the option is enforced the first
time that the user logs on. After the user logs on and changes the password, this
checkbox automatically clears.
3. Click Apply.
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
2. On the General Information tab, in the Account Maintenance section, from
the Security Parameter list, select the parameter that you want to assign to the
user.
3. (Optional)View the properties of the selected security parameter:
a. In the Security Parameter Detail field, click View Security Parameter.
b. Click OK.
4. Click Apply.
Chapter 1: Users 19
RSA Archer GRC Platform Access Control
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
2. On the General Information tab, in the Account Maintenance section, in the
Notifications Subscriptions field, click the Manage Notifications
Subscriptions link.
The Manage Your Email Subscriptions page is displayed.
3. To subscribe or unsubscribe to an email notification, in the Subscribed column,
select or clear the checkboxes that correspond to the appropriate subscription
notifications.
4. Click Save.
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
2. On the General Information tab, in the Account Notes section, enter notes
and additional information related to the user account.
20 Chapter 1: Users
RSA Archer GRC Platform Access Control
3. (Optional) Use the options in the Rich Text Editor toolbar to format the text.
4. Click Apply.
Important: If a group is created through LDAP synchronization, you cannot use the
Access Control feature to add or remove the group enrollment. To add or remove a
user from an LDAP group, you must make the appropriate changes within your
LDAP directory and then run a data synchronization. For more information, see
Managing LDAP Configurations.
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
2. Click the Groups tab.
Note: By default, a plus sign is displayed next to each group and subgroup in the
list. If a group does not have a subgroup, the plus sign disappears after you click
the sign.
Note: To search for a specific item, enter the item name in the Find field
and, if applicable, select the type from the adjacent list. Click . The
results of your search are displayed in the Available list of the Search
Results node.
c. (Optional) To remove a group from the Selected list, click for the group
that you want to remove from the list.
d. Click OK.
4. (Optional) To remove a group from the user account, in the Actions column,
Chapter 1: Users 21
RSA Archer GRC Platform Access Control
Procedure
1. Select the user account that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
c. Click the user account.
22 Chapter 1: Users
RSA Archer GRC Platform Access Control
Note: To search for a specific role, enter the role name in the Find field
and, if applicable, select the type from the adjacent list. Click . The
results of your search are displayed in the Available list in the Search
Results node.
c. (Optional) To remove a role from the Selected list, click for the access
role that you want to remove from the list.
d. Click OK.
4. (Optional) To remove a role from the user account, in the Action column, click
for the access role that you want to remove.
Note: You only can remove roles in which the Assignment Method is set to
Manual.
5. Click Apply.
Procedure
1. Navigate to the Manage Users page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
2. Click the row of the user account that you want to log off and view the
description.
3. In the Actions column, click for the user account that you want to log off.
Chapter 1: Users 23
RSA Archer GRC Platform Access Control
Procedure
1. Navigate to the Manage Users page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Users.
2. Click the row of the user account that you want to delete and view the
description.
3. In the Actions column, click for the user account that you want to delete.
4. When prompted to confirm the deletion, click OK.
24 Chapter 1: Users
RSA Archer GRC Platform Access Control
Status Description
Inactive The user cannot log on to the system. In addition, the user does not
receive alert notifications triggered by notification templates to
which the user is subscribed.
An administrator can manually set a user account to Inactive. A user
account can be automatically deactivated if the user has not logged
on to the system within the maximum time of account inactivity.
The Automatic Account Deactivation field within the user's security
parameter defines the number of days that a user account can remain
inactive before the system deactivates the account.
Locked The user cannot log on to the system. However, the user continues
to receive alert notifications triggered by notification templates to
which the user is subscribed.
An administrator can manually set a user account to Locked. A user
account can be automatically locked if the user exceeds the
maximum number of failed logon attempts defined by the user's
security parameter. For example, if a user's security parameter allows
three failed logon attempts and the user incorrectly enters an invalid
password four times while attempting to log on, the system locks
the user account.
Chapter 1: Users 25
RSA Archer GRC Platform Access Control
Note: As the number of users, groups, and applications increases, keeping track of
who has access to what becomes more complex. Best practices recommend
simplifying the process. Start by creating granular access roles for each of your
applications, for example, Policy Administrator, Policy Author, and Policy Reader.
Granting access to new or existing users and groups then becomes as simple as
selecting from a list of predefined roles.
Procedure
1. Navigate to the Manage Access Roles page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Access
Roles.
2. Click Add New.
3. Do one of the following:
l To use the settings of an existing access role as a starting point for the new
access role, select Copy an existing Access Role and then select the
existing access role from the Access Role list.
l To select new settings for the access role, select Create a new Access Role
from scratch.
4. Click OK.
5. On the General tab, do the following:
a. In the Name field, enter the name of the new access role.
b. (Optional) In the Description field, enter a brief description of the access
role.
Note: The description is for internal use only and is not visible to end users.
6. Click Apply.
Next Steps
To complete the configuration of the new access role, see the following:
Procedure
1. Select the access role that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Access
Roles.
c. Click the access role.
2. Click the General tab.
3. (Optional) In the General Information section, complete any of the following:
l In the Name field, change the name of the access role.
l In the Description field, enter a brief description of the access role.
Note: The description is for internal use only and is not visible to end users.
l To modify the system-generated alias, change the value in the Alias field.
4. (Optional) To define the access role as the default role that is assigned to new
users, in the Default Access Role section, select Assign as Default.
5. Click Apply.
Note: If you associate a group with an access role and the group contains
subgroups, the subgroups are not associated with the access role. To associate
subgroups with an access role, you must select the subgroups.
Procedure
1. Select the access role that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Access
Roles.
c. Click the access role.
2. Click the General tab.
3. In the Group Assignments section, do the following:
a. Select Assign.
The Group Assignments section expands to enable you to search for and
select groups.
b. Under Available, select the group or groups to assign to the access role.
The selected groups are displayed under Selected.
Note: To search for a specific item, enter the item name in the Find field
and, if applicable, select the type from the adjacent list. Click . The
results of your search are displayed in the Available list of the Search
Results node.
c. (Optional) To remove a group from the Selected list, click for the access
role that you want to remove from the list.
4. Click Apply.
Procedure
1. Select the access role that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Access
Roles.
c. Click the access role.
Note: You cannot delete the default access role. To delete the default access role,
you must first assign another access role as the default access role.
Procedure
1. Navigate to the Manage Access Roles page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Access
Roles.
2. Click the row of the access role that you want to delete.
3. In the Actions column, click for the access role that you want to delete.
CAUTION: Deleting an access role is permanent. You cannot recover a deleted
access role. Users and groups that were assigned the deleted access role lose
the privileges of the access role.
Privilege Description
Privilege Description
Note: If your organization leverages a single sign-on (SSO) solution, most security
parameter settings are irrelevant because your network enforces password
expiration, account lockout, time frames, and password strength requirements for
you. After successfully authenticating, SSO solution users can access the Platform.
Procedure
1. Navigate to the Manage Security Parameters page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Security
Parameters.
Note: The description is for internal use only and is not visible to end users.
7. Click Apply.
Next Steps
To complete the configuration of the new security parameter, see the following:
l Define the General Properties of a Security Parameter
l Define the Password Properties for a Security Parameter
l Establish Authorization Properties
Procedure
1. Select the security parameter that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Security
Parameters.
c. Click the security parameter.
2. Complete the General Information section:
a. In the Name field, change the name of the security parameter.
b. (Optional) In the Description field, enter a brief description of the security
parameter.
Note: The description is for internal use only and is not visible to end users.
3. (Optional) To modify the system-generated alias, change the value in the Alias
field.
4. (Optional) To designate the current parameter as the default to be assigned to
new users, in the Default Security Parameter section, select Assign as
Default.
Note: This option is not available when the security parameter is assigned as the
default. Only one security parameter can be selected as the default.
5. Click Apply.
For RSA Archer recommendations on best practices for generating and managing
user account passwords, see "RSA Archer GRC Platform Security Configuration
Guide."
Procedure
1. Select the security parameter that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Security
Parameters.
c. Click the security parameter.
l From the Lowercase Characters Required list, select the minimum number
of lowercase characters required for a valid password, or select Other to
enter a different value.
l From the Grace Logins list, select the number of times a user is allowed to
bypass the Required Password Change page without changing the account
password, or select Other to enter a different value.
l From the Password Expiration Notice list, select the number of days before
a user's password expires that you want to prompt the user to change the
password, or select Other to enter a different value.
3. Click Apply.
l Password creation
l Password change enforcement
l Account lockout duration
l Session time-out behavior
l Active session restrictions
The Maximum Failed Login Attempts setting also is applied to the maximum
number of failed attempts when a user tries to change the password. When the
maximum value is reached, the user account is locked for the period of time
specified in the Account Lockout Period field.
Procedure
1. Select the security parameter that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Security
Parameters.
c. Click the security parameter.
2. In the Authorization Properties section, do any of the following:
l From the Maximum Failed Login Attempts list, select the number of times
a user is allowed to attempt to access the account using an incorrect user
name, company ID, and password combination. Or, select Other to enter a
different value.
l From the Session Timeout list, select the maximum length of time a user's
session without activity can remain active before the session is automatically
timed out or, select Other to enter a different value and select a type of
duration..
l To specify a time period when active users are only allowed access to the
system, select the Limit Session Time option. Enter the start and stop times
that active sessions are allowed, and select the time zone that applies to the
active session limitation.
l In Days Disallowed, click and select the days of the when active user
sessions are not allowed. You can remove a day from the Selected list by
clicking adjacent to the day that you want to remove from the list. Click
OK.
Note: If the option is not set, users can have active sessions at any time of
the day.
l From the Account Lockout Period list, select the length of time that an
account remains in locked status if a user reaches the maximum number of
failed logon attempts. Or select Other and enter the number and type of
duration.
l From the Automatic Account Deactivation list, select the number of days a
user account can remain inactive before the account becomes deactivated or
select Other to enter a different value.
l In Dates Disallowed, click and select the actual dates when active user
sessions are not allowed. You can remove a date from the Selected list by
clicking adjacent to the date that you want to remove. Click OK.
3. Click Apply.
Note: You cannot delete the default security parameter. To delete the default
security parameter, you must first assign another security parameter as the default.
For more information, see Define the General Properties of a Security Parameter.
Procedure
1. Navigate to the Manage Security Parameters page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Security
Parameters.
2. Click the row of the security parameter that you want to delete and view the
description.
3. In the Actions column, click for the security parameter that you want to
delete.
4. When prompted to confirm the deletion, click OK.
Chapter 4: Groups
Managing Groups
Access Control administrators can create groups of users for the purpose of
organizing users and simplifying tasks within the Platform. A group is a named
entity that refers to a collection of users and other groups. Groups can be
constructed based on any appropriate criteria for your organization. For example,
you might construct groups based on organizational structure or geographic
placement of operations.
In the Platform, you can select user groups, which enables you to simplify many key
tasks. The selection of groups rather than individual users can significantly ease the
amount of effort required to control entitlements throughout the Platform. You can
use groups to manage access to the following:
Add a Group
Complete this task to create and manage user groups. This includes naming and
describing a group, defining its membership, and nesting it as a subgroup under
another group.
Procedure
Note: The description is for internal use only and is not visible to end users.
Chapter 4: Groups 41
RSA Archer GRC Platform Access Control
Next Steps
Update the General Properties of a Group
Procedure
1. Select the group that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Groups.
c. Click the group.
2. Complete the General Information section:
a. In the Name field, change the name of the group.
b. (Optional) In the Description field, enter a brief description of the group.
Note: The description is for internal use only and is not visible to end users.
3. Click Apply.
Procedure
1. Select the group that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Groups.
42 Chapter 4: Groups
RSA Archer GRC Platform Access Control
Note: To search for a specific item, enter the item name in the Find field and, if
applicable, select the type from the adjacent list. Click . The results of your
search are displayed in the Available list of the Search Results node.
3. (Optional) To remove a group or user from the Selected list, click for the
group or user that you want to remove from the list.
4. Click Apply.
Procedure
1. Select the group that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Groups.
c. Click the group.
2. In the Member Of section, from the Available list, select the group or groups
that you want to serve as a parent for the current group.
The selected group or groups are displayed in the Selected list.
Note: To search for a specific item, enter the item name in the Find field and, if
applicable, select the type from the adjacent list. Click . The results of your
search are displayed in the Available list of the Search Results node.
3. (Optional) To remove a group from the Selected list, click for the group that
you want to remove from the list.
4. Click Apply.
Chapter 4: Groups 43
RSA Archer GRC Platform Access Control
Delete a Group
Complete this task to delete a user group. Groups that cannot be deleted include the
Everyone group, which contains all users, and any group that has been selected
from a User/Groups List or Record Permissions field within a content record.
System messages are displayed when you attempt to delete groups that have parent
or child relationships.
If a group contains subgroups, you must remove the subgroups from the group
before you are allowed to delete the group. For information on removing subgroups
from a group, see Nest a Group Under a Parent Group.
Important: If the group was created through LDAP synchronization, you cannot use
the Access Control feature to delete the group. You must make the appropriate
changes within your LDAP directory and then run a data synchronization. For more
information, see Managing LDAP Configurations.
Procedure
1. Navigate to the Manage Groups page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage Groups.
2. Click the row of the group that you want to delete and view the description.
3. In the Actions column, click for the group you want to delete.
4. When prompted to confirm the deletion, click OK.
44 Chapter 4: Groups
RSA Archer GRC Platform Access Control
Procedure
1. Navigate to the Manage LDAP Configurations page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage LDAP
Configurations.
2. Click Add New.
3. On the General tab, in the Name field, enter the name of the new LDAP
configuration.
Note: The name of the LDAP configuration should be easily identifiable. Avoid
non-descriptive names like "Domain 1" and "Domain 2". Instead use descriptive
names like "East Coast Bank Domain" and "Midwest Bank Domain."
Note: The description is for internal use only and is not visible to end users.
If you are using Windows Authentication, ensure that the User Domain
field matches the Windows domain name. If these values do not match,
single sign-on (SSO) fails. These domain names are not case sensitive.
l User Name
l First Name
l Last Name
l Email Name
6. Click Apply.
Next Steps
To complete the configuration of the new LDAP configuration, see the following:
l Update the General Information of LDAP Configuration
l Configure the LDAP Directory Properties
l Configure the LDAP Synchronization Properties
Procedure
1. Select the LDAP configuration that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage LDAP
Configurations.
c. Click the LDAP configuration.
2. On the General tab, in the Name field, change the name of the LDAP
configuration.
Note: The name of the LDAP configuration should be easily identifiable. Avoid
non-descriptive names like "Domain 1" and "Domain 2." Instead use descriptive
names like "East Coast Bank Domain" and "Midwest Bank Domain."
3. From the Status list, change the status of this LDAP configuration.
To prevent the use of this LDAP configuration, select Inactive.
4. (Optional) To set the LDAP configuration as the default, which is used to
identify accounts when no domain or an invalid domain is specified, select
Default LDAP Configuration.
Important: To avoid creating a security issue, do not specify a default LDAP
configuration if your organization employs multiple domains and allows non-
unique user names across domains.
Note: The description is for internal use only and is not visible to end users.
6. Click Apply.
Procedure
1. From the Administration workspace, navigate to Navigation Menu > Access
Control > Manage LDAP Configurations.
2. Select the LDAP configuration that you want to update.
3. Click the Configuration tab.
4. (Optional) Complete the fields in the LDAP/Active Directory Server section.
Field Action
User's Domain Enter the domain to which user accounts from this LDAP server
belong.
The name must be unique across all LDAP server configurations.
Binding If you are using an Active Directory server, select whether to use
serverless binding. If you select Use Serverless Binding, you do
not need to enter a value in the Name/IP Address field. When this
option is selected, the Use Secure Connection option is not
available.
Field Action
User Enter the attribute that identifies the object as a user object.
Identifier
For new LDAP configurations, the default value is "user."
For Active Directory servers, the default value is typically "user."
For other LDAP servers, the default value is typically "inetOrgPerson."
To obtain the actual default values for your organization, see your
LDAP administrator.
Group Enter the attribute that identifies the object as a group object.
Identifier
For new LDAP configurations, the default value is "group."
For Active Directory servers, the default value is typically "group."
For other LDAP servers, the default value is typically
"groupOfUniqueNames."
To obtain the actual default values for your organization, see your
LDAP administrator.
Additional Enter additional attributes that must be retrieved from the LDAP
Attributes source during search. For example, if you are using filters, enter the
filters in this field.
User's Enter the attribute that identifies the groups to which the user belongs.
Group
For new LDAP configurations, the default value is "memberOf."
Identifier
For Active Directory servers, the default value is typically
"memberOf."
For other LDAP servers, the default value is typically
"uniqueMember."
To obtain the actual default values for your organization, see your
LDAP administrator.
Field Action
Users and For Active Directory servers, if the user-group association is defined in
Groups the user object, select Users Contain Groups.
For other LDAP servers, if the user-group association is defined in the
group object, select Groups Contain Users.
Connection Enter the time-out value in seconds for the LDAP query.
Time-out
This value must be a whole number greater than 0.
For new LDAP configurations, the default value is 60.
Binding If your server does not allow connection using the Simple
Authentication and Security Layer (SASL) protocol, or if you
experience errors, select Use Simple LDAP Binding.
If your server does not support paged searching, select Disable page
searching.
If you are using an LDAP server other than Active Directory, to
remove unnecessary white space in the Distinguished Name (DN)
before the names are compared, select Remove whitespace from the
DNs.
Field Action
Base DN Enter the Base Distinguished Name for the location of user
account information within your LDAP directory.
Example
To map only LDAP values associated with the “user” class, enter
objectClass=user as the filter. This entry results in the values
associated with this class being available for mapping.
Field Action
Field Mapping For each User Profile field, from the Attribute list, select the
appropriate LDAP attribute.
7. Click Apply.
Note: When you click Test Connection on the Configuration tab of the Manage
LDAP Configurations page, an error message is displayed when the number of
records returned exceeds the configured size limit for the directory. Contact your
LDAP administrator to request a configuration change.
Procedure
1. Select the LDAP configuration that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage LDAP
Configurations.
c. Click the LDAP configuration.
Field Action
Frequency From the list, select how often you want to run the LDAP
synchronization process.
Time Zone Select the time zone reference for the Time field.
Important: If the Platform cannot access the LDAP directory at the scheduled
time, the Platform automatically tries to connect with the directory 10 times,
over a 1-hour period, before logging an error record and stopping the
synchronization process. If the Platform fails to synchronize with LDAP, the
Platform sets the Synch Status field to Inactive.
While the Synch Status field is Inactive, the Platform suspends further
synchronization attempts until an administrator manually corrects the problems
with the connection and sets the Synch Status field to Active.
Field Action
Example
To update only user accounts from your New York office, from
the Attribute list, select Office, from the Operator list, select
equals and enter New York in the Value field.
Example
To deactivate user accounts where the employment status for the
matching LDAP user account is set to inactive, from the
Attribute list, select Employment Status, from the Operator list,
select equals and in the Value field, enter Inactive.
Field Action
Send Notification To send a notification to each user that is created for alerting the
user of a new password, select Send a notification to each user
alerting them of their new password. This will only occur is
an email address is provided.
The Default Email Address in the user account must exist to use
this functionality.
When this option is selected, a notification message will be sent
to all users that are being created. RSA recommends disabling
this option when synchronizing a large number of records.
Uploading a large number of users can cause the email server to
exceed its capacity for sending email messages.
Field Action
Group Synch To replicate your LDAP group structure within the system each
time the system synchronizes with LDAP, select Group Synch.
The common name (CN) of the group on your LDAP server is
used as the group name in the Platform. If you have a group in
the Platform that was created before the configuration of LDAP
synchronization, and you have a group with a matching name in
your LDAP directory, the group within the Platform is not
synchronized with the LDAP group. Instead, a new group with
the same name is created in the Platform during the
synchronization process. This new group is labeled with the
Synchronization icon.
Group Base DN Enter the Base Distinguished Name (DN) for your LDAP group
structure.
If you selected Group Synch and you do not specify a DN for
your group structure, the group synch query defaults to the
value entered in the Base DN field on the Configuration tab of
the Manage LDAP Configuration page.
6. Click Apply.
Note: This option is not available if the system is currently performing data
synchronization.
You can view the status of LDAP synchronization in the Current Synch Status field.
For more information, see LDAP Synchronization Status.
If you make changes to your LDAP configuration, you must save those changes
before requesting an immediate data synchronization. Otherwise, the last saved
LDAP configuration is used.
Procedure
1. Navigate to the Manage LDAP Configurations page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage LDAP
Configurations.
2. Click the LDAP configuration that you want to synchronize.
3. Click the Synch Status tab.
4. In the Immediate Synch Request section, in the Synch Request field, click
Run Synch Now.
If the LDAP synch status is Queued or Running, the Cancel Synch Job section
is displayed instead of the Immediate Synch Request section.
Procedure
1. Navigate to the Manage LDAP Configurations page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage LDAP
Configurations.
2. Click the LDAP configuration for which you want to view the synchronization
report.
3. Click the Synch Status tab.
4. In the Status field, click Refresh Status.
A report of the last data synchronization is displayed in the fields in the Last
Synch Attempt section.
5. If failures occurred in the last synchronization attempt, in the Failure Detail
field, click View Failure Detail to view failure information in a text file.
Procedure
1. Navigate to the Manage LDAP Configurations page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage LDAP
Configurations.
2. Click the LDAP configuration for which you want to cancel the data
synchronization.
3. Click the Synch Status tab.
4. In the Cancel Synch Job section, click Cancel Synch.
Note: The Cancel Synch Job section is displayed only when a synchronization is
running. Otherwise, the Immediate Synch Request section is displayed.
CAUTION: Take extreme caution when deleting an LDAP configuration. If you also
delete users and groups that are associated with this configuration, the user and
group information is permanently deleted.
Procedure
1. Navigate to the Manage LDAP Configurations page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Access Control > Manage LDAP
Configurations.
2. Click the row of the LDAP configuration that you want to delete and view the
description.
3. In the Actions column, click for the LDAP configuration that you want to
delete.
4. When prompted to confirm the deletion, click OK.
Status Description
Queued A synchronization request has been issued, but the system has not yet
responded to the request.
Chapter 6: Reports
Report Description
Access Control Rights by Role Provides a summary of the access control rights
associated with a given access role. A role is defined
as a collection of access control rights that can be
assigned to a unique group of users. You can filter
this report by role, application, and page type.
Access Control Rights by User Provides a summary of the access control rights
currently assigned to a given user. For each page
within the system, you can view a user’s create, read,
update, and delete privileges. You can filter this
report by user, application, and page type.
Application Owners Lists the users and groups who have been assigned
ownership rights over individual applications. You
can filter the list by application, questionnaire, and
owner.
Failed Login Attempts Lists all failed logon attempts within the past twenty-
four hours.
Locked Accounts Lists all user accounts that are currently locked. The
report also includes the time and date that each
account was locked.
Members by Group Lists users by the group to which the users belong.
You can filter the list by group.
Chapter 6: Reports 61
RSA Archer GRC Platform Access Control
Report Description
Security Events Lists events related to access control and global report
permissions that may be of interest to administrators
monitoring the security of the system. You can filter
the report by event type or by date range.
If the reports exceeds 10,000 records, a warning
dialog box is displayed. Do one of the following:
l To modify the search parameters, click OK.
l To include all records in a .csv file, click
Download the entire report data in CSV.
Security Parameter Properties Lists the properties of all security parameters that have
been defined within the system. A security parameter
specifies rules for password creation, password change
enforcement, account-lockout duration, and session
time-out behavior.
Subform Owners Lists the users and groups who have been assigned
ownership rights to individual sub-forms. You can
filter the list by sub-form.
User Inactivity Log Lists the users whose accounts have remained inactive
for a specific amount of time. You can filter the report
by inactive date and last accessed date range.
62 Chapter 6: Reports
RSA Archer GRC Platform 5.4
API Resources
June 2013
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm.
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and EMC are either registered trademarks or trademarks of EMC
Corporation ("EMC") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This
software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform API Resources
Contents
Preface 5
About this Guide 5
Product Documentation 6
Support and Service 6
Chapter 1: API Sources 9
Download a Web Services Description Language File 9
Generate API Code 10
3
RSA Archer GRC Platform API Resources
Preface
The API Integration Manager in the Integration feature offers links to download
Web Services Description Language (WSDL) files and to the Web Services API
code generator to help you more efficiently format your code to integrate
applications with services. From the API Integration page, you can also download
the Web Services API Reference Guide and connect to the Web API Development
discussion forum via the Archer Community.
For more information on the RSA Archer Web Services API, see the RSA Archer
Web Services API Reference Guide, which you can access from the RSA Archer
Community. This guide documents each available web service and provides XML
formatting guidelines and samples. If you do not have access to the RSA Archer
Community site, but want to obtain this guide, contact the support team at
[email protected].
You can perform the following tasks using the API Integration Manager:
l Download a Web Services Description Language File
l Use the Web Services API Code Generator
Preface 5
RSA Archer GRC Platform API Resources
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
6 Preface
RSA Archer GRC Platform API Resources
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 7
RSA Archer GRC Platform API Resources
Procedure
1. Navigate to the Integration pages:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration.
A menu of Integration pages is displayed.
2. Click Obtain API Resources.
The API Integration Manager page is displayed.
3. Click Download WSDL Files.
4. Click the link for the class whose code you need for your project.
The WSDL file opens.
5. Copy the entire block of code and paste it into your project.
For instructions on generating API code, see Generate API Code.
You can download this source code to a .csv file. You then can copy the identifiers
that you need and paste them into a Visual Studio project.
For more information on the RSA Archer Web Services API, see the RSA Archer
Web Services API Reference Guide on the RSA Archer Community site. This guide
documents each available web service and provides XML formatting guidelines and
samples. If you do not have access to the RSA Archer Community site, but want to
obtain this guide, contact the support team at [email protected].
Procedure
1. Navigate to the Integration pages:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration.
A menu of Integration pages is displayed.
2. Click Obtain API Resources.
The API Integration Manager page is displayed.
3. Click Generate API Code.
4. From the Application list, select the application for which you want to generate
the source code.
A file that contains the source code is generated.
5. Click Download Source File.
The File Download dialog box opens.
6. Click Save, browse to where the source file should be saved and click Save
again.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Appearance
Contents
Preface 5
About this Guide 5
Product Documentation 5
Support and Service 6
Chapter 1: Appearance 7
Managing Appearance 7
Select a Theme 7
Select a System Header 8
Change the Name of the System 9
Chapter 2: Themes 11
Managing Themes 11
Alias Names 12
Add a Theme 12
Change the General Information of a Theme 13
Select Theme Styles 14
Select Page Effects 15
Format the System Text 16
Create Hover Effects for Links 17
Select Button Colors 18
Customize the System Tabs 19
Delete a Theme 20
Hover Effects Properties 21
Application Header Hover 21
Navigation Menu Hover 22
Workspace Text Hover 22
Hyperlink Text Hover 23
Page Effects Properties 23
Application Colors 24
Navigation Colors 25
Workspace Colors 26
Page Colors 26
Toolbar Background Colors 27
Grid Display Colors 28
Menu Colors 29
System Tab Properties 30
Page Tab Style 30
Workspace Tab Style 30
System Text Properties 31
Application Header Text 31
Navigation Menu Text 32
Workspace Text 33
Page Text 33
Hyperlink Text 34
3
RSA Archer GRC Platform Appearance
Preface
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
Preface 5
RSA Archer GRC Platform Appearance
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
6 Preface
RSA Archer GRC Platform Appearance
Chapter 1: Appearance
Managing Appearance
The Manage Appearance page enables you to quickly deploy a consistent look and
feel across the entire user interface by configuring the following appearance
components:
l Theme. A set of graphical properties that defines the look and feel of the user
interface. You can choose from professionally designed system themes or
custom themes that you create.
l System header. The area of the top frame of the user interface in which you can
display graphics, such as your company logo. You can also choose the shape of
the menu strip in the top frame.
Note: To change the background of the header, see Select Page Effects.
l System name. The name to display in the browser, as the title of the system tab
and in the browser title bar.
The Manage Appearance page also provides preview fields that show how your
selections will be displayed.
To customize specific elements of the user interface, see Managing Themes.
You can perform the following tasks on the Manage Appearance page:
l Select a Theme
l Select a System Header
l Change the Name of the System
Select a Theme
You can quickly change the look and feel of the Platform by selecting and saving a
different theme. You can select a system theme, or you can select a theme that you
created through the Manage Themes page.
Note: When you click Save or Apply, the Platform immediately updates the
appearance of your system. To avoid impacts to the user experience of your
organization, best practices recommend that you update appearance settings during
off hours.
Chapter 1: Appearance 7
RSA Archer GRC Platform Appearance
Procedure
1. Navigate to the Manage Appearance page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Appearance.
Next Steps
l (Optional) Customize the system header. For instructions, see Select a System
Header.
l (Optional) Change the name of your system. For instructions, see Change the
Name of the System.
Note: When you click Save or Apply, the Platform immediately updates the
appearance of your system. To avoid impacts to the user experience of your
organization, best practices recommend that you update appearance settings during
off hours.
8 Chapter 1: Appearance
RSA Archer GRC Platform Appearance
Procedure
1. Navigate to the Manage Appearance page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Appearance.
2. To change the shape of the menu strip, from the Template list, select the
template that you want to use.
3. To change a graphic in the header, in the Logo field, do the following:
a. Click Edit for the graphic that you want to modify.
b. Select an image from the Graphic Selector dialog box or click Add New to
upload an image.
c. Click OK.
In the System Header section, the Preview field shows how your selections
will be displayed.
4. When you are ready to apply changes to the system header, click Apply.
Next Steps
l (Optional) Change the appearance theme. For instructions, see Select a Theme.
l (Optional) Set or change the system name. For instructions, see Change the
Name of the System.
Note: When you click Save or Apply, the Platform immediately updates the
appearance of your system. To avoid impacts to the user experience of your
organization, best practices recommend that you update appearance settings during
off hours.
Procedure
1. Navigate to the Manage Appearance page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Appearance.
Chapter 1: Appearance 9
RSA Archer GRC Platform Appearance
2. In the System Name field, enter the name that you want to use for the system.
3. Click Save.
4. When you are ready to apply the new system name, click Apply.
Next Steps
l (Optional) Change the appearance theme. For instructions, see Select a Theme.
l (Optional) Customize the system header. For instructions, see Select a System
Header.
10 Chapter 1: Appearance
RSA Archer GRC Platform Appearance
Chapter 2: Themes
Managing Themes
The Manage Themes page enables you to create, edit, and delete themes. A theme
is a set of color schemes, text styles, and graphical properties that consistently
controls the appearance of the Platform from application to application and from
page to page:
l System theme. A professionally designed theme that is provided with the
Platform.
You cannot edit or delete a system theme. To modify the properties of a system
theme, you must first copy the theme and then customize the copied version.
l Custom theme. A theme that you can create, edit, and delete.
When you create a theme by copying an existing theme, the default theme
properties are based on the original theme. When you create a new theme from
scratch, the default theme properties are based on the default theme of the
Platform.
The Manage Themes page also provides preview fields that show how your theme
selections will be displayed.
You can perform the following tasks on the Manage Themes page:
l Add a Theme
l Change the General Information of a Theme
l Select Theme Styles
l Select Page Effects
l Format the System Text
l Create Hover Effects for Links
l Select Button Colors
l Customize the System Tabs
l Delete a Theme
Chapter 2: Themes 11
RSA Archer GRC Platform Appearance
Alias Names
Numerous operations in the Platform require references to objects—everything
from solutions, applications, and fields to individual values list values—to specify
the target for a particular activity. One example is mail merge, in which you must
create templates with unambiguous references to individual fields in an application.
Another example is the process of mapping external data to fields in the Data Feed
Manager. To provide a constant name that is also human readable, all Platform
objects, such as workspaces, applications, fields, and notification templates, support
an alias.
An alias is a short name for a unique object in the system that is human readable,
but also can be used in code or as a reference in configuration processes. All alias
names must contain only alphanumeric characters, beginning with a letter and
containing no spaces. The maximum length is 40 characters.
An alias name must be unique in the entity type. The following are additional points
of consideration:
l Field aliases must be unique in the level.
l Values List Value aliases must be unique in a Values List.
l Level, Data Driven Event, Report, and Workflow Stage aliases must be unique
in an application.
You can edit the alias name for non-system provided entities. Alias name for
system-provided entities are read only.
CAUTION: Alias name are used in configuration processes, system processes, and
web service API integrations. Modification of the alias name can cause these
functions to fail.
Add a Theme
You can fully customize the system's appearance by creating your own theme.
Procedure
1. Navigate to the Manage Themes page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Themes.
12 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Note: To use the new theme in your system, see Select a Theme.
Next Steps
To complete the configuration of the new theme's settings, see the following:
l Select Theme Styles
l Select Page Effects
l Format the System Text
l Create Hover Effects for Links
l Select Button Colors
l Customize the System Tabs
Procedure
1. Select the theme that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Themes.
Chapter 2: Themes 13
RSA Archer GRC Platform Appearance
Note: The Save, Apply, and Delete controls are unavailable for system themes.
To modify the properties of a system theme, you must first copy the theme and
then edit the copied version. See Add a Theme.
Procedure
1. Select the theme that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Themes.
c. Click the theme.
Note: The Save, Apply, and Delete controls are unavailable for system themes.
To modify the properties of a system theme, you must first copy the theme and
then edit the copied version. See Add a Theme.
14 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Procedure
1. Select the theme that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Themes.
c. Click the theme.
Note: The Save, Apply, and Delete controls are unavailable for system themes.
To modify the properties of a system theme, you must first copy the theme and
then edit the copied version. See Add a Theme.
Chapter 2: Themes 15
RSA Archer GRC Platform Appearance
Procedure
1. Select the theme that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Themes.
c. Click the theme.
Note: The Save, Apply, and Delete controls are unavailable for system themes.
To modify the properties of a system theme, you must first copy the theme and
then edit the copied version. See Add a Theme.
16 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Property Action
Note: Because the fonts in the Font list exist on the computers of all
users, text is correctly displayed for every user.
Note: Depending on where the text is displayed in the system, the range
of sizes varies.
Font
Do one of the following:
Color
4. Click Apply.
Procedure
1. Select the theme that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Themes.
c. Click the theme.
Chapter 2: Themes 17
RSA Archer GRC Platform Appearance
Note: The Save, Apply, and Delete controls are unavailable for system themes.
To modify the properties of a system theme, you must first copy the theme and
then edit the copied version. See Add a Theme.
Property Action
Note: Because the fonts in the Font list exist on the computers of
all users, text is correctly displayed for every user.
Font or
Do one of the following:
Background
Color l To choose a color from the Color Selector dialog box, click
.
l Enter the HTML code for the color, for example, #00386A.
Font Style Select one or more of Bold, Italic, and Underline, if available.
4. Click Apply.
Note: To select the style for basic buttons, see Select Theme Styles.
18 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Procedure
1. Select the theme that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Themes.
c. Click the theme.
Note: The Save, Apply, and Delete controls are unavailable for system themes.
To modify the properties of a system theme, you must first copy the theme and
then edit the copied version. See Add a Theme.
Procedure
1. Select the theme that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Themes.
c. Click the theme.
Chapter 2: Themes 19
RSA Archer GRC Platform Appearance
Note: The Save, Apply, and Delete controls are unavailable for system themes.
To modify the properties of a system theme, you must first copy the theme and
then edit the copied version. See Add a Theme.
Delete a Theme
If you no longer need a theme, you can delete the theme from the system. You
cannot delete system themes, which are provided with the system.
Procedure
1. Navigate to the Manage Themes page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Appearance > Manage Themes.
2. Locate the theme that you want to delete.
3. In the Actions column, click for the theme that you want to delete.
4. When prompted to confirm the deletion, click OK.
20 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Example of Page or
Field Description
Frame Part
Chapter 2: Themes 21
RSA Archer GRC Platform Appearance
Example of Page or
Field Description
Frame Part
Menu Links Controls the hover text for the links to the
Advanced Search page, reports, data
import, and so on, available within the
Navigation Menu.
Example of Page or
Field Description
Frame Part
22 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Example of Page or
Field Description
Frame Part
Chapter 2: Themes 23
RSA Archer GRC Platform Appearance
Application Colors
The following table describes the fields in the Application Colors section.
Example of Page or
Field Description
Frame Part
24 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Navigation Colors
The following table describes the fields in the Navigation Colors section.
Example of Page or
Field Description
Frame Part
Chapter 2: Themes 25
RSA Archer GRC Platform Appearance
Workspace Colors
The following table describes the fields in the Workspace Colors section.
Example of Page or
Field Description
Frame Part
Page Colors
The following table describes the fields in the Page Colors section.
Example of Page or
Field Description
Frame Part
26 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Example of Page or
Field Description
Frame Part
Example of Page or
Field Description
Frame Part
Chapter 2: Themes 27
RSA Archer GRC Platform Appearance
Example of Page or
Field Description
Frame Part
28 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Example of Page or
Field Description
Frame Part
Menu Colors
The following table describes the fields in the Menu Colors section.
Example of Page or
Field Description
Frame Part
Chapter 2: Themes 29
RSA Archer GRC Platform Appearance
Field Description
Non Selected Color Determines the background color of a non-selected page tab.
Hover Color Determines the background color of a page tab when a user
hovers the mouse pointer over the tab.
Non Selected Font Determines the font color of a non-selected page tab.
Hover Font Determines the font color of a page tab when a user hovers the
mouse pointer over the tab.
Field Description
Non Selected Font Determines the font color of a non-selected workspace tab.
Hover Font Determines the font color of a workspace tab when a user
hovers the mouse pointer over the tab.
30 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Example of Page or
Field Description
Frame Part
Chapter 2: Themes 31
RSA Archer GRC Platform Appearance
32 Chapter 2: Themes
RSA Archer GRC Platform Appearance
Workspace Text
The following table describes the fields in the Workspace Text section.
Page Text
The following table describes the fields in the Page Text section.
Example of Page or
Field Description
Frame Part
Chapter 2: Themes 33
RSA Archer GRC Platform Appearance
Example of Page or
Field Description
Frame Part
Hyperlink Text
The following table describes the fields in the Hyperlink Text section.
Example of Page or
Field Description
Frame Part
34 Chapter 2: Themes
RSA Archer GRC Platform 5.4
Applications
June 2013
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm.
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and EMC are either registered trademarks or trademarks of EMC
Corporation ("EMC") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This
software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Applications
Contents
Preface 7
About this Guide 7
Product Documentation 8
Support and Service 9
Chapter 1: Applications 11
Create an Application 11
Select a Solution for an Application 12
Change the Status of an Application 13
Application Status Options 13
Enable or Disable Task Management for an Application 14
Enable or Disable Notifications for an Application 15
Enable Spell Check in Application 16
Enable Direct Edit Mode 17
Select a Default Format for Search Results 17
Enable Data Levels for an Application 18
Manage Data Levels for an Application 20
Set the Design Language for an Application 21
Attach Documentation to an Application 21
Remove an Application from a Solution 22
Change the Display of an Application in the Navigation Menu 22
Assign Application Owners 24
Assign Global Report Creation Rights for an Application 26
Delete All Content from an Application 27
Delete an Application 28
Chapter 2: Fields 29
Managing Fields 29
Key Fields 29
Create a Field 30
Update the General Properties of a Field 30
Field Name Guidelines 31
Configure the Display and Functionality of a Field 32
Available Field Types 33
Access History Field 34
Access History Field Options 34
Attachment Field 35
Attachment Field Options 36
Cross-Application Status Tracking Field 38
Cross-Application Status Tracking Field Options 39
Configure the Display and Functionality of a Cross-Application Status
Tracking Field 40
Cross-Reference Field 42
Cross-Reference Field Options 50
Date Field 55
Date Field Options 56
3
RSA Archer GRC Platform Applications
Discussion Field 59
Discussion Field Options 60
External Links Field 62
External Links Field Options 63
First Published Date Field 64
First Published Date Field Options 64
History Log Field 65
History Log Field Options 66
Image Field 68
Image Field Options 69
IP Address Field 72
IP Address Field Options 72
Last Updated Date Field 75
Last Updated Date Field Options 75
Matrix Field 76
Matrix Field Options 77
Configure the Display and Functionality of a Matrix Field 78
Multiple Reference Display Control Field 80
Multiple Reference Display Control Field Options 81
Numeric Field 84
Numeric Field Options 85
Questionnaire Reference Field 90
Questionnaire Reference Field Options 90
Record Permissions Field 91
Configure Manual Selection for a Record Permissions Field 95
Configure Inherited Permissions for a Record Permissions Field 98
Configure Automatic Selection for a Record Permissions Field 99
Record Permissions Field Options 102
Record Status Field 104
Record Status Field Options 104
Related Records Field 105
Related Records Field Options 113
Sub-Form Field 118
Sub-Form Field Options 119
Text Field 121
Text Field Options 122
Tracking ID Field 126
Tracking ID Field Options 128
User/Groups List Field 129
User/Groups List Field Options 131
Values List Field 135
Field-Specific Values List Field Options 137
Global Values List Field Options 141
Voting Field 144
Voting Field Options 145
Create Field-Level Help 146
Assign Access Rights to a Field 149
Define Numeric Ranges for a Numeric Field 150
Convert a User/Groups List Field to a Record Permissions Field 151
Convert a Field-Specific Values List to a Global Values List 152
Define Field-Specific Values for a Matrix Field 153
4
RSA Archer GRC Platform Applications
5
RSA Archer GRC Platform Applications
Preface
Once you have made these decisions, you can frame the basic structure of an
application, add the appropriate fields, configure the display of the application in the
Navigation Menu, and create sub-forms, among many other application options.
You can perform the following tasks to manage applications:
l Create an Application
l Change the Status of an Application
l Configure Data Levels within an Application
l Enable or Disable Task Management for an Application
l Enable or Disable Notifications for an Application
l Enable Spell Check in Application
l Enable Direct Edit Mode
l Select a Default Format for Search Results
l Select a Solution for an Application
l Attach Documentation to an Application
l Change the Display of an Application in the Navigation Menu
Preface 7
RSA Archer GRC Platform Applications
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
8 Preface
RSA Archer GRC Platform Applications
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 9
RSA Archer GRC Platform Applications
Chapter 1: Applications
Create an Application
You can create a new, original application or create an application from a copy. If
you choose to create an original application, you must define all of the application's
structural components and create its fields. If you select to copy an application,
your new application contains all of the fields and structural components of the
copied application, but it does not include any attachment files or content records.
You can modify the properties of the copied application to address a new business
need.
Once you create an application, you can define fields for the new application,
configure the application’s layout and Navigation Menu properties, import data into
the application and more using the Manage Applications page in the Application
Builder.
Procedure
1. Navigate to the Manage Applications page:
a. Click the Administration workspace.
b. On the Navigation Menu, select Application Builder > Manage
Applications.
2. In the Applications toolbar, click Add New.
3. In the New Application dialog box, do one of the following:
l To use the settings of an existing application as a starting point for your new
solution, select Copy an Existing Application and select the existing
solution from the Applications list.
l To select new settings for a application, select Create a new Application
from scratch.
4. Click OK.
The New Application dialog box displays General Information options.
5. In the Name field, enter a name for the application.
6. In the Solutions field, click , assign the application to one or more solutions
and click OK.
7. Click OK.
Chapter 1: Applications 11
RSA Archer GRC Platform Applications
The Manage Application page displays for the new application. Using the tabs
and fields on this page, you can provide additional information necessary for the
application.
Next Steps
Select a Solution for an Application
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Next Steps
Change the Status of an Application
12 Chapter 1: Applications
RSA Archer GRC Platform Applications
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
2. On the General tab of the Manage Applications page, from the Status field,
select the status for the application. See Application Status Options.
3. Click Apply.
Next Steps
Enable or Disable Task Management for an Application
Chapter 1: Applications 13
RSA Archer GRC Platform Applications
Important: Once your organization has reached its application limit as specified by
your license, you are unable to create additional Production applications. You can
still create new Development applications.
This procedure explains how to enable or disable task management capabilities for
an application.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
14 Chapter 1: Applications
RSA Archer GRC Platform Applications
Note: If you cannot select the application, you do not have access rights to
the application.
2. Locate the Options section on the General tab of the Manage Applications
page.
3. To enable task management capabilities for an application, select the checkbox
in the Task Management field.
Note: If you clear the checkbox and disable task management capabilities for an
application, Task Management records are no longer viewable within content
records of the associated application. However, all Task Management records
still are stored within the Task Management application. If task management
capabilities are subsequently reactivated, all existing Task Management records
are displayed with their associated content records.
4. (Optional) To rename the default settings for the Related Records fields, enter
the names in the Task Field Name field and in the History Grid Label field.
5. Click Apply.
Next Steps
Enable or Disable Notifications for an Application
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
Chapter 1: Applications 15
RSA Archer GRC Platform Applications
Note: If you cannot select the application, you do not have access rights to
the application.
2. On the General tab of the Manage Applications page, in the Options section,
do one of the following:
l To enable notifications for an application, select the checkbox in the
Notifications field.
When you enable notifications for an application, you allow users to receive
notifications when content in the application is published or updated.
l To disable notifications for an application, clear the checkbox in the
Notifications field.
When you disable notifications for an application, you restrict application
users from receiving email notifications related to application content.
3. Click Apply.
Next Steps
Enable Spell Check
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
2. On the General tab, in the Options section, select the checkbox in the Spell
Check field.
3. Click Apply.
16 Chapter 1: Applications
RSA Archer GRC Platform Applications
Next Step
Enable Direct Edit Mode
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
2. On the General tab, in the Options section, select the checkbox in the Direct
to Edit field.
3. Click Apply.
Next Step
Select a Default Format for Search Results
Chapter 1: Applications 17
RSA Archer GRC Platform Applications
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
2. On the General tab, in the Options section, in the Search Results field, select
the desired format for the application's default search.
3. Click Apply.
Next Steps
Enable Data Levels for an Application
Note: Using a leveled application makes the most sense when records in a child
data level can relate to one and only one parent-level record. In the Policies
application example above, you can see that record “8.3.3 Password Expiration” in
the Section data level can only relate back to record “8.3 Authentication” in the
Area level. It would not make sense to relate record “8.3.3” in the Section level to
record “5.5 Project Management” in the Area level.
If you are considering the use of a leveled application but you foresee child-level
records relating back to more than one parent-level record, you might consider
creating two applications instead and linking those applications with a Cross-
Reference field.
18 Chapter 1: Applications
RSA Archer GRC Platform Applications
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
2. On the General tab, in the Options section, in the Structure field, select
Leveled (Outline).
The Levels section displays.
3. To add new levels to the application, click Add New.
A single application can have many levels, and each data level has its own
distinct fields, as shown in the following figure.
4. Click Apply.
Note: If you do not add any new levels at this time and the application contains only
one level, when you save the application, the setting in the Structure field reverts to
Standard.
Next Steps
Manage Data Levels for an Application
Chapter 1: Applications 19
RSA Archer GRC Platform Applications
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Note: If you do not see the Levels section, in the Options section, verify that the
Structure field is set to Leveled (Outline).
Next Steps
Attach Documentation to an Application
20 Chapter 1: Applications
RSA Archer GRC Platform Applications
Procedure
1. Click Administration > Application Builder > Manage Applications.
2. Select an application.
3. In the General tab > Options section, select the design language in the
Language field.
4. Click Apply.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Chapter 1: Applications 21
RSA Archer GRC Platform Applications
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
By [field name] menu items serve as quick filters that enable you to search for
records that include a specific field value. The following field types enable quick
filtering from the Navigation Menu:
l Cross-Reference
l Matrix
22 Chapter 1: Applications
RSA Archer GRC Platform Applications
l Record Permissions
l Record Status
l User/Groups List
l Values List
By [data level] menu items are available for leveled applications and enable you to
select records that reside within a specific data level.
In addition to configuring the display of menu items in the Navigation Menu, you
can define default search settings for searches executed in the application from the
Navigation Menu, including the fields that are displayed and the sort order of those
fields.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Chapter 1: Applications 23
RSA Archer GRC Platform Applications
l Fields to Display. For the Display All and By [field name or By [data
level] menu items, select the fields to display in the search results when a
user clicks one of these items to execute a search. From the Available list,
select the fields that you want to include in the search results. Use the
below the Selected list to arrange the fields in the display order. To remove a
field from the search results for a menu item, click to the right of the field
name in the Selected list.
l Sorting. For the Display All and By [field name or data level] menu items,
specify the sort order for search results that are executed when a user clicks
the menu item.From the Field drop-down menu, select the field by which
search results should initially be sorted (Ascending or Descending). To add
new fields to sort by, click Add New and select additional fields.
6. Click OK.
7. Click Save.
If you have been assigned as an owner for one or more applications, you can open
those applications for editing from the Manage Applications page. When you access
this page, you see all of the applications that administrators in your organization
have created, but you can only edit those applications for which you have ownership
rights. If no users have been assigned ownership for an application, only users who
have been granted the System Administrator access role can open the application
for editing.
24 Chapter 1: Applications
RSA Archer GRC Platform Applications
Note: If you create a new application, you are automatically granted ownership
rights to it. However, your rights can be revoked by any other user who is
subsequently granted ownership of the application.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Chapter 1: Applications 25
RSA Archer GRC Platform Applications
Note: By default, application owners have global report creation rights for their
applications.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
26 Chapter 1: Applications
RSA Archer GRC Platform Applications
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
2. On the General tab of the Manage Application page, ensure that Retired is
selected in the Status field. If it is not selected, select Retired and click in
the page toolbar to save your changes.
3. Click the Administration tab.
4. In the Delete Application Content control group, click Delete Content. If this
button is unavailable, the application is not retired.
Chapter 1: Applications 27
RSA Archer GRC Platform Applications
5. In the Warning dialog box, select the checkbox indicating that you understand
the implications of performing this operation.
6. Click OK.
Delete an Application
If you have delete permissions to the Manage Applications page, you can delete
applications for which you have ownership rights.
Procedure
1. Navigate to the Manage Applications page:
a. Click the Administration workspace.
b. On the Navigation Menu, select Application Builder > Manage
Applications.
2. Select the row of the application that you want to delete.
The row expands to display a description and associated solutions.
28 Chapter 1: Applications
RSA Archer GRC Platform Applications
Chapter 2: Fields
Managing Fields
A field is a data collection device that is displayed as an interface control for end
users as they create and update records within an application. Each field has a
configurable set of properties that govern how the field is displayed in the
application and how (or whether) the user is to interact with it.
The Platform provides a wide variety of field types to allow you to collect and
shape information according to your business requirements. From the Fields tab on
the Manage Applications page, you can add, edit, configure and arrange data
collection fields within applications.
You can perform the following tasks to manage fields:
l Create a Field
l Update the General Properties of a Field
l Configure the Display and Functionality of a Field
l Create Field-Level Help
l Assign Access Rights to a Field
l Delete a Field
Key Fields
All applications must contain a key field, and multi-level applications must contain
a key field at each data level. The key field setting is exclusive; only one field
within each single-level application or within each level of a multi-level application
can serve as the key field.
On the Advanced Search page in the Fields to Display section and on the Layout
tab of the Manage Applications page, the Key Field icon indicates the key field.
The key field is displayed in search results as a hyperlink within each record. By
clicking the hyperlink, users can click the key field to view the details of a record.
By default, the Tracking ID field is set as the key field. You can select this setting
for another field. The following field types can serve as the key field:
l Text
l Numeric
l Date
Chapter 2: Fields 29
RSA Archer GRC Platform Applications
l IP Address
l Tracking ID
Create a Field
You can create fields from both the Fields tab and the Layout tab on the Manage
Applications page.
Note: To protect data integrity, the application prohibits field type changes, for
example, changing a Date field to a Text field, once a field has been created.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Next Steps
Update the General Properties of a Field
30 Chapter 2: Fields
RSA Archer GRC Platform Applications
Procedure
1. Select the application containing the field that you want to update:
a. Click the Administration workspace.
b. On the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
2. Click the Fields tab.
3. In the Field column, click the field that you want to configure.
4. On the General tab, complete the General Information section:
a. In the Name field, enter a name for the field. See Field Name Guidelines.
b. In the Description field, enter a brief description of the field.
This description is for internal use only and is not visible to the end user.
c. In the Status field, select whether the field is Active or Inactive.
Active fields display when users add, edit, and view records in the application.
They can be referenced in advanced searches, calculated field formulas, and
data driven events. Inactive fields are not displayed in any application record
and cannot be referenced by other options in the Platform.
5. Click Apply.
Next Steps
Configure the Display and Functionality of a Field
Chapter 2: Fields 31
RSA Archer GRC Platform Applications
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Attachment Matrix
Cross-Reference Numeric
32 Chapter 2: Fields
RSA Archer GRC Platform Applications
IP Address Voting
6. Click Apply.
Next Steps
Create Field-Level Help
Note: Field types may or may not be available depending on the type of application
into which you are adding fields.
l Attachment l Numeric
l External Links l Text
l Date l User/Groups List
l Image l Values List
l IP Address l Voting
Note: System fields do not allow data input from users. They are automatically
populated by the system when a record is saved.
Chapter 2: Fields 33
RSA Archer GRC Platform Applications
The Access History field type and the Record Views – Detail report allow you to
better understand how users are interacting with content within Archer. By using
the Access History field in appropriate records, you have visibility into individual
user content activities to ensure that the sensitive information you handle within the
Archer environment is secure and managed properly. The Record Views – Detail
report supports internal audit requirements and provides easy access to reporting
related to end user access history.
For instructions on configuring the Access History field type, see Configure the
Display and Functionality of a Field and Access History Field Options.
Option Action
Options Section
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
34 Chapter 2: Fields
RSA Archer GRC Platform Applications
Attachment Field
The Attachment field type allows users to upload one or more files and attach them
to a record. The Attachment field accepts any type of file, as long as its size does
not exceed the limitations set for the field.
For instructions on configuring the Attachment field type, see Configure the Display
and Functionality of a Field and Attachment Field Options.
When configuring an Attachment field, you can specify the total number of files
that can be uploaded (attached) to the field, as well as the file size (between 1 and
100 MB) permitted for each file. You can also enable end users to keyword search
into attached documents. The following file types are supported for document
searching:
l Microsoft Word
l Microsoft Excel
l PDF
l Text
l .CSV
An Attachment field can be expressed to users in one of two display controls: Grid
or Single Column. In a Grid control, the attachment information displays as a
resizable grid control that displays the name, size and file type for each file. The
Attachment field can also display as a single column with links to the files. When
you select the Grid option, users with appropriate access can view the Download
History report. This report provides a summary of the download history of a
document including the user, email address, and download date. Users can upload
files by clicking Add New.
Record Save Validation
The Validate Always option on the Options tab of the Manage Field page causes
the field to validate when any field has changed when the user saves a record. If
the Validate Always option is not selected, the field is validated only when the
value in that field has changed.
Field Validation Configuration
The minimum and maximum values are now validated for relationships between
field types.
The following validation rules apply to this field type:
l Required
l Minimum Selections
l Maximum Selection
l Maximum File Size
Chapter 2: Fields 35
RSA Archer GRC Platform Applications
Option Action
Grid Select this option to display a grid containing the name of the
file, the size of the file, the file type, and the upload date for each
attachment added to the record.
Single Column Select this option to display the name of the attachment as a
single column. Users can click the name of the file to access the
file.
Options Section
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required
fields are indicated with an icon (selected in the Appearance
feature) to alert users that they must supply a value. If this
checkbox is not selected, users can skip this field when adding or
editing a record in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Search Results Select this option to make this field available for display in
search results. If this checkbox is not selected, you cannot include
this field in search results or reference the values in the field in
search filters.
36 Chapter 2: Fields
RSA Archer GRC Platform Applications
Option Action
Search Default Field Select this option to include the field by default in search results
for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Keyword Searching Select this option to allow users to keyword search in documents
attached to the field. File types supported for document searching
include Microsoft Word, Microsoft Excel, PDF, Text, and .CSV. If
a user does not have access to the field but the field is configured
to allow document searching, the field is still searched when the
user executes a keyword search in the application. However, the
field is not displayed in the search results.
Advanced Field Select this option to add descriptive text and alter the standard
Display display of the field. After selecting this checkbox, specify the
display text and layout for the field in the Advanced Field
Display Options section.
Validate Always Select this option to validate the field when any field has
changed when saving a record. If the Validate Always option is
not selected, the field is validated only when the value in that
field has changed.
Configuration Section
Chapter 2: Fields 37
RSA Archer GRC Platform Applications
Option Action
Maximum Size In the Maximum Size field, select the maximum file size, up to
100 MB, that you want to allow for each file uploaded to the
Attachment field. This setting does not restrict the total size of all
files uploaded to the field.
Display Fields Select which fields of information you want to display along with
your attachment file.
Advanced Field Display Options Section – If you selected the Advanced Field Display
option, you must enter supporting information and select a display option.
Display Text Enter your supporting text in this field. For example, you can
enter a specific question related to values users enter in the field,
such as "When was the date of your last security audit?" This text
is always displayed, even if you select to hide the field name.
Layout Select whether to display or hide the field name and whether to
display the values horizontally or vertically. See the examples
provided in the Preview field.
Note: The application that contains the task records (such as security controls or
patches) is considered the child application, and the application that contains the
object records (such as assets or vendors) that you want to track tasks against is the
parent application.
38 Chapter 2: Fields
RSA Archer GRC Platform Applications
To build a status tracking relationship between two applications, you add a Cross-
Application Status Tracking field to the parent application from Application
Builder. During the field configuration process, select the child application with
which the linkage should occur, and then select a global values list containing status
values to populate the Cross-Application Status Tracking field. For example, you
could select a global values list with the values Accept Risk, Implemented, Time
Extension and Not Applicable.
Finally, you determine the method to use to link records from the child application
to those in the parent application. Child-application records can be linked to parent-
application records by selecting a field in each application that is populated with an
identical global values list and/or by creating a field-value rule with one or more
conditions that filters out records in the child application. You can also select a
cross-reference field referencing the same application.
You can use the following two methods for linking child-application records to
parent-application records:
l Relate Content by Field. If you have a values list field in your parent
application, for example, Asset Management, that denotes the Asset Type, and
you have the same field in your child application, for example, Security Controls,
you can link the two fields so controls are only linked to an asset if the asset
shares the same value in the Asset Type field.
Note: RSA Archer requires only that there is a single common value between the
fields.
l Relate Content by Rule. If you relate content by a rule, all content records in
the child application that satisfy that rule are linked to all records in the parent
application. For example, you can create a rule that links all records in the child
application with the value "High" in the Priority field to records in the parent
application.
Chapter 2: Fields 39
RSA Archer GRC Platform Applications
For more information on the Cross-Application Status Tracking field, see Cross-
Application Status Tracking Field.
The following table lists the options for the Cross-Application Status Tracking field.
Options Section
Search Results Select this option to make this field available for display in
search results. If this checkbox is not selected, you cannot
include this field in search results or reference the values in
the field in search filters.
Search Default Field Select this option to include the field by default in search
results for the application. This option does not prevent
users from removing the field from the Search Results page.
Users can click Modify in the toolbar and remove the field
from the Fields to Display section of the Advanced Search
page for the application.
Quick Status Change Select this option to display statuses in a dropdown menu
on the Status Tracking Results page to enable immediate
status changes.
Configuration Section
Relate Content By Select this option to relate the two applications based on a
Field field in both applications.
Relate Content By Rule Select this option to specify a rule which determines the
records to link from the outside application.
Application Field and If you selected the Relate Content By Field option, you can
Related Field select the application field and related field for which to
relate the two applications.
Rule If you selected the Relate Content By Rule option, you can
add or remove search criteria in the table to specify a rule
that determines which records to link from the outside
application.
40 Chapter 2: Fields
RSA Archer GRC Platform Applications
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Important: If you change the associated application for a CAST field, but
records with values for the CAST field were already saved in the previously
associated application, those values are no longer displayed in the previously
associated application because the CAST field is removed. Therefore,
RSA Archer recommends that you do not change the associated application for
a CAST field if records in the current related application have already been
saved.
5. In the Status List field, click Select and select the values list to populate the
CAST field.
The values list that you select should contain status values that users can select
from when indicating the current completion status for a task such as
Completed, Not Started, and Time Extension Granted.
Chapter 2: Fields 41
RSA Archer GRC Platform Applications
Important: If any records were saved using the current values list for the CAST
field, changing the status of the values list is not recommended. If you change
the values list after records have already been saved with values from a
previous values list, the CAST values in those records are set to the default
value for the new values list. If no default value is configured for the new
values list, the CAST values in records saved with the previous values list is set
to No Value. In either case, you lose any status changes made to records saved
with the previous values list.
6. Click the Options tab to access controls for configuring the field's display and
functionality.
7. Select options. For detailed information on options, see Cross-Application Status
Tracking Field Options.
8. Click Apply.
Next Steps
Create Field-Level Help
Cross-Reference Field
The Cross-Reference field type allows you to create associations between records
in the same application (internal references) or records in two separate applications
(external references). For example, if you have a Cross-Reference field configured
to create internal references in a Trouble Tickets application, you could associate
one ticket to other related tickets. Or, if you have a Cross-Reference field within a
Violations application that is configured to create external references to an
Investigators application, you could select investigators for individual violation
records by selecting those investigators through the Cross-Reference field.
For instructions on configuring the Cross-Reference field type, see Configure the
Display and Functionality of a Field and Cross-Reference Field Options.
When you create a Cross-Reference field that forms an external relationship with
another application in the system, a Related Records field is automatically added to
the related application. Likewise, when you create an association between records
in the same application, a Related Records field is automatically created in the
application.
For external references, the Related Records field provides a mirror image of the
Cross-Reference field, meaning that, within an individual record in the related
application, you can see all records that have been cross-referenced to that record.
For example, if you have a Cross-Reference field within a Violations application
that is related to an Investigators application, users can select investigators for
individual violation records through the Cross-Reference field. Then, if users
access a record in the Investigators application, they can view all violation records
that have been cross-referenced to that particular investigator in the Related
Records field.
42 Chapter 2: Fields
RSA Archer GRC Platform Applications
For more information on the Related Records field type, see Related Records Field.
A Cross-Reference field can be expressed to users in either a Grid or Single
Column display control. In a Grid control, multiple fields from the selected records
are displayed in the field. These fields are displayed in a sortable table. In a Single
Column control, only the key field of selected records are displayed in the field.
When users select record references through a Cross-Reference field using a Grid
or Single Column display control, a Record Lookup page is displayed that enables
them to select records from a list or to keyword search for specific records in the
related application.
As an application owner, you can configure the fields that are displayed for users
on the Record Lookup page, and you can create filter criteria to limit the number of
records users can select from. You can also define the minimum and maximum
number of related records a user can select.
When you create a Cross-Reference field that references a leveled application, you
have the option to reference one level or all levels of that application. If you select
one level, the Display Fields, Filters, and Sorting controls contain only the fields
from the selected level.
See the following topics for additional information about Cross-Reference fields:
Record Save Validation
Field Validation Configuration - Cross-Reference Field
Field Type Validation Rules
Reference Field Validation
Record Save Validation
The Validate Always option on the Options tab of the Manage Field page causes
the field to validate when any field has changed when the user saves a record. If
the Validate Always option is not selected, the field is validated only when the
value in that field has changed.
Record save validation is available for the following field types:
Chapter 2: Fields 43
RSA Archer GRC Platform Applications
l Attachment l Numeric
l Image l Sub-Form
l IP Address l Text
l User/Group l Voting
List
l Values List
l Attachment l Numeric
l Image l Sub-Form
l IP Address l Text
l User/Group l Voting
List
l Values List
44 Chapter 2: Fields
RSA Archer GRC Platform Applications
When validating the three new rules for the related record, the system only
validates records that were added to or removed from the reference field of the
original relationship. For example, a user in Application A creates a Cross-
Reference field, and then removes related record B1 in Application B. The only
record that is validated is B1, because it changed.
Chapter 2: Fields 45
RSA Archer GRC Platform Applications
46 Chapter 2: Fields
RSA Archer GRC Platform Applications
Rule Description
Minimum This rule validates that the removed or added relationships do not
Selections (rule violate the Minimum Selections rule for the related record when both
for a reference of the following apply:
related field)
l The user attempts to save a record with a reference field change.
l A Minimum Selections rule is enabled for the reference field in
the related application.
Example
Maximum This rule validates that the removed or added relationships do not
Selections (rule violate the Maximum Selections rule for the related record when both
for a reference of the following apply:
related field)
l The user attempts to save a record with a reference field change.
l A Maximum Selections rule is enabled for the reference field in
the related application.
Example
Chapter 2: Fields 47
RSA Archer GRC Platform Applications
Rule Description
Required (rule This rule validates that the removed relationships do not violate the
for a reference- Required rule for the related record when both of the following
related field) apply:
l The user attempts to save a record with a reference field change.
l A Required rule is enabled for the reference field in the related
application.
Example
48 Chapter 2: Fields
RSA Archer GRC Platform Applications
Scenario A
Scenario The user enrolls Record A2 into a workflow and
creates Copy A2C.
Scenario B
Scenario The user removes Record B1 from the Cross-
Reference field A2C.
The user enrolls Record A3 into a workflow and
creates Copy A3C.
The user edits Copy A3C and adds Record B1 to
the Cross-Reference field.
Chapter 2: Fields 49
RSA Archer GRC Platform Applications
Scenario C
Scenario The user edits Copy A2C again and adds Record
B1 to the Cross-Reference field.
Options Action
Single Column Select this option to display the key field of the referenced
record in a single column format.
Options Section
Required Field Select this option to require users to supply a value for the
field when adding or editing a record in the application.
Required fields are indicated with an icon (selected in the
Appearance feature) to alert users that they must supply a
value. If this checkbox is not selected, users can skip this
field when adding or editing a record in the application.
50 Chapter 2: Fields
RSA Archer GRC Platform Applications
Options Action
Auditing Information Select this option to display auditing information next to the
field each time that its value is changed. The auditing
information includes only the name of the user who made
the change and the date and time of the change. If this
checkbox is not selected, auditing information is not
displayed with the field in the user interface.
Search Results Select this option to make this field available for display in
search results. If this checkbox is not selected, you cannot
include this field in search results or reference the values in
the field in search filters.
Search Default Field Select this option to include the field by default in search
results for the application. This option does not prevent
users from removing the field from the Search Results page.
Users can click Modify in the toolbar and remove the field
from the Fields to Display section of the Advanced Search
page for the application.
Add New If you selected the Grid display control, you can also select
Add New to allow users to add new records to the related
applications from a record in View mode. Users will not
have to open a record in Edit mode to create new related
records. If a user does not have rights to create records in the
related application, the link is not displayed for that user.
When a user creates a new related record from View mode,
that record will be selected in the Cross-Reference field just
as it would if it were created from Edit mode. For example,
if a user opens a Vendor record in View mode and creates a
record in the related Audits application by clicking Add
New in the Cross-Reference field, that new Audit record will
be selected in the Vendor record's Cross-Reference field,
even though the user did not open the Vendor record for
Chapter 2: Fields 51
RSA Archer GRC Platform Applications
Options Action
editing.
Tree Display If you selected the Single Column display control, you can
also select Tree Display if your relationship application is a
leveled application and you want to display cross-referenced
records in a hierarchical format. The following figure shows
top-level record references flush with the left margin of the
field, and record references in subsequent data levels
indented.
Validate Always Select this option to validate the field when any field has
changed when saving a record. If the Validate Always
option is not selected, the field is validated only when the
value in that field has changed.
Disable Remove Select this option to disable the Remove button for records
displayed in a Cross-Reference field.
52 Chapter 2: Fields
RSA Archer GRC Platform Applications
Options Action
Display Fields If you selected the Single Column or Grid display control,
you can define the fields of data from the relationship
application that should display in the Record Lookup page
for end users when they select related records in the Cross-
Reference field.
Display Format Select how you want the cross-referenced records displayed
on the Record Lookup page:
Chapter 2: Fields 53
RSA Archer GRC Platform Applications
Options Action
Record Lookup Select this option to apply the values selected in the Record
Lookup Configuration section to the corresponding
View/Edit Display control group fields.
Display Fields You can define the fields of data that display in the Cross-
Reference field grid of selected records. To select fields for
display, click in the Display Fields field and select the
field that you want to display from the Available list.
Configuration Section
54 Chapter 2: Fields
RSA Archer GRC Platform Applications
Options Action
Minimum and Specify the minimum and maximum number of records that
Maximum Selections users can select in the field.
Field Height If you selected the Single Column display control, you can
configure the height of the field in lines in the Field Height
field. This setting impacts the display of the field only when
users add or edit records in the application. For example, if
you set the field height to three lines, and a user makes four
selections in the field, a scroll bar is displayed.
Default Records If you selected the Grid display control, you can configure
Display the number of cross-referenced records that display within
the grid. If this option is selected, only the first X records are
displayed, where X is the selected value for the Default Grid
Display field. If the number of records exceeds the default
display number, a View All link is displayed. A user can
click this link to view all of the associated records.
Date Field
The Date field type accepts only a valid date entry and is displayed to users as a
field with a calendar icon displayed beside it. Users can either enter dates directly
in the field or click the Calendar to select a date from the dialog box.
For instructions on configuring the Date field type, see Configure the Display and
Functionality of a Field and Date Field Options.
When configuring the properties of a Date field, you can enable users to enter a
time of day to associate with the date, as shown below.
You can also restrict users from entering values in a Date field that are already
contained in other records within the application, making each Date field value
unique.
In addition to these basic field configuration options, the Date field type also
supports the following specialized options:
l Default Date Value. If this option is enabled, you can select a default value for
Date fields. The default date value is set when a record is created in the
Chapter 2: Fields 55
RSA Archer GRC Platform Applications
application; the value is not affected by record edits. When configuring the
default value, you can select to display the date of record creation, a date that is
a specific number of days after the date of record creation, or a static, specific
date. You can also select to display no default value in the Date field.
l Calculated Field. If this option is enabled, you can specify a formula for
dynamically computing the field's value. For example, you could create the
following formula to populate the Date field with the current date: TODAY().
The calculated field would display as read-only for all application users, and its
value would be updated each time the field was recalculated.
56 Chapter 2: Fields
RSA Archer GRC Platform Applications
The following table lists the options for the Date field.
Option Action
Select the type of display control that you want to use for the
field:
l Text Box - Date Only
l Text Box - Date and Time
l Dropdown - Date Only
l Dropdown - Date and Time
Options Section
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required fields
are indicated with an icon (selected in the Appearance feature) to
alert users that they must supply a value. If this checkbox is not
selected, users can skip this field when adding or editing a record
in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Chapter 2: Fields 57
RSA Archer GRC Platform Applications
Option Action
Unique Field Select this option to prevent users from entering an identical value
in the field within two separate records. If a user attempts to save a
value in the field that has already been saved in the field for
another record, the user is prompted to enter a unique value.
Key Field Select this option if you want the field to serve as the key field for
the application. Only one field can serve as the key field for an
application. You can select the key field values in search results,
and users can click the values to open individual records. Once
saved, you can only clear this checkbox by selecting Key Field for
another field in the application. Also, when you select Key Field
for a field and save your changes, the Required Field, Search
Results, and Search Default Field checkboxes are automatically
selected.
Advanced Field Select this option to add descriptive text and alter the standard
Display display of the field. After selecting this checkbox, specify the
display text and layout for the field in the Advanced Field
Display Options section.
Validate Always Select this option to validate the field when any field has changed
when saving a record. If the Validate Always option is not
selected, the field is validated only when the value in that field
has changed.
Configuration Section
Default Value Default date values display in the Date field when a user adds a
new record in the application. The default date value is set on the
date of record creation; the value is not affected by record edits.
The following options are available:
l None. Select None if you do not want to place a default value
in the Date field.
l Current Date. Select Current Date to display the date of
record creation in the Date field.
l Future Date. Select Future Date to display a default date value
that is a specific number of days after the date of record
creation. Then enter the specific number of days in the field to
the right.
58 Chapter 2: Fields
RSA Archer GRC Platform Applications
Option Action
Advanced Field Display Options Section – If you selected the Advanced Field Display
option, you must enter supporting information and select a display option.
Display Text Enter your supporting text in this field. For example, you can enter
a specific question related to values users enter in the field, such
as "When was the date of your last security audit?" This text is
always displayed, even if you select to hide the field name.
Layout Select whether to display or hide the field name and whether to
display the values horizontally or vertically. See the examples
provided in the Preview field.
Discussion Field
The Discussion field allows users to participate in discussion forums related to
specific records. When configuring this field type, you can select to create an
individual forum for each record created in an application or to link all records
within an application to one or more existing discussion forums created manually
through the Discussion Forums feature. Forums built through the Discussion field
type have all of the characteristics and properties of a regular discussion forum.
For instructions on configuring the Discussion field type, see Configure the Display
and Functionality of a Field and Discussion Field Options.
You can select from two options for the Discussion field:
l Forum Popup. When the Discussion field is configured to display as a Forum
Popup, the field generates a new discussion forum for each record created within
the application. The discussion forum displays in a pop-up window. By selecting
this option, you can capture comments and dialogue from a variety of users
centered on the content of a specific record. For example, if you have a record
concerning password requirements, users could access the forum to discuss
changes or additions to the requirements. A link to the record-specific forum is
displayed in both the view and edit modes of a record. This option also allows
you to specify administrators for the forum and configure edit options for end
users.
l Static Forum Link. The Static Forum Link option allows you to embed links to
existing discussion forums within each record in an application. End users cannot
add or edit links within the field. By including links to established discussion
forums, you can direct users to forums where they can participate in a large-
Chapter 2: Fields 59
RSA Archer GRC Platform Applications
scale discussion relating to the entire application. Links for the selected
discussion forums display in both view and edit modes of every record within the
application.
60 Chapter 2: Fields
RSA Archer GRC Platform Applications
The following table lists the options for the Discussion field.
Option Action
Note: Once you save the Discussion field, you cannot change the display control type.
Forum Popup Select this option to have the system automatically create a
discussion forum for each record that is created within the
application. This type of forum displays in a pop-up window, and
users can only access the forum when viewing or editing the
record. It is not displayed within the Discussion Forums feature.
Static Forum Link Select this option to include one or more read-only links to
existing discussion forums within every record of the application.
Configuration Section
Note: The options available in the Configuration section vary depending on whether
you selected the Forum Popup or a Static Forum Link display control.
Forum Popup If you selected the Forum Popup display control, you must define
the administrators for the forum and specify the edit options that
end users have within the forum:
l Edit Own Posts. Select this option to allow users to edit their
own posts within the forum.
l Edit All Posts. Select this option to allow users to edit all posts
within the forum.
l Forum Administrators. From the Available list, select the
users and groups to which you want to grant forum
administrator rights. As an application owner, you are listed by
default as a forum administrator. To revoke forum administrator
rights for a user or group, click to the right of the user or
group name in the Selected list.
Static Forum Link If you selected the Static Forum Link display control, you must
specify the forums to which you want to provide links.
Discussion Forums. From the Available list, select the discussion
forums that you want to include a link to within in every record of
the application. To remove a link to a discussion forum, click
to the right of the discussion forum name in the Selected list.
Chapter 2: Fields 61
RSA Archer GRC Platform Applications
Each time that you enter a link in an External Links field and click Apply, the new
link is displayed in a list below the field. You can edit the properties of a list item
by clicking to the right of the link. The properties of that link are displayed in
the Link Manager and can be edited. In addition, you can delete a link in the list by
clicking to the right of the link.
Record Save Validation
The Validate Always option on the Options tab of the Manage Field page causes
the field to validate when any field has changed when the user saves a record. If
the Validate Always option is not selected, the field is validated only when the
value in that field has changed.
Field Validation Configuration
The minimum and maximum values are now validated for relationships between
field types.
The following validation rules apply to this field type:
l Required
l Minimum Selections
l Maximum Selections
l External Link Valid URL
62 Chapter 2: Fields
RSA Archer GRC Platform Applications
Option Action
Options Section
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required fields
are indicated with an icon (selected in the Appearance feature) to
alert users that they must supply a value. If this checkbox is not
selected, users can skip this field when adding or editing a record
in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Advanced Field Select this option to add descriptive text and alter the standard
Display display of the field. After selecting this checkbox, specify the
display text and layout for the field in the Advanced Field Display
Options section.
Validate Always Select this option to validate the field when any field has changed
when saving a record. If the Validate Always option is not
selected, the field is validated only when the value in that field has
changed.
Chapter 2: Fields 63
RSA Archer GRC Platform Applications
Option Action
Configuration Section
Minimum Links Use these options to set the minimum or maximum number of links
and Maximum the user can select in the External Links field.
Links
Protocols Select the protocol types that a user can configure in the Protocols
field. The following options are available:
l HTTP
l HTTPS
l FTP
l Mailto
l News
l Relative
l File
Advanced Field Display Options Section – If you selected the Advanced Field Display
option, you must enter supporting information and select a display option.
Display Text Enter your supporting text in this field. For example, you can enter
a specific question related to values users enter in the field, such as
"When was the date of your last security audit?" This text is
always displayed, even if you select to hide the field name.
Layout Select whether to display or hide the field name and whether to
display the values horizontally or vertically. See the examples
provided in the Preview field.
64 Chapter 2: Fields
RSA Archer GRC Platform Applications
For more information on First Published Date fields, see First Published Date Field.
The following table lists the options for the First Published Date field.
Option Action
Options Section
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Field Select this option to include the field by default in search results
for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Time Information Select this option to display time information (hours, minutes and
the AM or PM designation) along with the date value.
User Information Select this option to display the name of the user who published
the record along with the date value.
Header Display This checkbox is selected by default, allowing the First Published
Date field values to display in the page header of records. To
remove it from display, clear the Page Header Display checkbox.
Chapter 2: Fields 65
RSA Archer GRC Platform Applications
When configuring the properties of a History Log field, you can select the fields
that are tracked by the history log. All field in an individual application can be
included in this list, except for the following field types:
In addition to selecting the fields to include in the history log, you can select to limit
the number of modifications that are displayed on the History Log page.
If a large number of users have rights to edit records in an application, it is possible
that the History Log for a record in that application could include thousands of
changes. If this is the case, you may choose to limit the number of modifications
displayed in the History Log to improve its load time.
The following list provides additional information about the History Log field type:
l Field permissions are enforced, allowing users to track only the history of fields
for which they have access.
l Prior to adding a History Log field to an application, the history of field-level
changes in that application is not tracked.
l Deleting a History Log field deletes the history associated with the field. This
data cannot be restored.
l Published changes and content review changes are tracked in the History Log.
l Copying a record does not copy the history of that record.
66 Chapter 2: Fields
RSA Archer GRC Platform Applications
Option Action
Select the type of display control that you want to use for the field
from the following options:
l Grid
l Link
Options Section
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Chapter 2: Fields 67
RSA Archer GRC Platform Applications
Option Action
Keyword Searching Select this option to allow users to keyword search into the
contents of the History Log field.
Configuration Section
Field Tracking You can configure the History Log field to track fields in one of
two ways:
l All. Select this option if you want the History Log to track all
fields in the application. In addition to all current fields, fields
added in the future will also be automatically added to the
tracked fields list if you select this option.
l Selected. To select one or more fields to track, click Select to
open the Select Fields dialog box and from the Available list,
select the fields that you want to include in the History Log
field's Watch list.
To remove a field from the Watch list, click to the right of the
field name in the Selected list. You must select at least one field
for the history log to track.
From the Selected list, determine whether a field's changes should
be displayed in Detailed, Record Version, or both formats by
selecting the appropriate checkbox. To adjust the display order of
the tracked fields, use the below the Selected list to move
the fields into the desired order. Click Apply. Each time a value is
added or modified in any of the fields in the Selected list, a new
entry is added to the record's history log that describes the change.
Image Field
The Image field type allows users to upload and display one or more image files.
You can set the display height and width for each image field. The system supports
a maximum value of 2000 x 2000 pixels. When an image does not match the defined
height or width, it is resized using a locked aspect ratio until both dimensions meet
the display criteria.
For instructions on configuring the Image Field field type, see Configure the
Display and Functionality of a Field and Image Field Options.
Record Save Validation
The Validate Always option on the Options tab of the Manage Field page causes
the field to validate when any field has changed when the user saves a record. If
the Validate Always option is not selected, the field is validated only when the
value in that field has changed.
68 Chapter 2: Fields
RSA Archer GRC Platform Applications
Chapter 2: Fields 69
RSA Archer GRC Platform Applications
The following table lists the options for the Image field.
70 Chapter 2: Fields
RSA Archer GRC Platform Applications
Option Action
Options Section
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required fields
are indicated with an icon (selected in the Appearance feature) to
alert users that they must supply a value. If this checkbox is not
selected, users can skip this field when adding or editing a record
in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Field Select this option to include the field by default in search results
for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Validate Always Select this option to validate the field when any field has changed
when saving a record. If the Validate Always option is not
selected, the field is validated only when the value in that field has
changed.
Configuration Section
Display Width and Enter the width and height for images displayed in this field. These
Display Height dimensions are measured in pixels.
Maximum Size In the Maximum Size field, select the maximum size, up to 100
MB, that you want to allow for each file uploaded to the Image
field. This setting does not restrict the total size of all files
uploaded to the field.
Chapter 2: Fields 71
RSA Archer GRC Platform Applications
IP Address Field
The IP Address field type enables users to store an IP address in either the IPv4 or
IPv6 format. The format is specified when you create the field and it cannot be
changed later. The IPv4 format is broken into four adjoining sub-fields, which must
contain a numeric value between 0 and 255. The IPv6 format is broken into eight
adjoining sub-fields and is displayed to the user using either the full syntax or the
shorthand syntax.
For instructions on configuring the IP Address field type, see Configure the Display
and Functionality of a Field and IP Address Field Options.
Record Save Validation
The Validate Always option on the Options tab of the Manage Field page causes
the field to validate when any field has changed when the user saves a record. If
the Validate Always option is not selected, the field is validated only when the
value in that field has changed.
Field Validation Configuration
The minimum and maximum values are now validated for relationships between
field types.
The following validation rules apply to this field type:
l Required
l Unique
72 Chapter 2: Fields
RSA Archer GRC Platform Applications
The following table lists the options for the IP Address field.
Option Action
Note: Once you save the field, you cannot change this option.
Options Section
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required fields
are indicated with an icon (selected in the Appearance feature) to
alert users that they must supply a value. If this checkbox is not
selected, users can skip this field when adding or editing a record
in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Chapter 2: Fields 73
RSA Archer GRC Platform Applications
Option Action
Unique Field Select this option to prevent users from entering an identical value
in the field within two separate records. If a user attempts to save a
value in the field that has already been saved in the field for
another record, the user is prompted to enter a unique value.
Key Field Select this option if you want the field to serve as the key field for
the application. Only one field can serve as the key field for an
application. You can select the key field values in search results,
and users can click the values to open individual records. Once
saved, you can only clear this checkbox by selecting the Key
Field checkbox for another field in the application. Also, when
you select the Key Field checkbox for a field and save your
changes, the Required Field, Search Results, and Search Default
Field checkboxes are automatically selected.
Advanced Field Select this option to add descriptive text and alter the standard
Display display of the field. After selecting this checkbox, specify the
display text and layout for the field in the Advanced Field
Display Options section.
Validate Always Select this option to validate the field when any field has changed
when saving a record. If the Validate Always option is not
selected, the field is validated only when the value in that field
has changed.
Advanced Field Display Options Section – If you selected the Advanced Field Display
option, you must enter supporting information and select a display option.
Display Text Enter your supporting text in this field. For example, you can enter
a specific question related to values users enter in the field, such
as "When was the date of your last security audit?" This text is
always displayed, even if you select to hide the field name.
74 Chapter 2: Fields
RSA Archer GRC Platform Applications
Option Action
Layout Select whether to display or hide the field name and whether to
display the values horizontally or vertically. See the examples
provided in the Preview field.
Configuration Section
Chapter 2: Fields 75
RSA Archer GRC Platform Applications
Option Action
Options Section
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Field Select this option to include the field by default in search results
for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Time Information Select this option to display time information (hours, minutes and
the AM or PM designation) along with the date value.
User Information Select this option to display the name of the user who published
the record along with the date value.
Header Display This checkbox is selected by default, allowing the Last Updated
Date field values to display in the page header of records. To
remove it from display, clear the Page Header Display option.
Matrix Field
The Matrix field type provides the ability to display a two-dimensional array of
checkboxes, allowing users to plot or rank responses relative to two factors. For
example, you might create a matrix to assist in analyzing a broad set of
characteristics across your organization's physical assets. The columns of the
matrix might represent characteristics, such as maintenance burden, portability and
power consumption, while the rows might represent ranking levels, such as high,
medium, and low.
For instructions on configuring the Matrix field type, see Configure the Display and
Functionality of a Matrix Field.
Record Save Validation
The Validate Always option on the Options tab of the Manage Field page causes
the field to validate when any field has changed when the user saves a record. If
the Validate Always option is not selected, the field is validated only when the
value in that field has changed.
Field Validation Configuration
The minimum and maximum values are now validated for relationships between
field types.
76 Chapter 2: Fields
RSA Archer GRC Platform Applications
Option Action
Options Section
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required fields
are indicated with an icon (selected in the Appearance feature) to
alert users that they must supply a value. If this checkbox is not
selected, users can skip this field when adding or editing a record
in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Validate Always Select this option to validate the field when any field has changed
when saving a record. If the Validate Always option is not
Chapter 2: Fields 77
RSA Archer GRC Platform Applications
Option Action
selected, the field is validated only when the value in that field
has changed.
Configuration Section
Column Values If you selected to define custom column values for the Matrix field
List during the field creation process, enter a name, or category, for the
Matrix field's column values in the Column Values List field. This
name is not displayed in the field, but it is used for creating
individual column values.
Row Values List If you selected to define custom row values for the Matrix field
during the field creation process, enter a name, or category, for the
Matrix field's row values in the Row Values List field. This name
is not displayed in the field, but it is used for creating individual
row values.
78 Chapter 2: Fields
RSA Archer GRC Platform Applications
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Important: If any records have been saved in the application with column or
row values from the current global values lists, changing these lists is not
recommended. If you change a global values list after records with value
selections from the previous list have been saved, the values from the previous
global values list are permanently lost and the Matrix field shows no selections.
5. Click the Options tab to access controls for configuring the field's display and
functionality.
6. Select options. For detailed information on options, see Matrix Field Options.
7. Click Apply.
Next Steps
Create Field-Level Help
Chapter 2: Fields 79
RSA Archer GRC Platform Applications
Note: Once an MRDC field is saved with the Multiple References option selected,
the Single Reference option is no longer available. However, you can change the
setting from Single Reference to Multiple References.
For each Cross-Reference or Related Records field that you select to display within
an MRDC field, you can suppress the field from end-user functions. By selecting
the Suppress option, you can hide existing Cross-Reference or Related Records
fields from a record's layout, conserving record "real estate."
On the Layout tab of the Manage Applications page, suppressed fields remain on
the page layout. However, they are not displayed to end users.
An advanced option for the MRDC field type is the ability to reference the field in
a calculated field formula using the COUNT or ISEMPTY function. You can use
the COUNT function to return the number of referenced records within the field.
Using the ISEMPTY function, you can determine whether the MRDC field contains
selections.
The following formula would return the number of records that are referenced
within a Facility and Service Agreement Multi-Reference field:
COUNT([Facility and Service Agreement])
The following formula would return True if the Facility and Service Agreement
Multi-Reference field contained no selections:
IF(ISEMPTY([Facility and Service Agreement]), "True", "False")
80 Chapter 2: Fields
RSA Archer GRC Platform Applications
Note: For Cross-Reference and Related Records fields to be available for selection
in an MRDC field, those reference fields must be configured with the Lookup
option. For more information on how to configure these fields, see Configure the
Display and Functionality of a Field , Cross-Reference Field Options, and Related
Records Field Options.
The following table lists the options for the MRDC field.
Option Action
Options Section
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Chapter 2: Fields 81
RSA Archer GRC Platform Applications
Option Action
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
82 Chapter 2: Fields
RSA Archer GRC Platform Applications
Option Action
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Configuration Section
Selected References Perform the following steps to configure the references that you
want to display in the MRDC field:
Note: If you select the MRDC option and save the field, you
cannot change the setting to Single Reference.
Chapter 2: Fields 83
RSA Archer GRC Platform Applications
Numeric Field
The Numeric field type allows only numeric-value entries. Numeric fields can
accept both positive and negative values of any size. However, when configuring a
Numeric field, you can choose to apply minimum or maximum value constraints to
the field. You can also specify the number of decimal places permitted for the
value.
For instructions on configuring the Numeric field type, see Configure the Display
and Functionality of a Field and Numeric Field Options.
See the following topics for additional information about numeric fields:
l Record Save Validation
l Field Validation Configuration - Numeric Field
l Trending for a Numeric Field
l Attachment l Numeric
l Image l Sub-Form
l IP Address l Text
l User/Group l Voting
List
l Values List
84 Chapter 2: Fields
RSA Archer GRC Platform Applications
l Attachment l Numeric
l Image l Sub-Form
l IP Address l Text
l User/Group l Voting
List
l Values List
Chapter 2: Fields 85
RSA Archer GRC Platform Applications
The following table lists the options for the Numeric field.
Option Action
Options Section
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required fields
are indicated with an icon (selected in the Appearance feature) to
alert users that they must enter a value. If this option is not
selected, users can skip this field when adding or editing a record
in the application.
Null values are not allowed when this option is selected. If this
option is not selected, null and zero values are plotted as 0 on a
Numeric trending chart.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes the name of the user who made the change and the date
and time of the change. If this option is not selected, auditing
information is not displayed with the field.
Search Results Select this option to make this field available for display in search
results. If this option is not selected, you cannot include this field
in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the Advanced Search page in the application.
Trending Select this option to enable trending for the field. After selecting
this option, specify the following:
86 Chapter 2: Fields
RSA Archer GRC Platform Applications
Option Action
Duration Select the duration for which you want the Platform
Type to retain trending data. The available values are
calculated in days as follows:
Days 1 day
Months 30 days
Quarters 90 days
Unique Field Select this option to prevent users from entering an identical value
in the field in two separate records. If a user attempts to save a
value in the field that has already been saved in the field of
another record, the user is prompted to enter a unique value.
Chapter 2: Fields 87
RSA Archer GRC Platform Applications
Option Action
Key Field Select this option to designate the field as the key field for the
application. Only one field can be designated as the key field for
an application. You can select the key field values in search
results, and users can click the values to open individual records.
Once saved, you can only clear this option by selecting the Key
Field option for another field in the application. Also, when you
select the Key Field option for a field and save your changes, the
Required Field, Search Results, and Search Default Field options
are automatically selected.
Sum Field Select this option to provide a total of all values entered in the
field on the Search Results page for the application. When this
option is selected, an additional row is displayed at the bottom of
the Search Results page that provides a total value in the
Numeric Field column. The summation value represents a grand
total in all records displayed in the search results. Subtotals are not
shown per page.
Numeric Ranging Select this option to allow users to filter search results in the
application based on specific ranges of values in the Numeric
field. For more information on creating ranges, see Define Numeric
Ranges for a Numeric Field.
Format Select this option to format the value using thousand separators.
Advanced Field Select this option to add descriptive text and alter the standard
Display display of the field. After selecting this option, specify the display
text and layout for the field in the Advanced Field Display
Options section.
Validate Always Select this option to validate the field when any field has changed
when saving a record. If the Validate Always option is not
selected, the field is validated only when the value in that field
has changed.
Configuration Section
Decimal Places Select the number of decimal places that you want to require for
values entered in the field. The largest value available for this
field is 6. If a user enters a value in the Numeric field with fewer
decimal places than the number you have required, the value is
88 Chapter 2: Fields
RSA Archer GRC Platform Applications
Option Action
Negative Display Select how you want negative numbers to display. Options
include:
l (1234.56) font color = red; default option
l -1234.56 font color = red
l (1234.56) font color = black
l -1234.56 font color = black
Minimum and Enter the minimum and maximum values allowed in the field in
Maximum Values the Minimum Value and Maximum Value fields to require users to
enter values in the Numeric field that fit within a defined range,
for example, 1-100.
Suffix Enter the text (up to 10 characters) that you want to display after
the numeric value. For example, you could enter "miles" to label
the field value as a measurement of distance.
Advanced Field Display Options Section – If you selected the Advanced Field Display
option, you must enter supporting information and select a display option.
Display Text Enter your supporting text in this field. For example, you can enter
a specific question related to values users enter in the field, such
as "When was the date of your last security audit?" This text is
always displayed, even if you select to hide the field name.
Layout Select whether to display or hide the field name and whether to
display the values horizontally or vertically. See the examples
provided in the Preview field.
Chapter 2: Fields 89
RSA Archer GRC Platform Applications
Related Topics
Configure the Display and Functionality of a Field
Numeric Field
The Questionnaire Reference field type enables you to see all questionnaire records
that are related to an application record. For example, if you are working with a
vendor record within a Vendor Profiles application, you can see the assessments
that are in progress or have been completed for that vendor.
For instructions on configuring the Questionnaire Reference field type, see
Configure the Display and Functionality of a Field and Questionnaire Reference
Field Options.
This field type is only available for applications that have been selected as the
target for one or more questionnaires. If the application is the target of multiple
questionnaires, you can select any number of those questionnaires to include in the
field.
You can also select the fields of information that you want to display in the
Questionnaire Reference field. Only the system-generated questionnaire fields are
available for selection.
You can configure the display and functionality of a Questionnaire Reference field
on the Options tab of the Manage Fields page. For detailed instructions, see
Configure the Display and Functionality of a Field.
For more information on Questionnaire Reference fields, see Questionnaire
Reference Field.
90 Chapter 2: Fields
RSA Archer GRC Platform Applications
The following table lists the options for the Questionnaire Reference field.
Option Action
Options Section
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Configuration Section
Display Fields
Click to choose the system-generated questionnaire fields that
display in the Questionnaire Reference field. Select the fields that
you want to display from the Available list and click OK.
Questions and custom questionnaire fields are not available for
display in a Questionnaire Reference field. Only system-generated
questionnaire fields may be displayed.
Chapter 2: Fields 91
RSA Archer GRC Platform Applications
If you elect to use radio buttons, users are restricted to making a single selection in
the field. By choosing one of the other available interface control types, you can
specify the minimum and maximum number of selections users are permitted to
make.
During the field configuration process, you must select at least one user or group to
display as an available selection in the Record Permissions field. The users and
groups from which you can choose are those that have been defined in the Access
Control feature. To populate the field with users and groups, you can:
l Define a list of specific users and groups to display as available selections in the
field.
l Select the All Users and All Groups options to display every user and group
within the system.
l Select the Record Creator option to include the user who is adding or editing the
record.
l Select the Default to Creator's Groups option for the record creator or for any
selected group to define that user or group as the default selection for the field.
l Restrict the list of groups that display as available selections in the field by
selecting the Auto Restrict Groups option. This option limits the groups that are
available for selection to only those groups for which the user is a member. For
example, suppose you select the Sales, Marketing and Management groups as
available selections in the field. If a user adds a record in the application and
that user is a member of only the Marketing group, the Marketing group is the
only group available to that user for selection in the Record Permissions field.
92 Chapter 2: Fields
RSA Archer GRC Platform Applications
For each user or group that you define as an available selection in the Record
Permissions field, you can select the level of record access that should be granted
to that user or group. By default, all users and groups selected in a Record
Permissions field have Read access to their assigned records. However, you can
also grant Update and Delete privileges. You can also define rules that control the
level of permissions the selected users and groups will receive based on record
content. For example, if the value in the record's Status field is In Progress, the
users and groups selected in the Record Permissions field have read and update
rights to the record. But if the value in the Status field is Completed, the users have
only read rights.
Inherited Permissions Method
A Record Permissions field configured to inherit record permissions from related
levels or applications are displayed as a read-only field to end users. The value of
the field is automatically populated by one or more Record Permissions fields that
you define. This permission method allows end users to set permissions in one
record and have those permissions automatically apply to related records.
For example, suppose that you have a Vendor Profiles application that cross-
references your Contracts and Assessments applications. Vendor relationship
managers need access to records in all three applications for the vendors they work
with. To simplify the process of granting record permissions for these applications,
you can create a Record Permissions field that allows manual selection in the
parent Vendor Profiles application, and then you can create Record Permissions
fields in the child Contracts and Assessments applications that inherit permissions
from the related vendor profile. So when a user gains access to the ABC Company
vendor profile, that user automatically gains access to the contracts and
assessments related to ABC Company.
Inherited Record Permissions field values are recalculated each time one of the
following occurs:
l The configuration of a Record Permissions field is changed, and that field is
referenced by the inherited Record Permissions field. The recalculation occurs
only if the available users or groups are changed for a manual selection Record
Permissions field or if the rules are changed for an automatic selection Record
Permissions field.
l A Record Permissions field is deleted, and that Record Permissions field is
referenced by the inherited Record Permissions field.
Chapter 2: Fields 93
RSA Archer GRC Platform Applications
94 Chapter 2: Fields
RSA Archer GRC Platform Applications
Procedure
1. Select the application containing the Record Permissions field that you want to
update:
a. Click the Administration workspace.
b. On the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
2. Click the Fields tab.
3. Click the Options tab.
Chapter 2: Fields 95
RSA Archer GRC Platform Applications
Option Action
Record Creator Select this option to include the user who is adding or
editing the record as an available selection in the field.
Individual Groups Expand the Groups and Users nodes and select the
and Users individual groups and users that you want to be available
for selection in the field.
All Groups Expand the Groups node and select All Groups. This
option populates the Record Permissions field with all
groups defined in the Access Control feature.
All Users Expand the Users node and select All Users. This option
populates the Record Permissions field with all users in
the system.
b. In the User/Groups list, define the level of access that you want each user
and group to have to a record if they are selected in the Record
Permissions field. By default, all users and groups selected in a Record
Permissions field have Read access to their assigned records. However,
you can also grant Update and Delete privileges by selecting those options
for each user and group.
c. In the User/Groups list, select the Default checkbox for the record creator
or for any selected group to define that user or group as the default selection
for the field. When users add new records, the default values are
automatically selected in the field.
d. (Optional) To include the sub-groups of a selected group in the list of
available values for the Record Permissions field, select the Cascade
option for the group in the User/Groups list.
96 Chapter 2: Fields
RSA Archer GRC Platform Applications
Note: If you select the Cascade option for a group that contains sub-groups,
those sub-groups are available for selection in the Record Permissions field.
When a user interacts with the Record Permissions field while adding or
editing a record, the user can select the parent-level group and/or individual
sub-groups nested beneath the parent group.
However, it is important to note that if a user selects only the parent group,
record access is not granted to members of sub-groups nested beneath that
parent group. Only individual users who are members of the selected parent
group have access to the record.
e. Select the Auto-Restrict Groups option to restrict the list of groups that
display as available selections in the field. This option limits the groups that
are available for selection to only those groups for which the user is a
member. For example, suppose you select the Sales, Marketing, and
Management groups as available selections in the field. If a user adds a
record in the application and that user is a member of only the Marketing
group, the Marketing group is the only group available to that user for
selection in the Record Permissions field.
Note: If you select the Default option for a group in the User/Groups list,
and then select the Auto-Restrict Groups check box, the default group is
only selected in the Record Permissions field for an individual record if the
user creating that record is a member of the group.
Note: A rule consists of one or more data conditions to watch for within the
application’s records and specific permissions the users or groups selected in
the Record Permissions field should have if the specified conditions are met.
Chapter 2: Fields 97
RSA Archer GRC Platform Applications
c. In the Description field, provide a brief description of the rule that explains
in more detail the configuration of the rule.
d. In the Permissions field, select the permissions that you want the selected
user or group to have when the specified conditions are met.
e. Perform the following steps to create one or more conditions.
Column Action
Field To Select the field to evaluate for one or more specific values.
Evaluate
If you have created more than one condition, you can apply advanced logic
to your search criteria.
7. Click Apply.
Note: You can create multiple rules for dynamically modifying rights based on
record content. If you configure multiple rules, the user is granted the highest
rights allowed by the rules. For example, if you have one rule that gives the
selected user read-only rights, and you have another rule that gives the selected
user read and update rights, the user would have read and update rights if both
rules prove true.
Next Steps
Create Field-Level Help
Important: Once you select the Inherited Permissions option for a Record
Permissions field, you cannot change the permission method. The options for
Manual Selection and Automatic Selection are disabled.
98 Chapter 2: Fields
RSA Archer GRC Platform Applications
Note: Inherited Record Permissions fields cannot be tracked in a History Log field.
If a History Log field was configured to track the Record Permissions field before it
was changed to use inherited permissions, the Record Permissions field is removed
from the history log configuration, and all data for the field is deleted. Further
changes to the Record Permissions field's values are not tracked in the history log.
Procedure
1. Select the application containing the Record Permissions field that you want to
update:
a. Click the Administration workspace.
b. On the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
2. Click the Fields tab.
3. Click the Options tab.
4. In the Permissions section, select Inherited.
5. In the Field Population section, from the Available list, select one or more
Record Permissions fields to display in the Selected list.
6. Click Apply.
If you have existing records in the application that you are managing, a process
is triggered to set permissions for those records.
Important: If you delete a parent-level record and you have child-level records
that inherit permissions from that parent, the permissions in the child-level
records are deleted.
Next Steps
Create Field-Level Help
Important: Once you select the Automatic Selection option for a Record
Permissions field, you cannot change the permission method. The options for
Manual Selection and Inherited Permissions are disabled.
Chapter 2: Fields 99
RSA Archer GRC Platform Applications
Procedure
1. Select the application containing the Record Permissions field that you want to
update:
a. Click the Administration workspace.
b. On the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
2. Click the Fields tab.
3. Click the Options tab.
4. In the Permissions section, select Automatic.
5. To create rules that automatically change the level of access that the user or
group selected in the Record Permissions field has to the record based on
content within a field, complete the following steps:
Note: A rule consists of one or more data conditions to watch for within the
application’s records and specific permissions the users or groups selected in
the Record Permissions field should have if the specified conditions are met.
Column Action
Field To Evaluate Select the field to evaluate for one or more specific
values.
If you have created more than one condition, you can apply advanced logic
to your search criteria.
d. In the Users/Group Permissions section, define the users and groups that
you want to be available for selection in the Record Permissions field.
Click Lookup to open the Available Users/Groups dialog box and select
the users according to the following options.
Option Action
Record Creator Select to include the user who is adding or editing the
record as an available selection in the field.
Individual Groups Expand the Groups and Users nodes and select the
and Users individual groups and users that you want to be available
for selection in the field.
All Groups Expand the Groups node and select All Groups. This
option populates the Record Permissions field with all
groups defined in the Access Control feature.
All Users Expand the Users node and select All Users. This option
populates the Record Permissions field with all users in
the system.
e. In the Users/Groups list, define the level of access that each user and
group should have to a record if they are selected in the Record
Permissions field. By default, all users and groups selected in a Record
Permissions field have Read access to their assigned records. However, you
can also grant Update and Delete privileges by selecting those options for
each user and group.
f. From the Users/Groups list, select Default for the record creator or for any
selected group to define that user or group as the default selection for the
field. When users add new records, the default values are automatically
selected in the field.
g. (Optional) To include the sub-groups of a selected group in the list of
available values for the Record Permissions field, select Cascade for the
group in the Users/Groups list.
Note: If you select the Cascade option for a group that contains sub-groups,
those sub-groups are available for selection in the Record Permissions field.
When a user interacts with the Record Permissions field while adding or
editing a record, the user can select the parent-level group and/or individual
sub-groups nested beneath the parent group. However, it is important to note
that if a user selects only the parent group, record access is not granted to
members of sub-groups nested beneath that parent group. Only individual
users who are members of the selected parent group have access to the
record.
6. In the Default Users/Groups section, define one or more users and groups who
are granted record permissions by default if none of the rules that you specified
are met within a record. To define default users and groups, click Lookup to
open the Available Users/Groups dialog box and repeat the lookup steps from
above (step5d).
7. Click Apply.
Next Steps
Create Field-Level Help
Option Action
Select the type of display control that you want to use for the field
from the following options:
l Dropdown
l Radio Buttons
l Check Boxes
l Listbox
l Values Popup
Options Section
Option Action
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required fields
are indicated with an icon (selected in the Appearance feature) to
alert users that they must supply a value. If this checkbox is not
selected, users can skip this field when adding or editing a record
in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Advanced Field Select this option to add descriptive text and alter the standard
Display display of the field. After selecting this checkbox, specify the
display text and layout for the field in the Advanced Field
Display Options section.
Validate Always Select this option to validate the field when any field has changed
when saving a record. If the Validate Always option is not
selected, the field is validated only when the value in that field
has changed.
Option Action
Configuration Section
Minimum and If you selected the Check Boxes, Listbox, or Values Popup
Maximum options in the Display Control section, you can specify the
Selections minimum and maximum number of values that can be selected in
the field. Select the number of values in the Minimum Selections
and Maximum Selections fields.
Column Layout If you selected the Radio Buttons or Check Boxes display control
in the Display Control section, you can configure the number of
columns in the field by selecting the desired number of columns
from the Column Layout drop-down menu.
Field Height If you selected the Listbox option in the Display Control section,
you can specify the height of the field. Select the height, in pixels,
from the Field Height list.
Permissions Section
Option Action
Options Section
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Field Select this option to include the field by default in search results
for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Note: If you create a Cross-Reference field that forms an external relationship with
a leveled application, you have the option to reference a specific level or to
reference all levels. If you reference a specific level, a Related Records field is
created at the data level specified. If you reference all levels, a Related Records
field is created at each data level within the related application. In the case that
more data levels are subsequently created in the leveled application, a Related
Records field is added to each new level.
The Related Records field is not available for selection on the Add Field page.
Instead, it is automatically added to an application when the application is selected
for reference through a Cross-Reference field. When a Related Records field is
added to an application, the system displays it in the Available Fields list on the
Layout tab of the Manage Applications page. As an application owner, you must
move the Related Records field into the application layout before it is displayed to
end users. You can also rename the field and select fields from the related
application whose values you want to display in the Related Records field table.
Users that have Create permissions in the related application can add new records
in that application from the Related Records field by clicking Add New. The Cross-
Reference field value in the newly created record defaults to the record from which
the user clicked Add New. Continuing the previous example, if a user creates a
new Trouble Tickets record from the "Gloria Young" Technicians record, the
"Gloria Young" record is selected by default in the Technicians Cross-Reference
field within the new Trouble Tickets record.
If the Lookup feature is enabled for a Related Records field, users who have read
permissions in the related application can select records from a list or to keyword
search for specific records in the related application by clicking Lookup.
As an application owner, you can configure the fields that are displayed for users in
the Record Lookup page, and you can create filter criteria to limit the number of
records users can select from. You can also define the minimum and maximum
number of related records a user can select.
See the following topics for additional information about Related Records fields:
Record Save Validation
Field Validation Configuration - Related Records Field
Field Type Validation Rules
Reference Field Validation
Record Save Validation
The Validate Always option on the Options tab of the Manage Field page causes
the field to validate when any field has changed when the user saves a record. If
the Validate Always option is not selected, the field is validated only when the
value in that field has changed.
Record save validation is available for the following field types:
l Attachment l Numeric
l Image l Sub-Form
l IP Address l Text
l User/Group l Voting
List
l Values List
l Attachment l Numeric
l Image l Sub-Form
l IP Address l Text
l User/Group l Voting
List
l Values List
When validating the three new rules for the related record, the system only
validates records that were added to or removed from the reference field of the
original relationship. For example, a user in Application A creates a Cross-
Reference field, and then removes related record B1 in Application B. The only
record that is validated is B1, because it changed.
Rule Description
Minimum This rule validates that the removed or added relationships do not
Selections (rule violate the Minimum Selections rule for the related record when both
for a reference of the following apply:
related field)
l The user attempts to save a record with a reference field change.
l A Minimum Selections rule is enabled for the reference field in
the related application.
Example
Maximum This rule validates that the removed or added relationships do not
Selections (rule violate the Maximum Selections rule for the related record when both
for a reference of the following apply:
related field)
l The user attempts to save a record with a reference field change.
l A Maximum Selections rule is enabled for the reference field in
the related application.
Example
Rule Description
Required (rule This rule validates that the removed relationships do not violate the
for a reference- Required rule for the related record when both of the following
related field) apply:
l The user attempts to save a record with a reference field change.
l A Required rule is enabled for the reference field in the related
application.
Example
Scenario A
Scenario The user enrolls Record A2 into a workflow and
creates Copy A2C.
Scenario B
Scenario The user removes Record B1 from the Cross-
Reference field A2C.
The user enrolls Record A3 into a workflow and
creates Copy A3C.
The user edits Copy A3C and adds Record B1 to
the Cross-Reference field.
Scenario C
Scenario The user edits Copy A2C again and adds Record
B1 to the Cross-Reference field.
Options Action
Single Column Select this option to display the key field of the referenced
record in a single column format.
Options Section
Required Field Select this option to require users to supply a value for the
field when adding or editing a record in the application.
Required fields are indicated with an icon (selected in the
Appearance feature) to alert users that they must supply a
value. If this checkbox is not selected, users can skip this
field when adding or editing a record in the application.
Options Action
Auditing Information Select this option to display auditing information next to the
field each time that its value is changed. The auditing
information includes only the name of the user who made
the change and the date and time of the change. If this
checkbox is not selected, auditing information is not
displayed with the field in the user interface.
Search Results Select this option to make this field available for display in
search results. If this checkbox is not selected, you cannot
include this field in search results or reference the values in
the field in search filters.
Search Default Field Select this option to include the field by default in search
results for the application. This option does not prevent
users from removing the field from the Search Results page.
Users can click Modify in the toolbar and remove the field
from the Fields to Display section of the Advanced Search
page for the application.
Add New If you selected the Grid display control, you can also select
Add New to allow users to add new records to the related
applications from a record in View mode. Users will not
have to open a record in Edit mode in order to create new
related records. If a user does not have rights to create
records in the related application, the link will not be
displayed for that user.
When a user creates a new related record from View mode,
that record will be selected in the Related Record field just
as it would if it were created from Edit mode. For example,
if a user opens a Vendor record in View mode and creates a
record in the related Audits application by clicking Add
New in the Related Record field, that new Audit record will
be selected in the Vendor record's Related Record field, even
Options Action
though the user did not open the Vendor record for editing.
Validate Always Select this option to validate the field when any field has
changed when saving a record. If the Validate Always
option is not selected, the field is validated only when the
value in that field has changed.
Disable Remove Select this option to disable the Remove button for records
displayed in a Related Records field.
Options Action
Display Fields If you selected the Single Column or Grid display control,
you can define the fields of data from the relationship
application that should display in the Record Lookup page
for end users when they select related records in the Related
Record field.
Options Action
Display Format Select how you want the cross-referenced records displayed
on the Record Lookup page:
l Column-Hierarchical. Displays the records in a
columnar layout where fields are displayed across the
page from left to right, and the field values are presented
showing relationships.
l Column-Flat. Displays the records in a simple columnar
layout without any grouping of values.
Record Lookup Select this option to apply the values selected in the Record
Lookup Configuration section to the corresponding
View/Edit Display control group fields.
Display Fields You can define the fields of data that display in the Related
Record field grid of selected records. To select fields for
display, click in the Display Fields field and select the
field that you want to display from the Available list.
Options Action
Configuration Section
Minimum and Specify the minimum and maximum number of records that
Maximum Selections users can select in the field.
Field Height If you selected the Single Column display control, you can
configure the height of the field in lines in the Field Height
field. This setting impacts the display of the field only when
users add or edit records in the application. As an example,
if you set the field height to three lines, and a user makes
four selections in the field, a scroll bar is displayed.
Default Records If you selected the Grid display control, you can configure
Display the number of cross-referenced records that display within
the grid. If this option is selected, only the first X records are
displayed, where X is the selected value for the Default Grid
Display field. If the number of records exceeds the default
display number, a View All link is displayed. A user can
click this link to view all of the associated records.
Sub-Form Field
The Sub-Form field type enables you to embed a predefined sub-form in an
application. Administrators can create sub-forms from the Manage Sub-Forms page
in Application Builder, and these sub-forms can be selected by any application
owner for inclusion in an application. Sub-forms collect data within individual
records and display the data in a scrollable grid. Each time a user adds or edits a
record in an application, the user can make an entry in the sub-form and view
entries that other users have made. For example, if an application contains a sub-
form designed to collect user comments, each user who accesses a record in the
application can submit a comment in the sub-form and view comments submitted by
other users.
To create a Sub-Form field within an application, you must first create the sub-form
that you want to include in the application on the Manage Sub-Forms page in the
Application Builder. Once you have created a sub-form, it is available for selection
on the Manage Sub-forms page.
When configuring the properties of a Sub-Form field, you must select the sub-form
that is displayed in the field from a list of all sub-forms available in the system. You
can also set a minimum and maximum number of entries the sub-form can contain
within an individual record, and you can determine which users cab edit or delete
entries made in that sub-form.
For instructions on configuring the Sub-Form field type, see Configure the Display
and Functionality of a Field and Sub-Form Field Options.
Option Action
Options Section
Required Field Select this option to require users to supply a value for the
field when adding or editing a record in the application.
Required fields are indicated with an icon (selected in the
Appearance feature) to alert users that they must supply a
value. If this checkbox is not selected, users can skip this
field when adding or editing a record in the application.
Auditing Information Select this option to display auditing information next to the
field each time that its value is changed. The auditing
information includes only the name of the user who made
the change and the date and time of the change. If this
checkbox is not selected, auditing information is not
displayed with the field in the user interface.
Option Action
Search Results Select this option to make this field available for display in
search results. If this checkbox is not selected, you cannot
include this field in search results or reference the values in
the field in search filters.
Search Default Field Select this option to include the field by default in search
results for the application. This option does not prevent
users from removing the field from the Search Results page.
Users can click Modify in the toolbar and remove the field
from the Fields to Display section of the Advanced Search
page for the application.
Add New Select this option to allow users to add new entries in the
Sub-Form field when they are looking at a record in View
mode. Users do not have to open the record in Edit mode to
create new sub-form entries. If a user does not have rights to
create entries in the Sub-Form field, the Add New link does
not display for that user.
Validate Always Select this option to validate the field when any field has
changed when saving a record. If the Validate Always
option is not selected, the field is validated only when the
value in that field has changed.
Display Fields You can define the fields of data that display in the Sub-
Form field grid of sub-form records. To select fields for
display, click in the Display Fields field and select the
fields that you want to display from the Available list.
Option Action
Note: If you created more than one condition, you can apply
advanced logic to your search criteria.
Configuration Section
Minimum and Specify the minimum and maximum number of records that
Maximum Selections users can select in the field.
Text Field
The Text field type accepts both alphabetic and numeric entries. It can be displayed
to users as either a one-line text field or a multi-line (scrolling) text area. If the
field is configured as a text area, you can specify the height (in lines) for the
control. In addition, a Text field configured with the text field display control (not
text area) can be configured to display to end users as a masked Text field,
allowing them to enter data in a defined format.
For instructions on configuring the Text field type, see Configure the Display and
Functionality of a Field and Text Field Options.
By default, entries in the Text field are not restricted. However, when configuring
this field type, you can choose to set a maximum character length for entries. In
addition, you can restrict users from entering a value in the Text field that is
identical to a value entered in another record within the application, thereby
ensuring that all values in the Text field are unique.
A Text field can also be configured as a calculated field. When this option is
enabled, you can specify a formula for dynamically computing the field's value. For
example, you could create the following formula to populate the Text field with the
value "High Risk" or "Low Risk" depending on another field's value within the
record:
IF([Exposure Rating] >=10, "High Risk", "Low Risk")
The calculated field would display as read-only for all application users, and its
value would be updated each time the field was recalculated.
Record Save Validation
The Validate Always option on the Options tab of the Manage Field page causes
the field to validate when any field has changed when the user saves a record. If
the Validate Always option is not selected, the field is validated only when the
value in that field has changed.
Field Validation Configuration
The minimum and maximum values are now validated for relationships between
field types.
The following validation rules apply to this field type:
l Required
l Unique
l Maximum Characters
l Email Format
The following table lists the options for the Text field.
Option Action
Select the type of display control that you want to use for the
field:
l Text Field
l Text Area
Options Section
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required fields
are indicated with an icon (selected in the Appearance feature) to
alert users that they must supply a value. If this checkbox is not
selected, users can skip this field when adding or editing a record
in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Option Action
Unique Field Select this option to prevent users from entering an identical value
in the field within two separate records. If a user attempts to save a
value in the field that has already been saved in the field for
another record, the user is prompted to enter a unique value.
Key Field Select this option if you want the field to serve as the key field for
the application. Only one field can serve as the key field for an
application. You can select the key field values in search results,
and users can click the values to open individual records. Once
saved, you can only clear this checkbox by selecting the Key
Field checkbox for another field in the application. Also, when
you select the Key Field checkbox for a field and save your
changes, the Required Field, Search Results, and Search Default
Field checkboxes are automatically selected.
Advanced Field Select this option to add descriptive text and alter the standard
Display display of the field. After selecting this checkbox, specify the
display text and layout for the field in the Advanced Field
Display Options section.
Validate Always Select this option to validate the field when any field has changed
when saving a record. If the Validate Always option is not
selected, the field is validated only when the value in that field
has changed.
Configuration Section
Option Action
Maximum To restrict the number of characters a user can enter in the Text
Characters field, enter the maximum number of allowable characters in the
Maximum Characters field.
Note: If you use rich text formatting in a Text Area, the Platform
counts the HTML formatting tags embedded in the text as
characters. This may result in a warning message that the text
entered in the field exceeds the maximum number of characters. As
a result, set the Maximum Characters field to a value higher than
the number of characters that you expect to be entered in the field.
Input Mask If you selected the Text Field display control, you can configure
masked text fields to allow end users to enter data in defined
formats. From the Input Mask drop-down list, select one of the
following masks:
l SSN. Format = ###-##-####. The mask will be configured so
the entire SSN is confined to one field.
l Telephone. Format = ###-###-####. The mask will be
configured so the entire phone number is confined to one field.
l Zip Code. Format = #####.
l Zip+4. Format = #####-####.
l IP Address v4. Format = ###.###.###.###.
l IP Address v6 Full. Format =
####.####.####.####.####.####.####.####.
l Email Address. The mask will be configured to require the At
(@) sign.
Option Action
Field Height If you selected the Text Area display control in the Display
Control section, you can configure the height of the field in lines
by selecting the desired number of lines in the Field Height field.
If more values are available for selection in the field than the
number of lines you specified for the field height, a vertical scroll
bar will appear in the field to enable users to view all available
values.
Default Value To prepopulate your Text field with default text, enter the default
text in the Default Value text box. If you want this default text to
be removed once an end user selects the Text field in Edit mode,
select Remove the default text on mouse click.
Display Text Enter your supporting text in this field. For example, you can enter
a specific question related to values users enter in the field, such
as "When was the date of your last security audit?" This text is
always displayed, even if you select to hide the field name.
Layout Select whether to display or hide the field name and whether to
display the values horizontally or vertically. See the examples
provided in the Preview field.
Tracking ID Field
The Tracking ID field type is automatically populated with a value that uniquely
identifies a record. By default, the tracking ID is a numeric value; however, you
can also specify a static prefix and/or suffix string to be used in conjunction with
the system-generated tracking ID number. For example, if you specify "ABC-" for
the prefix and "-XYZ" for the suffix, the application could generate the following
tracking ID number: ABC-447632-XYZ.
For instructions on configuring the Tracking ID field type, see Configure the
Display and Functionality of a Field and Tracking ID Field Options.
This field has two configuration options:
l System ID. A sequential tracking ID that is generated based on the number of
records in all applications in the system.
If you select this option for Tracking ID fields in leveled applications, the
tracking ID value is based on the order the record was added within the context
of the entire application, not a specific level. For example, if you were to add a
record to the top-level application, add a record to the second-level and then add
another record to the top-level application, the records in the top level have
tracking ID values of 1 and 3 respectively. The record in the second-level
application has a tracking ID value of 2, as shown in the following figure.
If you select this option for Tracking ID fields in sub-forms, the tracking ID
value is based relative to the individual Sub-Form field. For example if you have
one sub-form that is referenced by Sub-Form fields from separate applications,
each Sub-Form field within an application generates its own series of tracking
ID values, as shown in the following figure.
Option Action
Options Section
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Option Action
Key Field Select this option if you want the field to serve as the key field for
the application. Only one field can serve as the key field for an
application. You can select the key field values in search results,
and users can click the values to open individual records. Once
saved, you can only clear this checkbox by selecting the Key
Field checkbox for another field in the application. Also, when
you select the Key Field checkbox for a field and save your
changes, the Required Field, Search Results, and Search Default
Field checkboxes are automatically selected.
Configuration Section
Prefix Enter a prefix that you want to display before the system-
generated tracking ID. For example, if you enter "ABC" in this
field, the tracking ID value for a record could be "ABC123456."
Suffix Enter a suffix that you want to display after the system-generated
tracking ID. For example, if you enter "XYZ" in this field, the
tracking ID value for a record could be "123456XYZ."
This field type can be expressed using any of the following interface controls:
l Drop-down
l Radio buttons
l Checkboxes
l Listbox
l Values pop-up
If you select to use radio buttons when configuring a User/Groups List field, users
are restricted to making a single selection in the field. By choosing one of the other
available interface control types, you can specify the minimum and maximum
number of selections users are permitted to make in the field.
During the field configuration process, you must select at least one user or group to
display in the values list for the User/Groups List field. The users and groups from
which you can choose are those that have been defined in the Access Control
feature. To populate the field with users and groups, you can:
l Define a list of specific users and groups to display as available selections in the
field.
l Select the All Users and All Groups options to display every user and group
within the system.
l Select the Record Creator option to include the user who is adding or editing the
record as an available selection in the field.
l Select the Default to Creator's Groups option for the record creator or for any
selected group to define that user or group as the default selection for the field.
l Restrict the list of groups that display as available selections in the field by
selecting the Auto Restrict Groups option. This option limits the groups that are
available for selection to only those groups for which the user is a member. For
example, suppose that you select the Sales, Marketing, and Management groups
as available selections in the field. If a user adds a record in the application and
that user is a member of only the Marketing group, the Marketing group is the
only group available to that user for selection in the User/Groups List field.
Note: You can convert a User/Groups List field to a Record Permissions field to
limit record access to only those users or groups selected in the field. For
instructions on making this conversion, see Convert a User/Groups List Field to a
Record Permissions Field.
Option Action
Select the type of display control that you want to use for
the field:
l Dropdown
l Radio Buttons
l Check Boxes
l Listbox
l Values Popup
Options Section
Option Action
Required Field Select this option to require users to supply a value for the
field when adding or editing a record in the application.
Required fields are indicated with an icon (selected in the
Appearance feature) to alert users that they must supply a
value. If this checkbox is not selected, users can skip this
field when adding or editing a record in the application.
Auditing Information Select this option to display auditing information next to the
field each time that its value is changed. The auditing
information includes only the name of the user who made
the change and the date and time of the change. If this
checkbox is not selected, auditing information is not
displayed with the field in the user interface.
Search Results Select this option to make this field available for display in
search results. If this checkbox is not selected, you cannot
include this field in search results or reference the values in
the field in search filters.
Search Default Field Select this option to include the field by default in search
results for the application. This option does not prevent
users from removing the field from the Search Results page.
Users can click Modify in the toolbar and remove the field
from the Fields to Display section of the Advanced Search
page for the application.
Advanced Field Select this option to add descriptive text and alter the
Display standard display of the field. After selecting this checkbox,
specify the display text and layout for the field in the
Advanced Field Display Options section.
Validate Always Select this option to validate the field when any field has
changed when saving a record. If the Validate Always
option is not selected, the field is validated only when the
value in that field has changed.
Configuration Section
Column Layout If you selected the Radio Buttons or Check Boxes display
control in the Display Control section, you can configure
the number of columns in the field by selecting the desired
number of columns from the Column Layout drop-down
menu.
Option Action
Field Height If you selected the Listbox display control in the Display
Control section, you can configure the height of the field in
lines by selecting the desired number of lines in the Field
Height field. If more values are available for selection in the
field than the number of lines you specified for the field
height, a vertical scroll bar will appear in the field to enable
users to view all available values.
Display Text Enter your supporting text in this field. For example, you
can enter a specific question related to values users enter in
the field, such as "When was the date of your last security
audit?" This text is always displayed, even if you select to
hide the field name.
Layout Select whether to display or hide the field name and whether
to display the values horizontally or vertically. See the
examples provided in the Preview field.
Option Action
Auto Restrict Groups Select this option to restrict the list of groups that display as
available selections in the field. This option limits the
groups that are available for selection to only those groups
for which the user is a member. For example, suppose that
you select the Sales, Marketing, and Management groups as
available selections in the field. If a user adds a record in the
application and that user is a member of only the Marketing
group, the Marketing group will be the only group available
to that user of selection in the User/Groups List field.
This field type can be expressed using one of several interface control types:
l Drop-down
l Radio buttons
l Checkboxes
l Listbox
l Values pop-up
If you select to use radio buttons when configuring a Values List field, users are
restricted to making a single selection in the field. If you choose one of the other
control types for the field, you can specify the minimum and maximum number of
selections users are permitted to make in the field.
During the configuration process, you can populate a Values List field with either a
custom or a global values list. If you choose to use a custom values list, you must
define the values for the field.Custom values lists cannot be used to populate any
other Values List field. If you choose to use a global values list, you can populate
the field with an existing global values list in the system.
Note: You can convert an existing field-specific values list to a global values list,
which will enable you to reuse the list when creating other Values List fields.
Users who have rights to add or edit global and field-specific values lists can add or
edit values in a values list by clicking Edit below or next to the field in a content
record.
An advanced option for the Values List field type is the ability to define it as a
calculated field. When this option is enabled, you can specify a formula for
dynamically computing the field's value. For example, you could create the
following formula to populate the Values List field with the value High or Low
depending on another field's value within the record:
IF([Risk Rating]>=10, ValueOf (“High”), ValueOf (“Low”))
The calculated field would display as "read-only" for all application users, and its
value would be updated each time the field was recalculated.
See the following topics for additional information about numeric fields:
l Attachment l Numeric
l Image l Sub-Form
l IP Address l Text
l User/Group l Voting
List
l Values List
l Attachment l Numeric
l Image l Sub-Form
l IP Address l Text
l User/Group l Voting
List
l Values List
Option Action
Control Select the type of display control that you want to use for the
field:
l Dropdown
l Radio Buttons
l Check Boxes
l Listbox
l Values Popup
Options Section
Option Action
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required
fields are indicated with an icon (selected in the Appearance
feature) to alert users that they must enter a value. If this option is
not selected, users can skip this field when adding or editing a
record in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes the name of the user who made the change and the date
and time of the change. If this option is not selected, auditing
information is not displayed with the field.
Search Results Select this option to make this field available for display in search
results. If this option is not selected, you cannot include this field
in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar of the Search Results page and remove the
field from the Fields to Display section of the Advanced Search
page in the application.
Trending Select this option to enable trending for the field. After selecting
this option, specify the following:
Option Action
Duration Select the duration for which you want the Platform
Type to retain trending data. The available values are
calculated in days as follows:
Days 1 day
Months 30 days
Quarters 90 days
Description Links Select this option to display the selected value for the field as a
hyperlink when users view records in the application. Users can
click the linked value to read a description of that value.
Advanced Field Select this option to add descriptive text and alter the standard
Display display of the field. After selecting this option, specify the display
text and layout for the field in the Advanced Field Display
Options section.
Option Action
Validate Always Select this option to validate the field when any field has changed
when saving a record. If the Validate Always option is not
selected, the field is validated only when the value in that field
has changed.
Configuration Section
Minimum and If you selected the Radio Buttons, Check Boxes, Listbox, or
Maximum Values Popup display control in the Display Control section, you
Selections can specify the minimum and maximum number of values that can
be selected in the field. Select the desired number of values in the
Minimum Selections and Maximum Selections fields.
Column Layout If you selected the Radio Buttons, Check Boxes, or Listbox
display control in the Display Control section, you can configure
the number of columns in the field by selecting the desired
number of columns from the Column Layout menu.
Field Height If you selected the Listbox display control in the Display Control
section, you can configure the height of the field in lines by
selecting the desired number of lines in the Field Height field. If
more values are available for selection in the field than the
number of lines you specified for the field height, a vertical scroll
bar will appear in the field to enable users to view all available
values.
Advanced Field Display Options Section – If you selected the Advanced Field Display
option, you can specify the display text and layout options.
Display Text Enter your supporting text in this field. For example, you can
enter a specific question related to values users enter in the field,
such as "When was the date of your last security audit?" This text
is always displayed, even if you select to hide the field name.
Layout Select whether to display or hide the field name and whether to
display the values horizontally or vertically. See the examples
provided in the Preview field.
Related Topics
Configure the Display and Functionality of a Field
Global Values List Field
Option Action
Select the type of display control that you want to use for the
field:
l Dropdown
l Radio Buttons
l Check Boxes
l Listbox
l Values Popup
Options Section
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required fields
are indicated with an icon (selected in the Appearance feature) to
alert users that they must supply a value. If this checkbox is not
selected, users can skip this field when adding or editing a record
in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Option Action
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
Trending Select this option to enable trending for the field. After selecting
this option, specify the following:
Duration Select the duration for which you want the Platform
Type to retain trending data. The available values are
calculated in days as follows:
Days 1 day
Months 30 days
Quarters 90 days
Description Links Select this option to display the selected value for the field as a
hyperlink when users view records in the application. Users can
click the linked value to read a description of the value from a
pop-up window.
Option Action
Advanced Field Select this option to add descriptive text and alter the standard
Display display of the field. After selecting this checkbox, specify the
display text and layout for the field in the Advanced Field
Display Options section.
Validate Always Select this option to validate the field when any field has changed
when saving a record. If the Validate Always option is not
selected, the field is validated only when the value in that field
has changed.
Configuration Section
Minimum and If you selected the Dropdown, Check Boxes, Listbox, or Values
Maximum Popup display control in the Display Control section, you can
Selections specify the minimum and maximum number of values that can be
selected in the field. Select the desired number of values in the
Minimum Selections and Maximum Selections fields.
Column Layout If you selected the Radio Buttons or Check Boxes display control
in the Display Control section, you can configure the number of
columns in the field by selecting the desired number of columns
from the Column Layout drop-down menu.
Field Height If you selected the Listbox display control in the Display Control
section, you can configure the height of the field in lines by
selecting the desired number of lines in the Field Height field. If
more values are available for selection in the field than the number
of lines you specified for the field height, a vertical scroll bar will
display in the field to enable users to view all available values.
Advanced Field Display Options Section – If you selected the Advanced Field Display
option, you must enter supporting information and select a display option.
Option Action
Display Text Enter your supporting text in this field. For example, you can enter
a specific question related to that values that users enter in the
field, such as "When was the date of your last security audit?"
This text is always displayed, even if you select to hide the field
name.
Layout Select whether to display or hide the field name and whether to
display the values horizontally or vertically. See the examples
provided in the Preview field.
Calculation Properties Section – If you selected the Calculated Field option, you can
define a formula, specify when to recalculate, and specify how to handle errors.
Voting Field
The Voting field type allows users to rank a record in two ways. A Total Votes
tally allows users to vote for or against a content record. Each vote is assigned a
weight as determined by the field administrator. The field shows the total votes for
the record. An Average Votes tally allows user to rate the record based on a range
of 1 to 5. All votes are averaged to determine the overall rating, which is reflected
in the field.
By configuring voting reset rules, field administrators can determine when the votes
in the Voting field should be reset, if at all. Both field options provide the ability for
a defined set of users. You can allow Field Administrators to view a detailed report
when each user voted on the content along with the rating provided. This field
provides access to the Voting Field Detail report. This report lists the user, email
address, date, and rating for the field.
For instructions on configuring the Voting field type, see Configure the Display and
Functionality of a Field and Voting Field Options.
Record Save Validation
The Validate Always option on the Options tab of the Manage Field page causes
the field to validate when any field has changed when the user saves a record. If
the Validate Always option is not selected, the field is validated only when the
value in that field has changed.
Field Validation Configuration
The minimum and maximum values are now validated for relationships between
field types.
The Voting Field Value validation rule applies to this field type.
Option Action
Options Section
Search Results Select this option to make this field available for display in
search results. If this checkbox is not selected, you cannot
include this field in search results or reference the values in
the field in search filters.
Search Default Field Select this option to include the field by default in search
results for the application. This option does not prevent
users from removing the field from the Search Results page.
Users can click Modify in the toolbar and remove the field
from the Fields to Display section of the Advanced Search
page for the application.
Validate Always Select this option to validate the field when any field has
changed when saving a record. If the Validate Always
option is not selected, the field is validated only when the
value in that field has changed.
Configuration Section
Vote Tally In the Vote Tally field, select whether the results should
display a total number of votes cast or an average of the
ratings provided by end users.
Vote Weight In the Vote Weight field, select the numeric value for how
much each vote is worth. For example, if the Vote Weight is
"10" and ten users have submitted a vote, the total value
displayed would be "100."
Option Action
Note: You can also create field-level Help using text boxes in an application's
layout. Text boxes enable you to provide instructions or additional information that
are displayed above, below or beside a field when users add, edit or view records in
an application. For guidance on creating text boxes, see Add Text Boxes to an
Application's Layout.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
6. In the View Display Options and Edit Display Options sections, select one of
the following options for displaying your Help text for View and Edit modes.
Note: If you choose to display field Help in Edit mode, the Help is displayed for
users when they add or edit a record in the application where the field resides.
If you choose to display field Help in View mode, the Help is displayed for
users when they view a saved record in the application where the field resides.
If you choose to display field Help in both Edit and View modes, the Help is
displayed for users when they add, edit or view a record in the application
where the field resides.
7. Click Apply.
Next Steps
Assign Access Rights to a Field
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
6. If you selected the Private option, assign rights to the field according to the
following instructions.
Option Action
Grant or Revoke Field From the Available list, select the users or groups that
Access you want to assign field access. Your selection is
displayed in the Selected list. To revoke access to the
field, click to the right of the user or group name in
the Selected list.
Define Access as Full or To grant full access rights (read and edit) for the field to
Read Only a user or group in the Selected list, select the Full
Access checkbox to the right of the user or group name.
To limit access to a read-only status, clear the Full
Access checkbox.
7. Click Save.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
2. Click the Fields tab and in the Field Name column, click the numeric field.
The Manage Fields page is displayed.
3. Click the Options tab and select Numeric Ranging.
4. Click Save in the toolbar to return to the Fields tab of the Manage Applications
page.
5. In the Field Type column for your Numeric field, click the Numeric Ranges
link.
6. Create the number of numeric ranges for the field:
a. To add a new numeric range, click Add New.
b. To edit the properties of an existing range, click the range in the Ranges list
to display its properties in the fields to the right.
c. In the Name field, enter the name of the range.
d. In the Beginning Value and Ending Value fields, enter the values that
define the range.
These fields accept only numeric values.
e. Click Apply.
f. Add additional numeric ranges, if desired.
7. Click Save.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
Note: If you cannot select the application, you do not have access rights to
the application.
5. Click Save.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
5. Click Save.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Note: If you selected to use global values lists to populate the Matrix field's
column and row values, the Column Values and Row Values links are not
displayed on the Fields tab of the Manage Applications page.
3. In the Field Type column, click Column Values to open the Manage Global
Values List page.
This page provides controls for naming and arranging column values.
4. To add a new value, click Add New in the Values control group.
5. To edit the properties of an existing value, in the Structure list of the Values
control group, click the name.
6. In the Text Value field, enter the value as you want it to display in the values
list. Enter a description in the Description field.
7. To make the value available for selection by the user, select Active. If you do
not want users to be allowed to select the value, clear the Active checkbox.
Inactive values are not available for selection, but existing usages of the value
are preserved.
8. Click Save in the page toolbar to save the value and return to the Manage Fields
page.
9. In the Field Type column , click Row Values to open the Manage Field -
Specific Values List page.
10. Repeat steps 4-8 above to create row values for the Matrix field.
11. Click to return to the Manage Applications page.
Delete a Field
Complete this task to delete a field.
Procedure
1. From the Administration workspace, navigate to Navigation Menu >
Application Builder > Manage Applications.
2. Select the application that you want to update.
3. Click the Fields tab.
This tab displays all existing fields in the application along with controls for
adding, editing and deleting fields.
4. Click the row and view the description of the field that you want to delete.
6. Click OK.
Note: If trending is enabled for the field, all trending data associated with the
field is deleted. An asynchronous cleanup job that runs once per day removes
both expired trended data and any trended data for fields that the user has
disabled trending.
Configuring Trending
Trending is a method of data tracking that enables you to track status changes for a
Numeric or Values List field when trending is enabled. The trending data allows
you to monitor a specified field over time so that you can make informed business
decisions.
Trending charts allow you to observe patterns in the trending data over a specified
period. The chart reflects a plot point for each time a field value is saved. (For
more information, see Viewing a Trending Chart in a Record.) When a field is
enabled for trending, the Platform captures trending data for the specified field and
retains the data for the specified duration period.
An administrator can perform any of the following tasks related to trending:
l Add a trending chart to an application layout
l Enable trending for a field
l Disable trending on a trended field
l Delete a field
Trending charts can be included in a package for migrating from one instance to
another. Certain conditions apply when packaging trending chart objects. You can
also map trending chart objects in Mapping Analyzer.
Trending Examples
The following examples demonstrate the behavior of trending functionality.
Example A: You might create a trending chart called "Safety Incidents" to track
the number of safety incidents that occur at a facility before safety policies are
instituted. If the duration period was specified as one year (365 days),you might
view the trending chart and observe that the number of safety incidents at the
facility has decreased during the one year duration period. You might conclude that
the safety policies are working.
Example B: To expand on Example A, suppose the duration period is changed from
one year to one month. The trending chart contains one year of data at the time the
specified duration period is changed. The next day, the trending data shows only the
one-month period once an asynchronous job runs. This once-daily cleanup job
removes both expired trended data and any trended data for fields that you have
disabled trending.
Example C: You might not update a trending-enabled field until the duration period
elapses. When the update takes place after the duration period ends, the chart
reflects data for a longer period than specified in the duration period. Trended data
is not removed until an asynchronous job runs or the trending-enabled field is
deleted.
Procedure
1. From the Administration workspace, navigate to the Navigation Menu >
Application Builder > Manage Applications.
2. Select the application that you want to update.
3. On the Fields tab, select the Numeric or Values List field for which you want
to enable trending.
4. Select the Enable trending options for this field option.
The Duration Type and Duration Amount options are displayed.
5. From Duration Type, select the duration for which you want the Platform to
retain trending data.
6. In Duration Amount, enter a numerical value that specifies the number of
days, months, quarters, or years for which the Platform retains trending data.
7. Click Save or Apply.
Procedure
1. From the Administration workspace, navigate to Navigation Menu >
Application Builder > Manage Applications.
2. Select the application that you want to update.
3. On the Fields tab, select the trended field for which you want to disable
trending.
4. Clear the Enable trending options for this field checkbox.
5. Click Save.
A warning message is displayed, indicating that existing trending data will be
purged and trending report filters will be affected.
6. Click OK to continue.
Icons provide a visual to the type of field. The following table describes the icons
that might be displayed in the field bar of a field. Required fields are denoted with
an asterisk (*).
Icon Description
Grid (Table field type). Denotes the field is a table field type.
You can perform the following tasks to customize the layout of an application:
l Create Tabbed Groupings of Fields in an Application
l Add a Field to an Application
l Add Sections to an Application's Layout
l Manage the Visibility Properties of a Field in an Application
l Add Text Boxes to an Application's Layout
l Add Placeholders to an Application's Layout
l Add Custom Objects to an Application's Layout
l Arrange Elements in an Application's Layout
Note: If a user does not have access to any of the fields on a tab, the tab is not
displayed when the user adds or edits records within the application. Using data
driven events, tabs can be dynamically shown or hidden based on the current state
of content, including nested tabs. When a data driven event hides all sections on a
tab, the tab is also hidden.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Add New Tab Set Add Tab to Tab Set Add Fields to a Tab
a. Expand the Add New a. Click the New tab in a. Add a section to the
Layout Object in the the tab set that you tab.
left pane. added.
b. Drag and drop the
b. Click Add Tab Set b. In the Tab Name fields on to the Layout
and drag it into the field, enter a name for page to add fields.
layout area. The Tab the tab
c. Arrange the fields
Set Name dialog box
c. To display a tab by until they are
is displayed.
default when users displayed in the
c. In the Tab Set Name open the application, correct order.
field, enter a name for select Display this tab For more information
the tab set. by default when users on creating fields, see
first access the page Create a Field.
d. From the Height list,
select one of the d. Click OK.
following options:
Note: The default tab
l To use default is displayed first for
height settings for users when they add
the tabs in the tab or edit records in the
set, select All from application. It does
the Height list and not have to be the left-
click OK. most tab. If a user does
l To select the height not have access to any
in pixels for the of the fields on the
tabs in the tab set, default tab, the default
select the value and tab is not displayed
click OK. and the tab with the
application key field
is displayed instead as
the default.
Add New Tab Set Add Tab to Tab Set Add Fields to a Tab
correct order.
To delete a tab set, click
the arrow to the right of
the title that you want to
delete and select Delete
Tab Set.
5. Click Apply.
Note: If a user does not have access to any of the fields within a section, the
section is not displayed when the user adds, edits, or views records within the
application.
The Layout tab provides a convenient drag-and-drop interface for creating and
arranging sections. When you create a new section, you must enter a name and
define if and how it is displayed to end users.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
6. In the Text field, enter the text that you want to display within the text box
when it is displayed for users as they add, edit, or view records within the
application.
For example, you could provide instructions, definitions of new terms or
background information to help users understand a particular process.
The following figure shows a text box arranged among fields in a record.
7. Select from the following options for displaying the text box:
l Edit Mode. Display the text box when editing a record.
l View Mode. Display the text box when viewing a record.
8. Click OK.
9. Click Save.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Procedure
1. From the Administration workspace, navigate to Navigation Menu >
Application Builder > Manage Applications.
2. Select the application that you want to update.
3. Click the Layout tab.
4. If you are working in a leveled application, from the Level list in the left pane,
select the data level that contains the layout you want to manage.
The fields and other page elements for that level are displayed in the layout area
and in the Available Fields list.
5. To drag a field into the application layout, click the field in the Available Fields
list and drag it to the correct position in the layout.
Note: For questionnaires, the Review Date and Submit Date fields must be on
the layout to be updated by a data driven event Set Date action. In addition, the
Set Date actions for setting the review date and setting the submit date are
created in the applicable DDE rules for Set Review Date and Set Submit Date.
By default, the Review Date and Submit Date fields are in the General
Information section.
6. To add a tab set, section, text box, placeholder, custom object, or trending chart
to the application page layout, click the page element under the Add New
Layout Object list, and drag it to the correct position.
7. To move a single element, click the element and drag it to the correct location.
When you release your mouse, the element locks into place.
8. If you are working in a multi-tab layout and you want to move an element from
one tab to another, click and drag the element to the tab and position you want to
move it to.
9. If you are working in a two-column layout and you want a field, text box,
placeholder, custom object, or trending chart to span across columns, click the
drop-down arrow to the right of the element name and select from the following
spanning options:
l Select Edit Span Properties to open the Span Properties dialog box, and
select one of the following options from the Column Span section.
Option Description
Do not span columns The element consumes only one column of space.
Span two columns The element always spans across the columns. If you
change the application column settings to two
columns, the element then spans two columns.
l Select one of the following options from the Row Span section.
Option Description
Do not span rows The element consumes only one row of space.
10. To remove a field, section, text box, placeholder, custom object, or trending
chart from the application page layout, click the element and drag it to the
Available Fields list.
The element is not deleted; however, users cannot see it when they add, edit, or
view records in the application.
Note: Leaving a field in the Available Fields list, rather than arranging it in the
application page layout, can be useful when you want the field to remain active,
but you do not want the user to have the ability to view the field. For example,
you may have a system field that is referenced in a formula for a calculated
field. It would be important for the field to remain active so the system can
continue to populate the value of the field and use those values in calculations,
but you might want to hide the field from view for end users.
11. To permanently delete a tab set, section, text box, placeholder, custom object,
or trending chart from the application page layout, click the drop-down arrow
for the element in the page layout and click Delete [element name].
Note: To delete a tab set, you first must delete the fields and tabs in the tab set.
Procedure
1. From the Administration workspace, navigate to Navigation Menu >
Application Builder > Manage Applications.
2. Select the application that you want to update.
3. Click the Layout tab.
4. Select Add New Layout Object in the left pane.
5. Click and drag the Add Trending Chart option to the layout area.
6. In the Name field, enter the heading that you want to display in the layout.
7. From the Trending Field list, select the trending-enabled field for which to
display chart data.
8. (Optional) To display the chart name as the title, select Show Title.
9. Click OK to close the Trending Chart Description dialog box.
10. Click Apply.
Chapter 4: Reports
Application Reports
You can access reports by clicking on the Manage Applications page.
The following table describes the reports available for each application in the
Platform.
Report Description
Application Cal- Shows the configuration, including the formula, for each cal-
culation Summary culated field in the application.
Application Custom Lists the custom objects and their associated content in the
Object Summary application.
Application Data- Lists the data driven events in the application, including the
Driven Events Sum- description, action type, and status.
mary
Application Field Shows the configuration of each field within the application.
Detail
Application Private Provides a summary of the access control rights for private
Fields fields in the application. It contains all private fields that give
a user or group full access, cascade, or read-only privileges.
Application Summary Lists all field types in the application. It includes a count of
by Field Type each field type and the total number of standard and calculated
fields.
Report Description
Application Values Lists the values and configuration for each Values List field in
List Summary the application.
Record View Detail Provides details of the date and time users accessed a particular
application record.
Record View Summary Provides a summary of the content records that have been
accessed by all users during a given time frame. It also shows
the number of content records in each application and the num-
ber of times a record has been accessed in each application. In
addition, the report contains the total percentage of all content
hits in the system and each application's portion of that total.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Calculations
Contents
Preface 9
About this Guide 9
Building Formulas 9
Executing Calculations 9
Resolving Dependencies 10
Essential Terminology 10
Product Documentation 11
Support and Service 12
Chapter 1: Calculations 15
Calculations Process Overview 15
Immediately Applied Calculations 15
Asynchronous Job Calculations 16
Calculation Properties 16
Formula Builder 16
Recalculation and Error Handling Rules 16
Define the Calculation Properties 17
Recalculation Conditions 18
Recalculations in View Mode 19
Recalculations in Edit Mode 19
Calculated Field Formula 21
Other Recalculation Conditions 22
Recalculation Scheduling 23
Schedule a Recalculation 24
Execute an On-Demand Recalculation 24
Force Content Recalculation 25
Chapter 2: Calculation Execution 27
Execute Calculations 27
Special Considerations 27
Dependencies Resolution 28
Syntax Rules 28
References in Formulas 28
Values List Value References 29
Cross-Application References 30
Leveled Application References 30
Sub-Form References 31
Chapter 3: Formula Builder 33
Calculated Fields 33
Create a Calculated Field 34
Formula Builder 35
Build a Formula for a Calculated Field 35
Define the Execution Order for Multiple Calculated Fields 37
Field References within Calculated Field Formulas 38
Functions and Operators for Calculated Field Formulas 39
Functions 40
3
RSA Archer GRC Platform Calculations
Operators 40
Date Functions 41
DATEADD Function 42
DATEDIF Function 43
DATEFORMAT Function 45
DATETIMEVALUE Function 48
DAY Function 49
HOUR Function 50
MINUTE Function 50
MONTH Function 51
MONTHNAME Function 52
NOW Function 52
QUARTER Function 53
TODAY Function 54
WEEKDAY Function 54
WEEKNUMBER Function 55
YEAR Function 56
Financial Functions 57
DB Function 57
DDB Function 61
FV Function 63
IPMT Function 65
IRR Function 67
ISPMT Function 69
MIRR Function 70
NPER Function 71
NPV Function 73
PMT Function 75
PPMT Function 76
PV Function 78
QUARTILE Function 80
RATE Function 81
SLN Function 83
SYD Function 84
VDB Function 84
Logical Functions 86
AND Function 86
IF Function 87
NOT Function 88
OR Function 89
Math Functions 90
ABS Function 91
ACOS Function 91
ACOSH Function 92
ASIN Function 92
ASINH Function 93
ATAN Function 93
ATAN2 Function 94
ATANH Function 95
COMBIN Function 95
COS Function 96
4
RSA Archer GRC Platform Calculations
COSH Function 97
DEGREES Function 97
EVEN Function 98
EXP Function 98
FACT Function 99
FLOOR Function 100
INT Function 100
LN Function 101
LOG Function 101
LOG10 Function 102
MOD Function 102
ODD Function 103
PI Function 104
POWER Function 104
PRODUCT Function 105
QUOTIENT Function 106
RADIANS Function 107
RAND Function 107
ROUND Function 107
ROUNDDOWN Function 108
ROUNDUP Function 109
SIGN Function 110
SIN Function 111
SINH Function 111
SQRT Function 112
SUM Function 113
SUMIF Function 114
SUMX2MY2 Function 125
TAN Function 126
TANH Function 126
TRUNC Function 127
Statistics Functions 128
AVEDEV Function 129
AVERAGE Function 130
AVERAGEA Function 131
BINOMDIST Function 132
CHIDIST Function 133
CHIINV Function 134
CONFIDENCE Function 135
CORREL Function 136
COUNT Function 137
COUNTA Function 138
COUNTBLANK Function 140
COUNTIF Function 141
COVAR Function 144
CRITBINOM Function 145
DEVSQ Function 146
EXPONDIST Function 147
FDIST Function 148
FINV Function 149
FISHER Function 150
5
RSA Archer GRC Platform Calculations
6
RSA Archer GRC Platform Calculations
7
RSA Archer GRC Platform Calculations
8
RSA Archer GRC Platform Calculations
Preface
Building Formulas
The Formula Builder provides direct access to the full power of the calculation
engine. Less experienced users can leverage the build-and-learn nature of the
interface, allowing them to review a listing of functions and operators and the
ability to quickly determine what fields are available to use within the calculation
syntax. Power users can use direct formula entry, name-based field referencing and
a familiar function and operator library. For more information on constructing
calculated field formulas, see Build a Formula for a Calculated Field.
Executing Calculations
Calculations execute when a record is saved or applied. The Platform determines
whether changes in the record warrant a recalculation of the record's calculated
fields. If the update to the record does not impact a specific calculated field, the
Platform does not recalculate the value of that field. This evaluation optimizes
system performance and eliminates unnecessary calculations. The Platform
administrators have the option, though, to recalculate a specific field within an
application, even if the changes within the record do not lead to an updated
calculated value.
Preface 9
RSA Archer GRC Platform Calculations
If no changes are committed to a record, calculated values within that record are
not updated. At times, though, business requirements may dictate that date-sensitive
formulas be recalculated on a daily basis. To meet this need, the Platform offers a
recalculation scheduler. Once a Platform application has been placed on a
recalculation schedule, the system automatically refreshes the values of all
calculated fields each day at the specified time. For information on managing
recalculation schedules, see Schedule Recalculations.
Resolving Dependencies
One of the most powerful facets of working with calculations is the ability to
reference one or more calculated fields within another calculated field formula. For
example, a "final score" value might be computed by summing the values of several
calculated "section score" fields. In such a scenario, there are inherent calculation
dependencies. Each of the section score values must be computed before the final
score can be computed. To address scenarios like this, an interactive list interface
is provided to allow administrators to configure the necessary order for performing
calculations. Once the field calculation order is established for an application, field
dependencies simply manage themselves. For more information on resolving
dependencies within calculations, see Define the Execution Order for Multiple
Calculated Fields.
You can perform the following tasks to manage calculations:
l Create a Calculated Field
l Build a Formula for a Calculated Field
l Define the Calculation Properties
l Define the Execution Order for Multiple Calculated Fields
l Execute Calculations
l Schedule Recalculations
l Execute an On-Demand Recalculation
Essential Terminology
It is important to understand the following terms when working with calculated
fields.
10 Preface
RSA Archer GRC Platform Calculations
Term Definition
Always (calculate) A property of a calculated field that specifies that the field is
always recalculated whenever content changes.
Calculate Immediately The means to update a calculated field inline while viewing or
editing a record that has a calculated field.
Formula Builder A built-in formula editor that contains a library of functions and
operators. Use this tool to create formulas for calculated fields.
Marked Content Any content that has an outstanding calculation that needs to
be recalculated. This content is ‘marked’ for recalculation.
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Preface 11
RSA Archer GRC Platform Calculations
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
12 Preface
RSA Archer GRC Platform Calculations
Preface 13
RSA Archer GRC Platform Calculations
Chapter 1: Calculations
Chapter 1: Calculations 15
RSA Archer GRC Platform Calculations
Calculation Properties
The calculated field properties include the formula, and recalculation and error
handling rules.
Formula Builder
The Formula Builder provides direct access to the full power of the calculation
engine. Less experienced users can leverage the build-and-learn nature of the
interface. They can review a listing of functions and operators to determine quickly
what fields are available to use in the calculation syntax. More experienced users
can use direct formula entry, name-based field referencing, and a familiar function
and operator library.
Formula Builder is accessed from the Add Formula link in the Calculation
Properties section of the Manage Field: [New Field] page.
16 Chapter 1: Calculations
RSA Archer GRC Platform Calculations
Rule Description
Error Handling Determines what happens when a calculation error occurs. This rule
has the following options:
Display Error. The word Error is displayed as a link when a
calculation error occurs. Users with the appropriate access privileges
can click the link to open the Calculation Error page where the error
is explained.
Use No Value. An empty value is saved in the field when a
calculation error occurs.
Use Specific. A specific value is saved in the field when a
calculation error occurs.
Procedure
1. Select the component that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click the link (Manage Applications, Manage Questionnaires, or Manage
Sub-Forms) for the type of component that you want to manage.
d. Click the application, questionnaire, or sub-form.
Note: If you cannot select the name, you do not have access rights to it.
Chapter 1: Calculations 17
RSA Archer GRC Platform Calculations
2. Click the Fields tab and click the field that you want to define as a calculated
field. This must be a Date, Numeric, Text, or Values List field.
3. Click the Options tab.
4. Locate the Calculation Properties section. (If this section does not display,
verify that Calculated Field is selected in the Options section.)
5. In the Recalculation field, select from the following options:
l As Needed. Formulas are recalculated when a dependent field in the formula
changes.
l Always. Formulas are recalculated every time content is saved even though
a field is not referenced in the formula. Formulas that contain NOW ( ) and
TODAY ( ) functions, or user first name, last name, and middle name
(Editor) parameters are recalculated regardless of content change.
6. In the Error Handling field, select from the following options:
l Display Error. The word Error is displayed as a link when a calculation
error occurs. Users with the appropriate access privileges can click the link
to open the Calculation Error page where the error is explained.
l Use No Value. An empty value is saved in the field when a calculation error
occurs.
l Use Specific. A specific value is saved in the field when a calculation error
occurs.
7. Click Save.
Recalculation Conditions
Calculated fields can be recalculated in View or Edit mode. To initiate an
immediate recalculation, a user must have update permissions to the record. When
initiated from either mode, only the content that is 'marked’ is recalculated.
Content changes may result in outstanding calculations in a related level or
application.
The recalculation can be initiated when content is actually changed or for content
that has a status of ‘marked’ for recalculation. All calculated fields are recalculated
immediately within the current content. All related content affected by the change
is 'marked' and queued for recalculations in an asynchronous job. When save or
apply updates calculated fields and there are no other user changes, notification are
not sent.
When 'marked' content is calculated asynchronously, only the fields associated with
the executed job are calculated. Notifications are never sent. Notifications are only
sent when a user saves a record.
Calculated fields are only recalculated based on changes made directly in a data
feed, data import, web API, or scheduled recalculation jobs.
18 Chapter 1: Calculations
RSA Archer GRC Platform Calculations
Chapter 1: Calculations 19
RSA Archer GRC Platform Calculations
Action 2 User with Read and Update permissions returns to Application A in Edit
mode and clicks Save.
Scenario Application A has three fields Risk, Criticality, and Severity. Rating is a
related record in Application B.
[Total Risk] is dependent on the value of [Criticality].
SUM(REF([Risk], [Criticality]))
[Severity] is dependent on [Rating].
IF([Rating]=10, VALUEOF ([Severity],"High"),VALUEOF ([Severity],
"Low")
Action 1 User changes the value of Critically in Application B and clicks Save.
20 Chapter 1: Calculations
RSA Archer GRC Platform Calculations
Scenario There are four fields: Risk, Criticality, Controls, and Rating.
Risk is dependent on the value of Criticality.
SUM([Risk], [Criticality]).
Field Controls is dependent on the value of Rating.
IF(CONTAINS[Rating] “10”, RANK(REF([Controls] “5”)))
Chapter 1: Calculations 21
RSA Archer GRC Platform Calculations
Action 2 User with Read and Update permissions views the record in View
mode.
User notices message that content is not up to date and clicks
Recalculate.
When you changes the formula of a calculated field but does not schedule the
recalculation in an asynchronous job, the contents in this application affected by this
change is not ‘marked’. When this condition exists, the content status is updated by
a user saving the change or by the asynchronous job.
However, if you changes one or more fields and only schedules an asynchronous
job for one of the fields, all fields ‘marked’ for recalculation are included in the
asynchronous job.
Scenario There are four fields: Risk, Criticality, Controls, and Rating. Risk is
dependent on the value of Criticality. SUM([Risk], [Criticality]). Field
Controls is dependent on the value of Rating. IF(CONTAINS[Rating]
“10”, RANK(REF([Controls] “5”)))
Action 1 Administrator updates both formulas of the calculated fields and does not
schedule an asynchronous job to recalculate the fields.
Results Formulas are updated in the applications. [Risk] and [Controls] are not
‘marked’ for recalculation.
Action 2 User with Read and Update permissions views the record in View mode.
User is not notified that content is not up to date.
22 Chapter 1: Calculations
RSA Archer GRC Platform Calculations
Related Content. When a user, job engine, data feed, or Web API makes a change
to a field that affects changes in a related module, the following occurs:
l An asynchronous job is scheduled to recalculate all affected content one level
away of the related module, for example related record in current application or
cross-referenced application in related record.
l All affected content in the related module (one level away) is ‘marked’ for
recalculation.
Recalculation Scheduling
When scheduling recalculations for an application, those recalculations will impact
all records within the application, including records currently opened (locked) for
editing. When scheduling recalculations for a sub-form, those recalculations will
impact all records in the sub-form across all applications in which the sub-form is
embedded. If an application contains both a sub-form and a calculated field whose
value is dependent on a field within the sub-form, records in the application will
also recalculate when sub-form-level records recalculate. This is only true,
however, for application records in which a user has made at least one entry in the
embedded sub-form.
Note the following additional information about recalculations in calculated fields:
l In addition to scheduled recalculations, field recalculations are performed for a
record each time a user clicks Save or Apply for the record.
l Performing a search does not trigger a recalculation of field values.
l Scheduled recalculations are written directly to the database and are not
interpreted by the application as true “record save” events and are not captured
in the History Log field.
l Scheduled recalculations do not trigger notifications.
l Field-value changes stemming from a scheduled recalculation are not reflected
in the audit information displayed alongside a field.
l Each time that you create or edit a calculated field, the system searches for
NOW and TODAY in all of the application's or sub-form's formulas. If the
system can no longer locate either of these functions, any previously configured
recalculation schedule are automatically disabled for the application or sub-form.
l Fields with the As Needed option selected for recalculations are only
recalculated if the value will be changed.
l In multi-level applications, recalculation schedules are level-specific.
Chapter 1: Calculations 23
RSA Archer GRC Platform Calculations
Schedule a Recalculation
You can configure a batch recalculation schedule for an application or sub-form
using the Recalculation Schedule function. Records containing date information
may need to be updated on a scheduled basis, even if no other changes are being
saved to the record. By using the recalculation schedule option, you can ensure that
your date-based information is kept current. This option is available only if your
application or sub-form contains at least one calculated field that uses the TODAY
or NOW functions.
Procedure
1. Navigate to the Manage Applications page:
a. Click the Administration workspace.
b. On the Navigation Menu, click Application Builder.
2. Click Manage Applications, Manage Questionnaires, or Manage Sub-Forms
depending on the type of component that you want to manage.
3. Click the application, questionnaire, or sub-form that you want to update.
Note: If you cannot select the name, you do not have access rights to it.
Note: If your application or sub-form does not contain at least one calculated
field that uses the TODAY or NOW functions, you cannot access the
Recalculation Schedule dialog box. Scheduled recalculations are necessary only
if you need to evaluate content within the context of the passage of time.
6. In the Interval field, enter the frequency, in days, for how often you want to
execute a recalculation.
For example, if you entered "7", the application would recalculate every seven
days.
7. In the Begin Time field, enter the time of day that you want to execute the
recalculation.
8. In the Time Zone field, select the time zone to reference for determining the
Begin Time value.
9. Click Save.
24 Chapter 1: Calculations
RSA Archer GRC Platform Calculations
Important: Be careful when selecting this option as all calculated fields in all
records within the application, level (for leveled applications), or sub-form will be
recalculated, even fields that have been selected with the As Needed option at the
field level. This may impact system performance.
Note: When you are viewing a record of an application of which you are the
assigned owner or an administrator, you can recalculate all calculated fields within
the records. For more information, see Force Content Recalculation.
Procedure
1. Navigate to the Manage Applications page:
a. Click the Administration workspace.
b. On the Navigation Menu, select Application Builder.
2. Click the link (Manage Applications, Manage Questionnaires, or Manage
Sub-Forms) for the type of component that you want to manage.
3. Click the application, questionnaire, or sub-form that you want to update.
Note: If you cannot select the name, you do not have access rights to it.
Chapter 1: Calculations 25
RSA Archer GRC Platform Calculations
Procedure
1. View an existing record.
26 Chapter 1: Calculations
RSA Archer GRC Platform Calculations
Execute Calculations
Calculations are executed either through administrative or user functions. A formula
executed from an administrative function runs in an asynchronous job. This job can
be queued to run during normal processing or scheduled to run at a specific time. A
formula executed from a user function is triggered from the Recalculate button in
View mode, or the Apply or Save button in Edit mode.
Special Considerations
Formulas of calculated fields are allowed unrestricted access to data in all private
fields, regardless of the access rights configured for those fields.
Notifications are not sent if changes only affect a calculated field on Apply or
Save. If content changes are made to other fields, notifications are sent.
Changes must be detected and recognized for notifications to be sent. For example,
suppose Field A is a numeric field with the value of 5. A user changes this field to
a value of 10, and then back to a value of 5, and then saves. In this case, the
notification is not sent because the actual value of the field did not change. The
original and ending field value is 5.
Calculations are executed in the order that they are defined. Calculations that are
dependent on other calculations may not produce the intended results if they are not
correctly sequenced. Consider the calculation order to ensure correct calculations.
The calculation order can be rearranged.
Dependencies Resolution
One of the most powerful facets of working with calculations is the ability to
reference one or more calculated fields in another calculated field formula.
For example, a final score value might be computed by summing the values of
several calculated section score fields.
In this example, there are inherent calculation dependencies. Each of the section
score values must be computed before the final score can be computed.
Administrators can specify the order in which calculations are performing. After
the field calculation order is established for an application, field dependencies
simply manage themselves.
Syntax Rules
The formula syntax is vital to creating efficient and effective formulas. Formula
Builder includes a library of functions and operators. Each function includes a full
description and proper syntax.
References in Formulas
References in formulas can be fields in an application, sub-form, or questionnaire.
Fields can reside in the current application or in cross-referenced applications. A
calculated field can reference fields in the current application, in a sub-form
embedded in the application, or in a related application. A calculated field for a
sub-form can reference fields in the sub-form or in a related application.
Results This formula evaluates the Location field for the presence of the value New
York.
If the value is present and selected, the value Local is selected in the
calculated Values List field.
If the value New York is not found, the calculated field is populated with
the value Global.
If the Values List values in a calculated field formula have associated numeric
values, those numeric values can be referenced using the
SELECTEDVALUENUMBER function. Use this function to create a formula that
produces an average of the numeric values selected in the field.
Scenario Suppose the Affected Departments field has the values Accounting, IT, and
Sales and those text values are assigned the numeric values 10, 8, and 6,
respectively.
Results If the values Accounting and IT are selected in the Affected Departments
field, this formula populates the calculated field with the value 9.
Cross-Application References
Calculated fields in an application, questionnaire, or sub-form can be referenced in
related applications or questionnaires, resulting in cross-application calculations.
The following figure shows the fields that are available for cross referencing in a
formula.
The following example shows a formula for references of a field from a related
leveled application:
Results This formula averages the values of the Severity Rating field for
related records in the Responses data level of the related application.
Suppose there are three records related to the associated record with
values of 2, 9, and 4 in the Severity Rating field in the Responses data
level.
The calculation for this formula returns a value of 5.
Sub-Form References
A calculated field of a sub-form can reference fields in the sub-form or in a related
application. Calculated fields in a sub-form cannot reference fields in its parent
application.
When a field in a related application is changed, sub-form records are queued for
recalculation in an asynchronous job.
The following field types can be used in a formula for creating a calculated field in
a sub-form:
Calculated Fields
A calculated field is not an additional field type, but a configuration option for
existing field types within the Platform. Calculations can be created for fields in
any application, questionnaire or sub-form for which you have been assigned
ownership rights. Platform administrators can calculate the values of the following
field types:
l Text
l Numeric
l Date
l Values List
Note: Calculated fields are read only for all application users. The value of a
calculated field is populated by the system.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
Platform database. As a result, dates and times in calculations are returned in
GMT.
When creating a calculated field, you can build a formula for the field using a
library of functions and operators provided by the Platform. The following is an
example of a formula for determining the number of days between the date a record
was last updated and the date of a critical deadline:
DATEDIF([Last Updated Date],[Project Deadline])
Other examples of how your organization may use this feature include the
following:
l Creating custom tracking IDs
l Comparing the values of two fields
l Performing a calculation to be used in the calculation of another field
l Displaying the number of days remaining prior to a due date
l Performing complex risk calculations based on the results of values in other
fields
l Calculating custom threat and severity ratings
The calculation formula is managed and configured for each individual field within
that field's Define fields page. This topic explains how to define a Date, Numeric,
Text, or Values List field as a calculated field and provides links to sub-topics for
configuring calculated field properties.
Procedure
1. Select the component that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click the link (Manage Applications, Manage Questionnaires, or Manage
Sub-Forms) for the type of component that you want to manage.
d. Click the application, questionnaire, or sub-form.
Note: If you cannot select the name, you do not have access rights to it.
2. Click the Fields tab and click the field that you want to define as a calculated
field. This must be a Date, Numeric, Text, or Values List field.
3. Click the Options tab.
4. In the Options section, select Calculated Field.
The Calculation Properties section is displayed.
Important: If you select Calculated Field and save this change for a field in
which user-entered values have already been entered, all values written to that
field are deleted across all records in the application and are replaced with
calculated values. Conversely, if you clear the Calculated Field checkbox for a
field in which calculated values have already been saved, those calculated
values are retained in the database.
Next Steps
Build a Formula for a Calculated Field
Formula Builder
The Formula Builder enables you to select fields whose values you want to
reference in the formula. For example, you could produce a formula that references
a Risk Rating field within an application or sub-form and multiplies that field's
value by 1.5 to produce a weighted risk score. For more information on referencing
fields in a formula, see Field References within Calculated Field Formulas.
Note the following when creating or modifying a formula for a calculated field:
l If a formula previously defined for a calculated field is altered, upon save the
user is prompted whether to recalculate the field.
l Values List fields that are configured to allow multiple selections can only be
referenced in formulas with the ISEMPTY, CONTAINS, and COUNT
functions. If a formula uses functions other than ISEMPTY, CONTAINS, or
COUNT to reference a multi-select Values List field with a Maximum Value
setting greater than 1, the formula fails validation.
l If a comparison operator (=, <, >, <=, >=, <>) references a Values List field
configured to allow multiple selections, the formula fails validation.
l Formulas for calculated fields that reside in a sub-form only are permitted to
reference other fields within the same sub-form. Calculated fields in a sub-form
cannot reference fields that reside in the parent application.
l Calculated-field formulas are allowed unrestricted access to data in all private
fields, regardless of the access rights configured for those fields.
Procedure
1. Select the component that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click the link (Manage Applications, Manage Questionnaires, or Manage
Sub-Forms) for the type of component that you want to manage.
d. Click the application, questionnaire, or sub-form.
Note: If you cannot select the name, you do not have access rights to it.
2. Click the Fields tab and click the field that you want to define as a calculated
field. This must be a Date, Numeric, Text, or Values List field.
3. Click the Options tab.
4. In the Calculation Properties section, click Add Formula.
The Formula Builder page is displayed. (If the Calculation Properties section
does not display, verify that Calculated Field is selected in the Options section.)
See Formula Builder.
Note: You also can edit a formula directly in the Formula field without opening
Formula Builder.
5. Scroll down to display the Help section and under Functions & Operators,
locate the functions and operators that you want to use in the calculated field
formula.
When you click a function in this list, the Description field displays a
description of the function, the proper syntax for using the function in a formula,
descriptions of each parameter in the syntax, and examples of the function in
use. When you click an operator in the list, the Description field displays a
description of the operator and an example of the operator in use.
6. In the Formula field at the top of the page, enter the functions and operators
that you want to include in the formula, using the syntax provided in the
Description field.
You can nest functions to create more complex formulas. In the following
example, the MAX function is nested within the IF function:
IF(MAX([Field 1],[Field 2])<12, "Minor", "Urgent")
This formula would determine the maximum value between Field 1 and Field 2
for a record, and if the maximum value is less than 12, the formula would return
the value Minor in the calculated field. If the maximum value is greater than or
equal to 12, the formula would return the value Urgent in the calculated field.
7. To include a field reference as a parameter for the formula, click the field in the
Available Fields list.
The field is added to your formula, and the field name is surrounded by
brackets, for example, [Field Name]. For a list of field types that you can
reference in a formula, see Field References within Calculated Field Formulas.
When a field is referenced in a formula, the value in that field is used to
compute the calculated field value in each record. For example, if you use the
DATEDIF function in your formula and reference the Last Updated Date and
Deadline fields within an application, the formula would produce a value of 15
days in the calculated field for a record if the Last Updated Date value for that
record is 1/1/2005 and the Deadline value is 1/15/2005.
Note: If you select a field value to reference in your formula and that value is
later modified within the values list, the field-value reference in your formula is
automatically updated to reflect the modified value.
9. When you finish creating the formula, click Validate in the top-right corner of
the Formula Builder.
If the validation process encounters an error in the formula, a message displays
that describes the error or alerts you that the formula contains an unknown error.
Important: The validation process only identifies one error at a time, even if the
formula contains multiple errors. If you get an error message, correct the error
and click Validate again. If you get another error message, correct that error as
well. Continue this process until the formula passes the validation process.
Next Steps
Define the Calculation Properties
Procedure
1. Click the Administration workspace.
2. In the Navigation Menu, click Application Builder.
A menu of Application Builder pages is displayed.
3. Click the link (Manage Applications, Manage Questionnaires, or Manage
Sub-Forms) for the type of component that you want to manage.
Note: If you cannot select the name, you do not have access rights to it.
l Related Records
l Sub-Form
l Text
l Tracking ID
l User/Groups List
l Values List
If you are creating a calculated field within a sub-form, you can reference the
following field types in a formula:
l Cross-Reference
l Date (with or without time information)
l First Published Date (with or without time information)
l Last Updated Date (with or without time information)
l Multiple Reference Display Control
l Numeric
l Record Status
l Related Records
l Text
l Tracking ID
l Values List
Note: You cannot reference some of these field types with all of the functions
available for calculated fields. For example, Math and Statistical functions, such as
ROUND, SUM, and AVERAGE, can only reference Numeric fields. The
DATEDIF and DATEFORMAT functions can only reference Date fields, and the
SUBSTRING function can only reference Text fields. For more information on the
types of fields that you can reference with various functions, see Functions and
Operators for Calculated Field Formulas.
Functions
The Formula Builder for calculated fields offers a library of functions divided into
categories. By clicking a category, you can see the functions that it contains, along
with a description of each function. To view a more detailed function description
that includes syntax requirements, parameter descriptions, and examples, you can
click the desired function. The functions are:
l Date Functions
l Financial Functions
l Logical Functions
l Math Functions
l Statistics Functions
l System Functions
l Text Functions
Operators
The Formula Builder also offers a library of operators divided into categories. By
clicking a category, you can see the operators that it contains along with a
description of each operator.
Arithmetic:
Operator Description
+ Addition (3 + 3)
- Subtraction (5 - 2)
Negation (-4)
* Multiplication (2 * 3)
/ Division (3 / 2)
^ Exponentiation (3 ^ 2)
Comparison:
Operator Description
= Equal to (3 = 3)
Text Concatenation:
Operator Description
In this formula, the Sample Field is not populated with the value "0" if the field is
empty or null. Instead, this formula returns FALSE when the Sample Field is empty
or null.
Date Functions
Date functions allow you to produce dynamic values through the management and
manipulation of date information. Available functions within this category include:
l DATEADD Function
l DATEDIF Function
l DATEFORMAT Function
l DATETIMEVALUE Function
l DAY Function
l HOUR Function
l MINUTE Function
l MONTH Function
l MONTHNAME Function
l NOW Function
l QUARTER Function
l TODAY Function
l WEEKDAY Function
l WEEKNUMBER Function
l YEAR Function
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
DATEADD Function
The DATEADD function increases or decreases a date/time value by a given
number of date/time units, such as days, hours or minutes.
Important: DATEADD always considers time, even if the referenced Date field is
not configured to show time information. If a literal date string is supplied that does
not contain time, midnight will be assumed.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
datetime_unit The date/time part that should be used as the interval for
increasing or decreasing the datetime parameter’s value. This
parameter can be entered as DAY, HOUR or MINUTE.
Examples:
Formula Result
DATEDIF Function
The DATEDIF function calculates the number of days between two dates.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
start_date The starting date of the period. This date can be entered as a
hard-coded value, for example, 10/21/2010, or as a Date-field
reference, for example, [date field name]. If a hard-coded value is
supplied, it must be wrapped in the DATETIMEVALUE
function. If time is supplied to DATETIMEVALUE in a date
string, it must be in 24-hour clock format, for example, 14:25
represents 2:45 PM.
end_date The ending date of the period. This date can be entered as a
hard-coded value (for example, 10/21/2004) or as a Date-field
reference (for example, [date field name]). If a hard-coded value is
supplied, it must be wrapped in the DATETIMEVALUE
function. If time is supplied to DATETIMEVALUE in a date
string, it must be in 24-hour clock format, for example, 14:25
represents 2:45 PM.
Examples:
Formula Result
DATEDIF(DATETIMEVALUE("10/21/2010"), [First 36
Published])
where the value in the First Published field for the
record is 11/26/2010.
DATEFORMAT Function
The DATEFORMAT function returns the supplied date in the format specified by
the date "mask."
Important: DATEFORMAT always permits full date and time formatting for the
given Date field, even if that field is not configured to display time information.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
date The starting date of the period. This date can be entered as a
hard-coded value, for example, 10/21/2010) or as a Date-field
reference, for example, [field name].
date_mask The mask used for formatting the returned date. The date_mask
parameter must be enclosed in quotes.
Date masks used with the DATEFORMAT function can contain
any combination of the "date part" masks. See Date Part
Descriptions.
MM.dd.yyyy 08.02.2010
yyyy-MM-dd 2010-08-02
MMddyy 080210
Examples:
Formula Result
DATEFORMAT([Stop], "H") 19
where the date-time value of Stop is 4/8/2010 7:00
PM.
DATEFORMAT([Logged], "m") 57
where the date-time value of Logged is 12/29/2010
3:57 PM.
hh Displays the hour as a two digit number (with a leading a leading zero, if
necessary) based on a 12-hour clock format (Example: 09)
t Displays the one-letter AM/PM designator appropriate for the given time,
regardless of whether the time is based on a 12-hour or 24-hour clock.
(Example: 1:00 P for 12-hour clock; 13:00 P for 24-hour clock)
tt Displays the two-letter AM/PM designator appropriate for the given time,
regardless of whether the time is based on a 12-hour or 24-hour clock.
(Example: 1:00 PM for 12-hour clock; 13:00 PM for 24-hour clock)
DATETIMEVALUE Function
The DATETIMEVALUE function converts a literal date/time string to a serial
number. The serial number represents the number of whole and partial days that
have elapsed since January 1, 1900.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
Examples:
Formula Result
DATETIMEVALUE("10/02/2010") 40453
DAY Function
The DAY function returns an integer between 1 and 31, which represents the day of
the month for the specified date value.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
Example:
Formula Result
DAY([Logged]) 13
where the value in the Logged field is 7/13/2010
10:45 AM.
HOUR Function
The HOUR function returns an integer between 0 and 23, which represents the hour
of the day for the specified date value. Formula validation will fail for this function
if the Time Information option is not enabled for the Date field referenced in the
date parameter.
Return Type: Numeric
Syntax: HOUR(date)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
HOUR([Logged]) 14
where the value in the Logged field is 7/13/2006
2:45 PM.
MINUTE Function
The MINUTE function returns an integer between 0 and 59, which represents the
minute of the hour for the specified date value. Formula validation will fail for this
function if the Time Information option is not enabled for the Date field referenced
in the date parameter.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
Examples:
Formula Result
MINUTE([Logged]) 45
where the value in the Logged field is 7/13/2006
2:45 PM.
MINUTE([Patch Date]) 0
where the Patch Date field is a Date field that is not
configured to accept time entry.
MONTH Function
The MONTH function returns an integer between 1 and 12, which represents the
month of the year for the specified date value.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
Example:
Formula Result
MONTH([Logged]) 7
where the value in the Logged field is 7/13/2010
2:45 PM.
MONTHNAME Function
The MONTHNAME function returns the name of the month for the supplied date
value. The return value is the full name, not an abbreviation.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
Example:
Formula Result
NOW Function
The NOW function returns the current date/time. Each time a record is
recalculated, the calculated field displays an updated date/time value. The full
timestamp is stored for the calculated Date field even if the field is not configured
to display time. If the Time Information option is later enabled for the field, the time
will be displayed as it was originally computed.
Internally, the NOW function returns a serial number that represents the number of
whole and partial days that have elapsed since January 1, 1900. From the user
perspective, the value returned by the NOW function displays differently depending
on the type of field to which the value will be returned.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Return Type: Varies based upon the type of field receiving the return value. See
the examples below.
Syntax: NOW( )
This function does not have any parameters.
Examples:
For these examples, assume that the current date and time is October 2, 2010 at
1:46 a.m.
QUARTER Function
The QUARTER function returns an integer between 1 and 4, which represents the
calendar quarter in which the specified date value falls.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
Example:
Formula Result
QUARTER([Due Date]) 4
where the value in the Due Date field is 12/15/2010
8:00 PM.
TODAY Function
The TODAY function returns the date value for the current date. Each time a
record is recalculated, the calculated field will display an updated date.
Internally, the TODAY function returns a serial number that represents the number
of whole days that have elapsed since January 1, 1900. From the user perspective,
the value returned by the TODAY function will display differently depending on the
type of field to which the value will be returned.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Return Type: Varies based upon the type of field receiving the return value. See
the examples below.
Syntax: TODAY( )
This function does not have any parameters.
Examples:
For these examples, assume that the current date and time is October 2, 2010 at
1:46 a.m.
WEEKDAY Function
The WEEKDAY function returns the day of the week for the supplied date value.
The return value is the full name, not an abbreviation.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
Example:
Formula Result
WEEKNUMBER Function
The WEEKNUMBER function returns a number that indicates the week in which a
given date falls for a calendar year beginning on January 1.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
Examples:
Formula Result
WEEKNUMBER([Due Date]) 38
where the value in the Due Date field is 9/14/2008
(a Sunday).
YEAR Function
The YEAR function returns the year corresponding to a date.
Important: Dates and times are converted to Greenwich Mean Time (GMT) in the
RSA Archer database. As a result, dates and times in calculations are returned in
GMT.
Parameter Description
date The date of the year that you want to find. This parameter can be
entered as a hard-coded date value, for example, 1/2/2010 or as a
date-field reference, for example, [date field name].
Example:
Formula Result
Financial Functions
Financial functions allow you to execute common calculations associated with the
financial industry. Available functions within this category include:
l DB Function
l DDB Function
l FV Function
l IPMT Function
l IRR Function
l ISPMT Function
l MIRR Function
l NPER Function
l NPV Function
l PMT Function
l PPMT Function
l PV Function
l QUARTILE Function
l RATE Function
l SLN Function
l SYD Function
l VDB Function
DB Function
The DB function returns the depreciation of an asset for a specified period using the
fixed-declining balance method.
Return Type: Numeric
Syntax: DB(cost,salvage,life,period,month)
In the above syntax, parameters in bold are required.
Parameter Description
salvage The value at the end of the depreciation (sometimes called the
salvage value of the asset).
life The number of periods over which the asset is being depreciated
(sometimes called the useful life of the asset).
period The period for which you want to calculate the depreciation.
Period must use the same units as life.
Examples:
Formula Result
Formula Result
DDB Function
The DDB function returns the depreciation of an asset for a specified period using
the double-declining balance method or some other method that you specify. The
double-declining balance method computes depreciation at an accelerated rate.
Depreciation is highest in the first period and decreases in successive periods.
DDB uses the following formula to calculate depreciation for a period:
Min( (cost - total depreciation from prior periods) * (factor/life), (cost - salvage -
total depreciation from prior periods) )
Use the VDB function to switch to the straight-line depreciation method when
depreciation is greater than the declining balance calculation.
Return Type: Numeric. The results are rounded to two decimal places.
Syntax: DDB(cost,salvage,life,period,factor)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
salvage The value at the end of the depreciation (sometimes called the
salvage value of the asset). This value can be 0. Must be a
positive number.
life The number of periods over which the asset is being depreciated
(sometimes called the useful life of the asset). Must be a positive
number.
period The period for which you want to calculate the depreciation.
Period must use the same units as life. Must be a positive
number.
Examples:
Formula Result
FV Function
The FV function returns the future value of an investment based on periodic,
constant payments and a constant interest rate.
Return Type: Numeric
Syntax: FV(rate,nper,pmt,pv,type)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
pmt The payment made each period; it cannot change over the life of
the annuity. Typically, pmt contains principal and interest but no
other fees or taxes. If pmt is omitted, you must include the pv
argument.
type The number 0 or 1 and indicates when payments are due. If type
is omitted, it is assumed to be 0.
l Set type equal to 0 if payments are due at the end of the
period.
l Set type equal to 1 if payments are due at the beginning of
the period.
Note: Be consistent about the units that you use for specifying rate and nper. If you
make monthly payments on a four-year loan at 12 percent annual interest, use
12%/12 for rate and 4*12 for nper. If you make annual payments on the same loan,
use 12% for rate and 4 for nper.
For all of the arguments, cash you pay out, such as deposits to savings, is
represented by negative numbers; cash you receive, such as dividend checks, is
represented by positive numbers.
Examples:
Formula Result
Formula Result
IPMT Function
The IPMT function returns the interest payment for a given period for an investment
based on periodic, constant payments, and a constant interest rate.
Return Type: Numeric
Syntax: IPMT(rate,per,nper,pv,fv,type)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
per The period for which you want to find the interest and must be
in the range 1 to nper.
Note: For all of the arguments, cash you pay out, such as
deposits to savings, is represented by negative numbers; cash you
receive, such as dividend checks, is represented by positive
numbers.
Parameter Description
Note: For all of the arguments, cash you pay out, such as
deposits to savings, is represented by negative numbers; cash you
receive, such as dividend checks, is represented by positive
numbers.
fv The future value, or a cash balance you want to attain after the
last payment is made. If fv is omitted, it is assumed to be 0 (the
future value of a loan, for example, is 0).
type The number 0 or 1 and indicates when payments are due. If type
is omitted, it is assumed to be 0.
l Set type equal to 0 if payments are due at the end of the
period.
l Set type equal to 1 if payments are due at the beginning of
the period.
Note: Make sure that you are consistent about the units that you use for specifying
rate and nper. If you make monthly payments on a four-year loan at 12 percent
annual interest, use 12%/12 for rate and 4*12 for nper. If you make annual
payments on the same loan, use 12% for rate and 4 for nper.
Examples:
Formula Result
IPMT([Rate],[Period],[Years of Loan], Interest due in the last year for a loan with
[Present Value]) the terms given, where payments are made
yearly (-292.45)
where the value in the Rate field is .10, the
value in the Period field is 3, the value in
the Years of Loan field is 3, and the value
in the Present Value field is 8000.
IRR Function
The IRR function returns the internal rate of return for a series of cash flows
represented by the numbers in values. These cash flows do not have to be even, as
they would be for an annuity. However, the cash flows must occur at regular
intervals, such as monthly or annually. The internal rate of return is the interest rate
received for an investment consisting of payments (negative values) and income
(positive values) that occur at regular periods.
Return Type: Numeric
Syntax: IRR(values,guess)
In the above syntax, parameters in bold are required.
Parameter Description
guess A number that you guess is close to the result of IRR. Note the
following:
l Archer uses an iterative technique for calculating IRR.
Starting with guess, IRR cycles through the calculation until
the result is accurate within 0.00001 percent. If IRR cannot
find a result that works after 20 tries, an error value is
returned.
l In most cases you do not need to provide guess for the IRR
calculation. If guess is omitted, it is assumed to be 0.1 (10
percent).
l If the result is not close to what you expected, try again with
a different value for guess.
Note: IRR is closely related to NPV, the net present value function. The rate of
return calculated by IRR is the interest rate corresponding to a 0 (zero) net present
value. The following formula demonstrates how NPV and IRR are related:
NPV(IRR(B1:B6),B1:B6)
equals 3.60E-08 [Within the accuracy of the IRR calculation, the value 3.60E-08 is
effectively 0 (zero).]
Examples:
Formula Result
ISPMT Function
The ISPMT function calculates the interest paid during a specific period of an
investment. This function is provided for compatibility with Lotus 1-2-3.
For additional information about financial functions, see PV Function.
Return Type: Numeric
Syntax: ISPMT(rate,per,nper,pv)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
per The period for which you want to find the interest and must be
in the range 1 to nper.
Parameter Description
Note: The cash that you pay out, such as deposits to savings or
other withdrawals, is represented by negative numbers; the cash
that you receive, such as dividend checks and other deposits, is
represented by positive numbers.
Examples:
Formula Result
MIRR Function
The MIRR function returns the modified internal rate of return for a series of
periodic cash flows. MIRR considers both the cost of the investment and the
interest received on reinvestment of cash. MIRR uses the order of values to
interpret the order of cash flows. Be sure to enter your payment and income values
in the sequence that you want and with the correct signs (positive values for cash
received, negative values for cash paid).
Return Type: Numeric
Syntax: MIRR(values,finance_rate,reinvest_rate)
Parameter Description
finance_rate The interest rate that you pay on the money used in the cash
flows.
reinvest_rate The interest rate that you receive on the cash flows as you
reinvest them.
Example:
Formula Result
NPER Function
The NPER function returns the number of periods for an investment based on
periodic, constant payments and a constant interest rate.
For a more complete description of the arguments in NPER and for more
information about annuity functions, see PV Function.
Return Type: Numeric
Syntax: NPER(rate, pmt, pv, fv, type)
In the above syntax, parameters in bold are required.
Parameter Description
pmt The payment made each period; it cannot change over the life of
the annuity. Typically, pmt contains principal and interest but no
other fees or taxes.
fv The future value, or a cash balance that you want to attain after
the last payment is made. If fv is omitted, it is assumed to be 0
(the future value of a loan, for example, is 0).
Examples:
Formula Result
NPV Function
The NPV function calculates the net present value of an investment using a
discount rate and a series of future payments (negative values) and income (positive
values).
The NPV investment begins one period before the date of the value1 cash flow and
ends with the last cash flow in the list. The NPV calculation is based on future cash
flows. If your first cash flow occurs at the beginning of the first period, the first
value must be added to the NPV result, not included in the values arguments.
NPV is similar to the PV function (present value). The primary difference between
PV and NPV is that PV allows cash flows to begin either at the end or at the
beginning of the period. Unlike the variable NPV cash flow values, PV cash flows
must be constant throughout the investment. For information about annuities and
financial functions, see PV Function.
NPV is also related to the IRR function (internal rate of return). IRR is the rate for
which NPV equals zero: NPV(IRR(...), ...) = 0. See IRR Function.
Return Type: Numeric
Syntax: NPV(rate,value1,value2, ...)
In the above syntax, parameters in bold are required.
Parameter Description
Examples:
Formula Result
PMT Function
The PMT function calculates the payment for a loan based on constant payments
and a constant interest rate. The payment returned by PMT includes principal and
interest but no taxes, reserve payments, or fees sometimes associated with loans.
Note: To find the total amount paid over the duration of the loan, multiply the
returned PMT value by nper.
Parameter Description
fv The future value, or a cash balance you want to attain after the
last payment is made. If fv is omitted, it is assumed to be 0
(zero), that is, the future value of a loan is 0.
type The number 0 or 1 and indicates when payments are due. If type
is omitted, it is assumed to be 0.
l Set type equal to 0 or omitted if payments are due at the end
of the period.
l Set type equal to 1 if payments are due at the beginning of
the period.
Note: Make sure that you are consistent about the units you use for specifying rate
and nper. If you make monthly payments on a four-year loan at an annual interest
rate of 12 percent, use 12%/12 for rate and 4*12 for nper. If you make annual
payments on the same loan, use 12 percent for rate and 4 for nper.
Examples:
Formula Result
PPMT Function
The PPMT function returns the payment on the principal for a given period for an
investment based on periodic, constant payments and a constant interest rate.
Return Type: Numeric
Syntax: PPMT(rate,per,nper,pv,fv,type)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Parameter Description
fv The future value, or a cash balance you want to attain after the
last payment is made. If fv is omitted, it is assumed to be 0
(zero), that is, the future value of a loan is 0.
type The number 0 or 1 and indicates when payments are due. If type
is omitted, it is assumed to be 0.
l Set type equal to 0 or omitted if payments are due at the end
of the period.
l Set type equal to 1 if payments are due at the beginning of
the period.
Note: Make sure that you are consistent about the units that you use for specifying
rate and nper. If you make monthly payments on a four-year loan at an annual
interest rate of 12 percent, use 12%/12 for rate and 4*12 for nper. If you make
annual payments on the same loan, use 12% for rate and 4 for nper.
Examples:
Formula Result
PV Function
The PV function returns the present value of an investment. The present value is the
total amount that a series of future payments is worth now. For example, when you
borrow money, the loan amount is the present value to the lender.
Note: Make sure that you are consistent about the units you use for specifying rate
and nper. If you make monthly payments on a four-year loan at 12 percent annual
interest, use 12%/12 for rate and 4*12 for nper. If you make annual payments on the
same loan, use 12% for rate and 4 for nper.
Parameter Description
rate The interest rate per period. For example, if you obtain an
automobile loan at a 10 percent annual interest rate and make
monthly payments, your interest rate per month is 10%/12, or
0.83%. You would enter 10%/12, or 0.83%, or 0.0083, into the
formula as the rate.
pmt The payment made each period and cannot change over the life
of the annuity. Typically, pmt includes principal and interest but
no other fees or taxes. For example, the monthly payments on a
$10,000, four-year car loan at 12 percent are $263.33. You
would enter -263.33 into the formula as the pmt. If pmt is omit-
ted, you must include the fv argument.
fv The future value, or a cash balance you want to attain after the
last payment is made. If fv is omitted, it is assumed to be 0 (the
future value of a loan, for example, is 0). For example, if you
want to save $50,000 to pay for a special project in 18 years,
then $50,000 is the future value. You could then make a
conservative guess at an interest rate and determine how much
you must save each month. If fv is omitted, you must include the
pmt argument.
type The number 0 or 1 and indicates when payments are due. If type
is omitted, it is assumed to be 0.
l Set type equal to 0 or omitted if payments are due at the end
of the period.
l Set type equal to 1 if payments are due at the beginning of
the period.
Example:
Formula Result
PV([Rate],[Years Money Will Pay], Present value of an annuity with the terms
[Payment], ,0) above (-59,777.15).
where the value in the Rate field is The result is negative because it represents
0.08/12, the value in the Years Money Will money that you would pay, an outgoing
Pay field is 20*12, and the value in the cash flow. If you are asked to pay (60,000)
Payment field is 500. for the annuity, you would determine this
would not be a good investment because
the present value of the annuity
(59,777.15) is less than what you are
asked to pay.
QUARTILE Function
The QUARTILE function returns the quartile of a data set. Quartiles often are used
in sales and survey data to divide populations into groups. For example, you can use
QUARTILE to find the top 25 percent of incomes in a population.
Return Type: Numeric
Syntax: QUARTILE(range,quart)
In the above syntax, parameters in bold are required.
Parameter Description
range The reference to a range of numeric values for which you want
the quartile value.
Example:
Formula Result
RATE Function
The RATE function returns the interest rate per period of an annuity. RATE is
calculated by iteration and can have zero or more solutions. If the successive
results of RATE do not converge to within 0.0000001 after 20 iterations, RATE
returns an error.
Return Type: Numeric
Syntax: RATE(nper,pmt,pv,fv,type,guess)
In the above syntax, parameters in bold are required.
Parameter Description
Note: Make sure that you are consistent about the units you use
for specifying guess and nper. If you make monthly payments on
a four-year loan at 12 percent annual interest, use 12%/12 for
guess and 4*12 for nper. If you make annual payments on the
same loan, use 12% for guess and 4 for nper.
pmt The payment made each period and cannot change over the life
of the annuity. Typically, pmt includes principal and interest but
no other fees or taxes. If pmt is omitted, you must include the fv
argument.
fv The future value, or a cash balance you want to attain after the
last payment is made. If fv is omitted, it is assumed to be 0 (the
future value of a loan, for example, is 0).
type The number 0 or 1 and indicates when payments are due. If type
is omitted, it is assumed to be 0.
l Set type equal to 0 or omitted if payments are due at the end
of the period.
l Set type equal to 1 if payments are due at the beginning of
the period.
Note: Make sure that you are consistent about the units that you
use for specifying guess and nper. If you make monthly payments
on a four-year loan at 12 percent annual interest, use 12%/12 for
guess and 4*12 for nper. If you make annual payments on the
same loan, use 12% for guess and 4 for nper.
Examples:
Formula Result
RATE([Years of Loan],[Monthly Payment], Monthly rate of the loan with the given
[Amount of Loan]) terms (1%)
where the value in the Years of Loan field
is 4*12, the value in the Monthly Payment
field is -200, and the value in the Amount
of Loan field is 8000.
RATE([Years of Loan],[Monthly Payment], Annual rate of the loan with the given
[Amount of Loan])*12 terms (0.09241767 or 9.24%)
where the value in the Years of Loan field
is 4*12, the value in the Monthly Payment
field is -200, and the value in the Amount
of Loan field is 8000.
SLN Function
The SLN function returns the straight-line depreciation of an asset for one period.
Return Type: Numeric
Syntax: SLN(cost,salvage,life)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
salvage The value at the end of the depreciation (sometimes called the
salvage value of the asset).
Example:
Formula Result
SYD Function
The SYD function returns the sum-of-years' digits depreciation of an asset for a
specified period.
Return Type: Numeric
Syntax: SYD(cost,salvage,life,per)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
salvage The value at the end of the depreciation (sometimes called the
salvage value of the asset).
per The period and must use the same units as life.
Examples:
Formula Result
VDB Function
The VDB function returns the variable declining balance of an asset for a specified
period, including partial periods. This function uses the double-declining balance
method, or another method if you specify.
Return Type: Numeric
Syntax: VDB(cost,salvage,life,start_period,end_period,factor,no_switch)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
salvage The value at the end of the depreciation (sometimes called the
salvage value of the asset).
start_period The starting period for which you want to calculate the
depreciation.
Note: The start_period must have the same units as the life
parameter.
end_period The ending period for which you want to calculate the
depreciation.
Note: The end_period must have the same units as the life
parameter.
Examples:
Formula Result
Logical Functions
Logical functions allow you to evaluate an expression and return a specific result.
Available functions within this category include:
l AND Function
l IF Function
l NOT Function
l OR Function
AND Function
The AND function evaluates logical conditions. If all of its conditions are TRUE,
the function will return TRUE. If one or more of its conditions is FALSE, the
function will return FALSE. The AND function must be used in conjunction with an
IF function.
Return Type: TRUE or FALSE
Syntax: AND(logical1, logical2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
IF Function
The IF function evaluates a logical condition, and if the condition is TRUE, one
value is returned. If the condition is FALSE, another value is returned. The IF
function can also be nested to construct more elaborate tests, as shown in the
following example:
IF([Rating]>15,"A", IF([Rating]>10,"B", IF([Rating]>5," C")))
For more information on nesting IF functions, see the fourth example in the
"Examples" section below.
Return Type: Text, numeric, date or a Values List field selection, depending on
the type of data supplied for the value_if_true and value_if_false parameters
Syntax: IF(logical_test, value_if_true, value_if_false)
In the above syntax, parameters in bold are required.
Parameter Description
logical_ Any condition that can be evaluated to TRUE or FALSE. This condition
test can be written with any comparison operator (=, <, >, <=, >=, <>). An
example of how this parameter might be formatted is [Field 1]>20.
value_if_ The value that is returned if the logical_test parameter is TRUE. This
true parameter can be formatted as a text string, such as "High Risk", or as a
Values List field selection, such as VALUEOF("Urgent"). The parameter
can also be formatted as another formula, such as SUM([Field 1],[Field 2]).
value_if_ The value that is returned if the logical_test parameter is FALSE. This
false parameter can be formatted as a text string, such as "Low Risk", or as a
Values List field selection, such as VALUEOF("Not Urgent"). The
parameter can also be formatted as another formula, such as SUM([Field 1],
[Field 3]). If this parameter is omitted from the formula and the logical_test
parameter evaluates to FALSE, the calculated field will return empty (no
value).
Examples:
Formula Result
NOT Function
The NOT function evaluates a logical condition. If the condition is TRUE, the
function returns the value of FALSE. If the condition is FALSE, the function returns
the value of TRUE. Use the NOT function when you want to ensure that a value is
not equal to one particular value.
Return Type: TRUE or FALSE
Syntax: NOT(logical_test)
In the above syntax, parameters in bold are required.
Parameter Description
Examples:
Formula Result
OR Function
The OR function evaluates logical conditions. If any of the condition evaluates to
TRUE, the function returns the value of TRUE. If none of conditions evaluate to
TRUE, the function returns the value of FALSE.
Return Type: TRUE or FALSE
Syntax: OR(logical1, logical2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
Math Functions
Math functions allow you to to manipulate numeric values through a variety of
options. Available functions within this category include:
l ABS Function l ODD Function
l ACOS Function l PI Function
l ACOSH Function l POWER Function
l ASIN Function l PRODUCT Function
l ASINH Function l QUOTIENT Function
l ATAN Function l RADIANS Function
l ATAN2 Function l RAND Function
l ATANH Function l ROUND Function
l COMBIN Function l ROUNDDOWN Function
l COS Function l ROUNDUP Function
l COSH Function l SIGN Function
l DEGREES Function l SIN Function
l EVEN Function l SINH Function
l EXP Function l SQRT Function
l FACT Function l SUM Function
l FLOOR Function l SUMIF Function
l INT Function l SUMX2MY2 Function
l LN Function l TAN Function
l LOG Function l TANH Function
l LOG10 Function l TRUNC Function
l MOD Function
ABS Function
The ABS function returns the absolute value of a number. The absolute value of a
number is the distance of a number from zero.
Return Type: Numeric
Syntax: ABS(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number The number for which you want to return the absolute value.
Examples:
Formula Result
ABS(-8) 8
ACOS Function
The ACOS function returns the arccosine (inverse cosine) of an angle. The returned
value is expressed in radians.
Return Type: Numeric
Syntax: ACOS(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Number The cosine of the angle for which you want to determine the
arccosine. The value for this parameter must be between -1 and 1.
Examples:
Formula Result
ACOS(.5) 1.047198
ACOSH Function
The ACOSH function returns the inverse hyperbolic cosine of a number.
Return Type: Numeric
Syntax: ACOSH(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Number The number for which you want to determine the inverse
hyperbolic cosine. The value for this parameter must be greater
than or equal to 1.
Examples:
Formula Result
ACOSH(1) 0
ACOSH([Number]) 2.292432
where Number is a Numeric field with a
value of 5.
ASIN Function
The ASIN function returns the arcsine (inverse sine) of an angle. The returned
value is expressed in radians.
Return Type: Numeric
Syntax: ASIN(number)
In the above syntax, parameters in bold are required.
Parameter Description
Number The sine of the angle for which you want to determine the
arcsine. The value for this parameter must be between -1 and 1.
Examples:
Formula Result
ASIN(.5) .523599
ASINH Function
The ASINH function returns the inverse hyperbolic sine of a number.
Return Type: Numeric
Syntax: ASINH(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Number The number for which you want to determine the inverse
hyperbolic sine. The value for this parameter must be greater than
or equal to 1.
Examples:
Formula Result
ASINH(1) .881374
ASINH([Number]) 2.312438
where Number is a Numeric field with a
value of 5.
ATAN Function
The ATAN function returns the arctangent (inverse tangent) of an angle. The
returned value is expressed in radians.
Parameter Description
Number The tangent of the angle for which you want to determine the
arctangent.
Examples:
Formula Result
ATAN(.5) .463648
ATAN2 Function
The ATAN2 function returns the arctangent (inverse tangent) of a specified set of
x/y coordinates. The returned value is expressed in radians.
Return Type: Numeric
Syntax: ATAN2(x_number, y_number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
ATAN2(2,2) .785398
ATANH Function
The ATANH function returns the inverse hyperbolic tangent of a number.
Return Type: Numeric
Syntax: ATANH(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Number The number for which you want to determine the inverse
hyperbolic tangent. The value for this parameter must be between
-1 and 1.
Examples:
Formula Result
ATANH(.5) .549306
ATANH([Number]) -.25541
where Number is a Numeric field with a
value of
-.25.
COMBIN Function
The COMBIN function returns the number of combinations for a given number of
items. Use COMBIN to determine the total possible number of groups for a given
number of items.
Note: A combination is any set or subset of items, regardless of their internal order.
Combinations are distinct from permutations, for which the internal order is
significant.
Parameter Description
Example:
Formula Result
COMBIN([Candidates],[Team Size]) 28
where the value in the Candidates field is 8
and the value in the Team Size field is 2.
COS Function
The COS function returns the cosine of the given angle.
Return Type: Numeric
Syntax: COS(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number The angle in radians for which you want the cosine.
Examples:
Formula Result
COSH Function
The COSH function returns the hyperbolic cosine of a number.
Return Type: Numeric
Syntax: COSH(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number Any real number for which you want to find the hyperbolic
cosine.
Examples:
Formula Result
DEGREES Function
The DEGREES function converts radians into degrees.
Return Type: Numeric
Syntax: DEGREES(angle)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
EVEN Function
The EVEN function returns the number rounded up to the nearest even integer. You
can use this function for processing items that come in twos. For example, a
packing crate accepts rows of one or two items. The crate is full when the number
of items, rounded up to the nearest two, matches the crate's capacity.
Return Type: Numeric
Syntax: EVEN(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
EXP Function
The EXP function returns e raised to the power of number. The constant e equals
2.71828182845904, the base of the natural logarithm.
Return Type: Numeric
Syntax: EXP(number)
In the above syntax, parameters in bold are required.
Parameter Description
Examples:
Formula Result
FACT Function
The FACT function returns the factorial of a number. The factorial of a number is
equal to 1*2*3*...* number.
Return Type: Numeric
Syntax: FACT(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number The non-negative number for which you want the factorial. If
number is not an integer, it is truncated.
Examples:
Formula Result
FLOOR Function
The FLOOR function rounds a number down toward zero, to the nearest multiple of
significance.
Return Type: Numeric
Syntax: FLOOR(number, significance)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number The number that you want to round down to the nearest integer.
This parameter can be formatted as a Numeric-field reference, for
example, [field name]), or as another formula that results in a
numeric value, such as SUM([field 1],[field 2]) where field 1 and
field 2 are Numeric fields.
Examples:
Formula Result
FLOOR([Score], 1) 2
where the value in the Score field is 2.5.
FLOOR(SUM([Risk], [Criticality]), 5) 15
where the sum of the values in the Risk
and Criticality fields is 17.10.
INT Function
The INT function rounds a number down to the nearest integer.
Return Type: Numeric
Syntax: INT(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
LN Function
The LN function returns the natural logarithm of a number. Natural logarithms are
based on the constant e (2.71828182845904).
Return Type: Numeric
Syntax: LN(number)
In the above syntax, parameters in bold are required.
Parameter Description
number The positive real number for which you want the natural logarithm. LN is
the inverse of the EXP function.
Examples:
Formula Result
LOG Function
The LOG function returns the logarithm of a number to the base that you specify.
Return Type: Numeric
Syntax: LOG(number,base)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number The positive real number for which you want the logarithm.
Examples:
Formula Result
LOG10 Function
The LOG10 function returns the base-10 logarithm of a number.
Return Type: Numeric
Syntax: LOG10(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number The positive real number for which you want the base-10
logarithm.
Examples:
Formula Result
MOD Function
The MOD function returns the remainder after number is divided by divisor. The
result has the same sign as divisor.
Return Type: Numeric
Syntax: MOD(number,divisor)
In the above syntax, parameters in bold are required.
Parameter Description
number The number for which you want to find the remainder.
Examples:
Formula Result
ODD Function
The ODD function returns number rounded up to the nearest odd integer.
Return Type: Numeric
Syntax: ODD(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
PI Function
The PI function returns the number 3.14159265358979, the mathematical constant
pi, accurate to 15 digits.
Return Type: Numeric
Syntax: PI()
This function does not have any parameters.
Examples:
Formula Result
PI() Pi (3.14159265358979)
POWER Function
The POWER function returns the result of a number raised to a power.
Note: The "^" operator can be used instead of POWER to indicate to what power
the base number is to be raised, such as in 5^2.
Parameter Description
Examples:
Formula Result
PRODUCT Function
The PRODUCT function multiplies all the numbers given as arguments and returns
the product. The PRODUCT function is useful when you need to multiply many
fields together.
Return Type: Numeric
Syntax: PRODUCT(number1,number2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
QUOTIENT Function
The QUOTIENT function returns the integer portion of a division by discarding the
remainder.
Return Type: Numeric
Syntax: QUOTIENT(numerator, denominator)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
QUOTIENT (42, 5) 8
where 42 / 5 = 8.4.
RADIANS Function
The RADIANS function converts degrees to radians.
Return Type: Numeric
Syntax: RADIANS(angle)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
RAND Function
The RAND function returns an evenly distributed random real number greater than
or equal to 0 and less than 1. A new random real number is returned every time the
worksheet is calculated.
To generate a random real number between a and b, use:
RAND()*(b-a)+a
Return Type: Numeric
Syntax: RAND()
This function does not have any parameters.
Examples:
Formula Result
ROUND Function
The ROUND function rounds a number to a specified number of digits.
Return Type: Numeric
Parameter Description
number The number that you want to round. This parameter can be
formatted as a Numeric-field reference, for example, [field name],
or as another formula that results in a numeric value, such as
SUM([field 1],[field 2]) where field 1 and field 2 are Numeric
fields.
num_digits Specifies the number of digits to which you want to round the
number. If the num_digits parameter is greater than 0 (zero), the
number is rounded to the specified number of decimal places. If
the num_digits parameter is equal to 0, the number is rounded to
the nearest integer. If the num_digits parameter is less than 0, the
number is rounded to the left of the decimal point to the
specified number of decimal places. For example, if the num_
digits parameter is -1 and the number is 101.5, the number would
be rounded to 100.
Examples:
Formula Result
ROUND([Score], 0) 23
where the value in the Score field is
23.357.
ROUNDDOWN Function
The ROUNDDOWN function rounds a number down, toward zero.
ROUNDDOWN behaves like ROUND, except that it always rounds a number
down.
Return Type: Numeric
Syntax: ROUNDDOWN(number,num_digits)
In the above syntax, parameters in bold are required.
Parameter Description
num_digits The number of digits to which you want to round the number.
Examples:
Formula Result
ROUNDUP Function
The ROUNDUP function rounds a number up, away from 0 (zero). ROUNDUP
behaves like ROUND, except that it always rounds a number up.
Return Type: Numeric
Syntax: ROUNDUP(number,num_digits)
In the above syntax, parameters in bold are required.
Parameter Description
num_digits The number of digits to which you want to round the number.
Examples:
Formula Result
SIGN Function
The SIGN function determines the sign of a number. Returns 1 if the number is
positive, zero (0) if the number is 0, and -1 if the number is negative.
Return Type: Numeric
Syntax: SIGN(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
SIN Function
The SIN function returns the sine of a given angle.
Return Type: Numeric
Syntax: SIN(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number The angle in radians for which you want the sine.
Examples:
Formula Result
SINH Function
The SINH function returns the hyperbolic sine of a number.
Return Type: Numeric
Syntax: SINH(number)
In the above syntax, parameters in bold are required.
Parameter Description
Examples:
Formula Result
You can use the hyperbolic sine function to approximate a cumulative probability
distribution. Suppose a laboratory test value varies between 0 and 10 seconds. An
empirical analysis of the collected history of experiments shows that the probability
of obtaining a result, x, of less than t seconds is approximated by the following
equation:
P(x<t) = 2.868 * SINH(0.0342 * t), where 0<t<10
To calculate the probability of obtaining a result of less than 1.03 seconds,
substitute 1.03 for t.
Formula Result
SQRT Function
The SQRT function returns a positive square root.
Return Type: Numeric
Syntax: SQRT(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number The number for which you want the square root.
Example:
Formula Result
SUM Function
The SUM function adds all of the numbers in the specified parameters. If the SUM
function references a multi-selection values list, it can be used with the
SELECTED function to return the sum of the numeric values for each of the
currently selected items.
Return Type: Numeric
Syntax: SUM(number1, number2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number1, number2, Parameters for which you want the total value. These parameters
and so on can be entered as hard-coded values, for example, 2, or Numeric-
field references, for example, [field name]. Referenced fields can
reside within the application or within Sub-Form, Cross-
Reference, or Related Records fields.
Examples:
Formula Result
SUM(3, [Risk]) 15
where the value in the Risk field is 12.
SUM([Risk], [Criticality]) 19
where the value in the Risk field is 12 and
the value in the Criticality field is 7.
SUM(REF([Orders],[Price])) 202.94
where the value in the Price field within
the Orders sub-form are 120.00, 50.19, and
32.75.
SUM(SELECTEDVALUENUMBER([Key 25
Factors]))
where Key Factors is a multi-selection
Values List field and the numeric values of
the current selections are 3, 8, 4, and 10.
SUMIF Function
The SUMIF function sums the values of a specified Numeric field across all
records in a Sub-Form, Cross-Reference, or Related Records field that contain a
specific value in a given field. For example, you can return the sum of all Price
field values across all cross-referenced records in which the Status field is set to
“Shipped.”
Return Type: Numeric
Syntax: SUMIF(eval_field_ref, criterion, sum_field_ref)
In the above syntax, parameters in bold are required.
Parameter Description
eval_field_ref The reference to the field against which the criterion will be
evaluated.
sum_field_ref The reference to a Numeric field that will be summed across all
qualified records.
Examples:
Formula Result
Formula Result
Formula Result
Parameter Description
eval_field_ref The reference to the field against which the criterion will be
evaluated.
sum_field_ref The reference to a Numeric field that will be summed across all
qualified records.
Examples:
Formula Result
Formula Result
Formula Result
SUMX2MY2 Function
The SUMX2MY2 function returns the sum of the difference of squares of
corresponding values in two sets of fields.
Return Type: Numeric
Syntax: SUMX2MY2(values_x,values_y)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Note: The arguments should be either numbers, names, or references that contain
numbers. If a reference argument contains text, logical values, or empty cells, those
values are ignored; however, fields with the value zero are included. If values_x
and values_y have a different number of values, SUMX2MY2 returns an error.
Example:
Formula Result
TAN Function
The TAN function returns the tangent of the given angle.
Return Type: Numeric
Syntax: TAN(number)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number The angle in radians for which you want the tangent.
Examples:
Formula Result
TANH Function
The TANH function returns the hyperbolic tangent of a number.
Return Type: Numeric
Syntax: TANH(number)
In the above syntax, parameters in bold are required.
Parameter Description
Examples:
Formula Result
TRUNC Function
The TRUNC function truncates a number to an integer by removing the fractional
part of the number.
Return Type: Numeric
Syntax: TRUNC(number, num_digits)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number The number that you want to truncate. This parameter can be
formatted as a Numeric-field reference, for example, [field name],
or as another formula that results in a numeric value, such as
SUM([field 1],[field 2]) where field 1 and field 2 are Numeric
fields.
Examples:
Formula Result
TRUNC([Score]) 3
where the value in the Score field is 3.427.
TRUNC([Score], 1) 3.4
where the value in the Score field is 3.427.
Statistics Functions
Statistics functions allow you to analyze information through the use of many
common statistical options. Available functions within this category include:
l AVEDEV Function l MIN Function
l AVERAGE Function l MINA Function
l AVERAGEA Function l MODE Function
l BINOMDIST Function l NEGBINOMDIST Function
l CHIDIST Function l NORMDIST Function
l CHIINV Function l PEARSON Function
AVEDEV Function
The AVEDEV function returns the average deviation of a set of values from their
mean.
Return Type: Numeric
Syntax: AVEDEV(number1, number2,...)
Parameter Description
number1, number2, Numbers for which you want to determine the average deviation.
and so on You can format these parameters as hard-coded numeric values,
for example, 30, Numeric-field references, for example, [field
name], or as another formula that results in a numeric value, such
as SUM([field 1],[field 2]) where field 1 and field 2 are Numeric
fields.
Examples:
Formula Result
AVERAGE Function
The AVERAGE function returns the average (arithmetic mean) value in a set of
values.
Return Type: Numeric
Syntax: AVERAGE(number1, number2,...)
In the above syntax, parameters in bold are required.
Parameter Description
number1, number2, Numbers that you want to average. You can format these
and so on parameters as hard-coded numeric values, for example, 30,
Numeric-field references, for example, [field name], or as another
formula that results in a numeric value, such as SUM([field 1],
[field 2]) where field 1 and field 2 are Numeric fields.
Examples:
Formula Result
AVERAGE([Risk], [Criticality], 8
[Availability])
where the value in the Risk field is 5, the
value in the Criticality field is 7, and the
value in the Availability field is 12.
AVERAGEA Function
The AVERAGEA function returns the average deviation of a set of values from
their mean and includes text representation of numbers or logical values.
Return Type: Numeric
Syntax: AVERAGEA(number1, number2,...)
In the above syntax, parameters in bold are required.
Parameter Description
number1, number2, Numbers for which you want to determine the average deviation.
and so on You can format these parameters as hard-coded numeric values,
for example, 30, Numeric-field references, for example, [field
name], or as another formula that results in a numeric value, such
as SUM([field 1],[field 2]) where field 1 and field 2 are Numeric
fields.
Examples:
Formula Result
BINOMDIST Function
The BINOMDIST function returns the individual term binomial distribution
probability. Use BINOMDIST in problems with a fixed number of tests or trials,
when the outcomes of any trial are only success or failure, when trials are
independent, and when the probability of success is constant throughout the
experiment. For example, BINOMDIST can calculate the probability that two of
the next three babies born are male.
Return Type: Numeric
Syntax: BINOMDIST(number_s,trials,probability_s,cumulative)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
CHIDIST Function
The CHIDIST function returns the one-tailed probability of the chi-squared
distribution. The χ2 distribution is associated with a χ2 test. Use the χ2 test to
compare observed and expected values. For example, a genetic experiment might
hypothesize that the next generation of plants will exhibit a certain set of colors. By
comparing the observed results with the expected ones, you can decide whether
your original hypothesis is valid. CHIDIST is calculated as CHIDIST = P(X>x),
where X is a χ2 random variable.
Parameter Description
Example:
Formula Result
CHIINV Function
The CHIINV function returns the inverse of the one-tailed probability of the chi-
squared distribution. If probability = CHIDIST(x,...), then CHIINV(probability,...) =
x. Use this function to compare observed results with expected ones to decide
whether your original hypothesis is valid.
Note: Given a value for probability, CHIINV seeks that value x such that CHIDIST
(x, degrees_freedom) = probability. Therefore, precision of CHIINV depends on
precision of CHIDIST. CHIINV uses an iterative search technique. If the search
has not converged after 100 iterations, the function returns the #N/A error value.
Parameter Description
Example:
Formula Result
CONFIDENCE Function
The CONFIDENCE function returns a value that you can use to construct a
confidence interval for a population mean. The confidence interval is a range of
values. Your sample mean, x, is at the center of this range and the range is x ±
CONFIDENCE. For example, if x is the sample mean of delivery times for
products ordered through the mail, x ± CONFIDENCE is a range of population
means. For any population mean, μ0, in this range, the probability of obtaining a
sample mean further from μ0 than x is greater than alpha; for any population mean,
μ0, not in this range, the probability of obtaining a sample mean further from μ0
than x is less than alpha. In other words, assume that we use x, standard_dev, and
size to construct a two-tailed test at significance level alpha of the hypothesis that
the population mean is μ0. Then we will not reject that hypothesis if μ0 is in the
confidence interval and will reject that hypothesis if μ0 is not in the confidence
interval. The confidence interval does not allow us to infer that there is probability 1
– alpha that our next package will take a delivery time that is in the confidence
interval.
Return Type: Numeric
Syntax: CONFIDENCE(alpha,standard_dev,size)
In the above syntax, parameters in bold are required.
Parameter Description
alpha The significance level used to compute the confidence level. The
confidence level equals 100*(1 - alpha)%, or in other words, an
alpha of 0.05 indicates a 95 percent confidence level.
standard_dev The population standard deviation for the data range and is
assumed to be known.
Example:
Formula Result
CORREL Function
The CORREL function returns the correlation coefficient of two sets of fields. Use
the correlation coefficient to determine the relationship between two properties. For
example, you can examine the relationship between a location's inside temperature
and outside temperature.
Return Type: Numeric
Syntax: CORREL(values1,values2)
In the above syntax, parameters in bold are required.
Parameter Description
Note: If a reference argument contains text, logical values or is empty, those values
are ignored; however, the value zero is included. If values1 and values2 have a
different number of data points, CORREL returns an error. If either values1 or
values2 is empty, or if s (the standard deviation) of their values equals zero,
CORREL returns an error.
Example:
Formula Result
CORREL(REF([Facilities],[Inside 0.400075
Temperature]), REF([Facilities],[Outside
Temperature]))
where Facilities is a cross-reference field,
the values in the Inside Temperature field
are 75, 72, and 77 and the values in the
Outside Temperature field are 98, 88, and
91.
COUNT Function
The COUNT function counts the number of fields that contain numbers, and counts
numbers within the list of arguments. Use the COUNT function to get the number
of entries in a number field that is in a range of numbers.
Note that:
l Arguments that are numbers, dates, or a text representation of numbers, for
example, a number enclosed in quotation marks, such as "1", are counted.
l Logical values and text representations of numbers that you type directly into the
list of arguments are counted.
l Arguments that are error values or text that cannot be translated into numbers are
not counted.
l If an argument is a reference, only numbers in that reference are counted. Empty
fields, logical values, text, or error values in the reference are not counted.
l To count logical values, text, or error values, use the COUNTA function.
l To count only numbers that meet certain criteria, use the COUNTIF function or
the COUNTIFS function.
Parameter Description
value1 The first item, cell reference, or range within which you want to
count numbers.
Examples:
Formula Result
COUNT(Sales, 12/8/2008, , 19, 22.24, Counts the number of fields that contain
TRUE, #DIV/0) numbers (3)
COUNT(19, 22.24, TRUE, #DIV/0) Counts the number of fields that contain
numbers (2)
COUNTA Function
The COUNTA function returns any one of the following values:
l The number of items currently selected in a multi-select Values List or Cross-
Reference field
l The number of rows (entries) present in a Sub-Form field
l The number of non-null values for a field within a sub-form across all rows in
the Sub-Form field
l The number of non-null values for a given field within a cross-referenced
application across all rows (selections) in a Cross-Reference field
Note: To confidently count the number of rows present in a Sub-Form field, the
formula must reference the Sub-Form field itself rather than referencing a field
within the sub-form. Likewise, to count the number of rows present in a Cross-
Reference field, the formula must reference that Cross-Reference field and not a
field in the related application.
Parameter Description
Examples:
Formula Result
COUNTA([Order Detail]) 12
where Order Detail is a Sub-Form field in
the application and the associated sub-form
currently has 12 rows (entries).
COUNTA([Order Detail]) 0
where Order Detail is a Sub-Form field in
the application and the associated sub-form
currently has no (0) rows.
COUNTA([Affected Departments]) 8
where Affected Departments is a Values
List field in the application and 8 items are
currently selected in the list.
Formula Result
COUNTA([Related Projects]) 3
where Related Projects is a Cross-Reference
field in the application and 3 records from
the related application are currently
selected in the field.
COUNTBLANK Function
The COUNTBLANK function counts empty fields in a specified range of fields.
Fields with formulas that return "" (empty text) are also counted. Fields with zero
values are not counted.
Return Type: Numeric
Syntax: COUNTBLANK(field_ref)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
field_ref The range from which you want to count the blank fields.
Example:
Formula Result
COUNTBLANK([Range]) 4
where the values in the Range field are
empty, 6, empty, 4, empty, =IF(1>0,"",""),
27, and 34.
COUNTIF Function
The COUNTIF function counts the number of records in a Sub-Form, Cross-
Reference, or Related Records field that contain a specific value in a given field.
For example, you can count the number of cross-referenced records that have the
value of "Open" in the Status field.
Return Type: Numeric
Syntax: COUNTIF(field_ref, criterion)
In the above syntax, parameters in bold are required.
Parameter Description
criterion The test that will be performed against the referenced child field
to determine whether that field’s values will be included in the
count. The criterion can involve Values List, User/Groups List,
and Record Permissions fields as well as fields containing
numeric, text, and date type values.
l Values List Fields. If COUNTIF is being performed against a
Values List field, the criterion value should be enclosed in
VALUEOF or supplied as a quoted literal string, for example,
"Dallas").
l User/Groups List and Record Permissions Fields. If
COUNTIF is being performed against a User/Groups List or
Record Permissions field, the criterion value should be
enclosed in USER or GROUP (as appropriate for the
criterion).
l Text, Date, or Numeric Fields. If COUNTIF is being
performed against a Text, Date, or Numeric field, the criterion
must be enclosed in quotes, for example, ">56", and the
criterion can involve any of the supported comparison
operators (=, <, >, <=, >=, <>).
Examples:
Formula Result
COUNTIF(REF([Cases], [Status]), 15
VALUEOF(REF([Cases], [Status]), "Open"))
where the name of the Cross-Reference
field is Cases, the name of the referenced
Values List field in the related application
is Status, and the number of cross-
referenced records where the value "Open"
is selected in the Status field is 15.
COUNTIF(GETGROUPS(REF([Cases], 27
[Business Owner])), GROUP(NAME,
"Finance"))
where the name of the Cross-Reference
field is Cases, the name of the referenced
Record Permissions field in the related
application is Business Owner, and the
number of cross-referenced records where
the group named "Finance" is selected in
the Business Owner field is 27.
COUNTIF(GETUSERS(REF([Cases], 32
[Business Owner])), USER(NAME,
"Lawson, Tracy"))
where the name of the Cross-Reference
field is Cases, the name of the referenced
User/Groups List field in the related
application is Business Owner, and the
number of cross-referenced records where
the user "Lawson, Tracy" is selected in the
Business Owner field is 32.
Formula Result
COVAR Function
The COVAR function returns covariance, the average of the products of deviations
for each data point pair. Use covariance to determine the relationship between two
data sets. For example, you can examine whether greater income accompanies
greater levels of education.
Return Type: Numeric
Syntax: COVAR(values1, values2)
Parameter Description
Note: The arguments must either be numbers or be names or references that contain
numbers. If a reference argument contains text, logical values or empty fields, those
values are ignored; however, fields with the value zero are included. If values1 and
values2 have different numbers of data points, COVAR returns an error. If either
set is empty, COVAR returns an error.
Example:
Formula Result
CRITBINOM Function
The CRITBINOM function returns the smallest value for which the cumulative
binomial distribution is greater than or equal to a criterion value. Use this function
for quality assurance applications. For example, use CRITBINOM to determine the
greatest number of defective parts that are allowed to come off an assembly line
run without rejecting the entire lot.
Return Type: Numeric
Syntax: CRITBINOM(trials,probability_s,alpha)
In the above syntax, parameters in bold are required.
Parameter Description
Example:
Formula Result
DEVSQ Function
The DEVSQ function returns the sum of squares of deviations of data points from
their sample mean.
Return Type: Numeric
Syntax: DEVSQ(number1, number2,...)
In the above syntax, parameters in bold are required.
Parameter Description
number1, number2,... 1 to 255 arguments for which you want to calculate the sum of
squared deviations. You can also use a reference to a set of fields
instead of arguments separated by commas. Arguments can either
be numbers or names, or references that contain numbers. Logical
values and text representations of numbers that you type directly
into the list of arguments are counted. If a reference argument
contains text, logical values, or empty cells, those values are
ignored; however, fields with the value zero are included.
Arguments that are error values or text that cannot be translated
into numbers cause errors.
Example:
Formula Result
EXPONDIST Function
The EXPONDIST function returns the exponential distribution. Use EXPONDIST
to model the time between events, such as how long an automated bank teller takes
to deliver cash. For example, you can use EXPONDIST to determine the
probability that the process takes at most 1 minute.
Return Type: Numeric
Syntax: EXPONDIST(x,lambda,cumulative)
In the above syntax, parameters in bold are required.
Parameter Description
Examples:
Formula Result
FDIST Function
The FDIST function returns the F probability distribution. You can use this function
to determine whether two data sets have different degrees of diversity. For
example, you can examine the test scores of men and women entering high school
and determine if the variability in the females is different from that found in the
males. FDIST is calculated as FDIST=P( F>x ), where F is a random variable that
has an F distribution with degrees_freedom1 and degrees_freedom2 degrees of
freedom.
Return Type: Numeric
Syntax: FDIST(x,degrees_freedom1,degrees_freedom2)
Parameter Description
Example:
Formula Result
FINV Function
The FINV function returns inverse of the F probability distribution. If p = FDIST
(x,...), then FINV(p,...) = x.
The F distribution can be used in an F-test that compares the degree of variability in
two data sets. For example, you can analyze income distributions in the United
States and Canada to determine whether the two countries have a similar degree of
income diversity.
FINV can be used to return critical values from the F distribution. For example, the
output of an ANOVA calculation often includes data for the F statistic, F
probability, and F critical value at the 0.05 significance level. To return the critical
value of F, use the significance level as the probability argument to FINV.
Given a value for probability, FINV seeks that value x such that FDIST(x, degrees_
freedom1, degrees_freedom2) = probability. Thus, precision of FINV depends on
precision of FDIST. FINV uses an iterative search technique. If the search has not
converged after 100 iterations, the function returns the #N/A error value.
Return Type: Numeric
Syntax: FINV(probability,degrees_freedom1,degrees_freedom2)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
FISHER Function
The FISHER function returns the Fisher transformation at x. This transformation
produces a function that is normally distributed rather than skewed. Use this
function to perform hypothesis testing on the correlation coefficient.
Return Type: Numeric
Syntax: FISHER(x)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
FISHERINV Function
The FISHERINV function returns the inverse of the Fisher transformation. Use this
transformation when analyzing correlations between ranges or sets of fields. If y =
FISHER(x), then FISHERINV(y) = x.
Return Type: Numeric
Syntax: FISHERINV(y)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
y The value for which you want to perform the inverse of the
transformation.
Example:
Formula Result
FORECAST Function
The FORECAST function calculates, or predicts, a future value using existing
values. The predicted value is a y-value for a given x-value. The known values are
existing x-values and y-values, and the new value is predicted using linear
regression. You can use this function to predict future sales, inventory
requirements, or consumer trends.
Return Type: Numeric
Syntax: FORECAST(x,known_y's,known_x's)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
GAMMADIST Function
The GAMMADIST function returns the gamma distribution. You can use this
function to study variables that may have a skewed distribution. The gamma
distribution is commonly used in queuing analysis.
Parameter Description
Examples:
Formula Result
Parameter Description
Examples:
Formula Result
GAMMAINV Function
The GAMMAINV function returns the gamma cumulative distribution. If p =
GAMMADIST(x,...), then GAMMAINV(p,...) = x.
Return Type: Numeric
Syntax: GAMMAINV(probability,alpha,beta)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Note: If any argument is text, GAMMAINV returns the #VALUE! error value.
Given a value for probability, GAMMAINV seeks that value x such that
GAMMADIST(x, alpha, beta, TRUE) = probability. Therefore, precision of
GAMMAINV depends on precision of GAMMADIST. GAMMAINV uses an
iterative search technique. If the search has not converged after 100 iterations, the
function returns an error.
Example:
Formula Result
GAMMALN Function
The GAMMALN function returns the natural logarithm of the gamma function, Γ
(x).
Return Type: Numeric
Syntax: GAMMALN(x)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
GEOMEAN Function
The GEOMEAN function returns the geometric mean of a set of positive data. For
example, you can use GEOMEAN to calculate average growth rate given
compound interest with variable rates.
Return Type: Numeric
Syntax: GEOMEAN(number1,number2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number1,number2,... 1 to 255 arguments for which you want to calculate the mean.
Example:
Formula Result
HARMEAN Function
The HARMEAN function returns the harmonic mean of a data set. The harmonic
mean is the reciprocal of the arithmetic mean of reciprocals.
Return Type: Numeric
Syntax: HARMEAN(number1, number2,...)
In the above syntax, parameters in bold are required.
Parameter Description
number1, number2,... 1 to 255 arguments for which you want to calculate the mean.
Example:
Formula Result
HYPGEOMDIST Function
The HYPGEOMDIST function returns the hypergeometric distribution.
HYPGEOMDIST returns the probability of a given number of sample successes,
given the sample size, population successes, and population size. Use
HYPGEOMDIST for problems with a finite population, where each observation is
either a success or a failure, and where each subset of a given size is chosen with
equal likelihood.
Return Type: Numeric
Syntax: HYPGEOMDIST(sample_s,number_sample,population_s,number_
population)
In the above syntax, parameters in bold are required.
Parameter Description
Example:
Formula Result
INTERCEPT Function
The INTERCEPT function calculates the point at which a line will intersect the y-
axis by using existing x-values and y-values. The intercept point is based on a best-
fit regression line plotted through the known x-values and known y-values. Use the
INTERCEPT function when you want to determine the value of the dependent
variable when the independent variable is 0 (zero). For example, you can use the
INTERCEPT function to predict a metal's electrical resistance at 0° C when your
data points were taken at room temperature and higher.
Return Type: Numeric
Syntax: INTERCEPT(known_y's,known_x's)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Note: The arguments must be either numbers, names, or references that contain
numbers. If a reference argument contains text, logical values, or empty fields,
those values are ignored; however, fields with the value zero are included.
Example:
Formula Result
KURT Function
The KURT function returns the kurtosis of a data set. Kurtosis characterizes the
relative peakedness or flatness of a distribution compared with the normal
distribution. Positive kurtosis indicates a relatively peaked distribution. Negative
kurtosis indicates a relatively flat distribution.
Return Type: Numeric
Syntax: KURT(number1,number2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Note: If there are fewer than four data points, or if the standard
deviation of the sample equals zero, KURT returns an error.
Example:
Formula Result
LARGE Function
The LARGE function returns the k-th largest value in a data set. You can use this
function to select a value based on its relative standing. For example, you can use
LARGE to return the highest, runner-up, or third-place score.
Return Type: Numeric
Syntax: LARGE(values,k)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
values The set of fields for which you want to determine the k-th largest
value.
Examples:
Formula Result
LOGINV Function
The LOGINV function returns the inverse of the lognormal cumulative distribution
function of x, where ln(x) is normally distributed with parameters mean and
standard_dev. If p = LOGNORMDIST(x,...) then LOGINV(p,...) = x. Use the
lognormal distribution to analyze logarithmically transformed data.
Parameter Description
Example:
Formula Result
LOGNORMDIST Function
The LOGNORMDIST function returns the cumulative lognormal distribution of x,
where ln(x) is normally distributed with parameters mean and standard_dev. Use
this function to analyze data that has been logarithmically transformed.
Return Type: Numeric
Syntax: LOGNORMDIST(x,mean,standard_dev)
In the above syntax, parameters in bold are required.
Parameter Description
Example:
Formula Result
MAX Function
The MAX function returns the largest value in a set of values.
Return Type: Numeric
Syntax: MAX(value1, value2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
value1, value2, and Values for which you want to find a maximum value. Only
so on Numeric and Date fields can be evaluated.
Examples:
Formula Result
MAXA Function
The MAXA function returns the largest value in a list of arguments. Unlike the
MAX function, the MAXA function is not restricted to working with only Date and
Numeric fields.
Return Type: Numeric
Syntax: MAXA(value1, value2,...)
In the above syntax, parameters in bold are required.
Parameter Description
value1, value2,... 1 to 255 values for which you want to find the largest value.
Note that:
l Arguments can be the following: numbers; names or
references that contain numbers; text representations of
numbers; or logical values, such as TRUE and FALSE, in a
reference.
l Logical values and text representations of numbers that you
type directly into the list of arguments are counted.
l If an argument is a reference, only values in that reference are
used. Empty fields and text values in the reference are
ignored.
l Arguments that are error values or text that cannot be
translated into numbers cause errors.
l Arguments that contain TRUE evaluate as 1; arguments that
contain text or FALSE evaluate as 0 (zero).
l If the arguments contain no values, MAXA returns 0 (zero).
l If you do not want to include logical values and text
representations of numbers in a reference as part of the
calculation, use the MAX function.
Example:
Formula Result
MEDIAN Function
The MEDIAN function returns the median of the given numbers. The median is the
number in the middle of a set of numbers.
Return Type: Numeric
Syntax: MEDIAN(number1, number2,...)
In the above syntax, parameters in bold are required.
Parameter Description
number1, number2,... 1 to 255 numbers for which you want the median. Note that:
l If there is an even number of numbers in the set, MEDIAN
calculates the average of the two numbers in the middle. See
the second formula in the example.
l Arguments can be numbers, names or references that contain
numbers.
l Logical values and text representations of numbers that you
type directly into the list of arguments are counted.
l If a reference argument contains text, logical values, or empty
fields, those values are ignored; however, fields with the
value zero are included.
l Arguments that are error values or text that cannot be
translated into numbers cause errors.
Examples:
Formula Result
MIN Function
The MIN function returns the smallest value in a set of values.
Return Type: Numeric
Syntax: MIN(value1, value2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
value1, value2, and Values for which you want to find a minimum value. Only
so on Numeric and Date fields can be evaluated.
Examples:
Formula Result
MINA Function
The MINA function returns the smallest value in the list of arguments.
Return Type: Numeric
Syntax: MINA(value1, value2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
value1, value2,... 1 to 255 values for which you want to find the smallest value.
Note that:
l Arguments can be numbers; names or references that contain
numbers; text representations of numbers; or logical values,
such as TRUE and FALSE, in a reference.
l If an argument is a reference, only values in that reference are
used. Empty fields and text values in the reference are
ignored.
l Arguments that contain TRUE evaluate as 1; arguments that
contain text or FALSE evaluate as 0 (zero).
l Arguments that are error values or text that cannot be
translated into numbers cause errors.
l If the arguments contain no values, MINA returns 0.
l If you do not want to include logical values and text
representations of numbers in a reference as part of the
calculation, use the MIN function.
Example:
Formula Result
MODE Function
The MODE function returns the most frequently occurring, or repetitive, value in a
set of data.
Return Type: Numeric
Syntax: MODE(number1,number2,...)
Parameter Description
number1,number2,... 1 to 255 arguments for which you want to calculate the mode.
Arguments can be numbers, names, or references that contain
numbers.
If a reference argument contains text, logical values, or empty
fields, those values are ignored; however, fields with the
value zero are included.
Arguments that are error values or text that cannot be
translated into numbers cause errors.
If the data set contains no duplicate data points, MODE
returns an error.
The MODE function measures central tendency, which is the
location of the center of a group of numbers in a statistical
distribution. The three most common measures of central
tendency are:
l Average. The arithmetic mean, and is calculated by adding
a group of numbers and then dividing by the count of
those numbers. For example, the average of 2, 3, 3, 5, 7,
and 10 is 30 divided by 6, which is 5.
l Median. The middle number of a group of numbers; that
is, half the numbers have values that are greater than the
median, and half the numbers have values that are less than
the median. For example, the median of 2, 3, 3, 5, 7, and
10 is 4.
l Mode. The most frequently occurring number in a group of
numbers. For example, the mode of 2, 3, 3, 5, 7, and 10 is
3.
Example:
Formula Result
NEGBINOMDIST Function
The NEGBINOMDIST function returns the negative binomial distribution.
NEGBINOMDIST returns the probability that there will be number_f failures
before the number_s-th success, when the constant probability of a success is
probability_s. This function is similar to the binomial distribution, except that the
number of successes is fixed, and the number of trials is variable. Like the
binomial, trials are assumed to be independent.
For example, you need to find 10 people with excellent reflexes, and you know the
probability that a candidate has these qualifications is 0.3. NEGBINOMDIST
calculates the probability that you will interview a certain number of unqualified
candidates before finding all 10 qualified candidates.
Return Type: Numeric
Syntax: NEGBINOMDIST(number_f,number_s,probability_s)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
NORMDIST Function
The NORMDIST function returns the normal distribution for the specified mean
and standard deviation. This function has a very wide range of applications in
statistics, including hypothesis testing.
Return Type: Numeric
Syntax: NORMDIST(x,mean,standard_dev,cumulative)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
PEARSON Function
The PEARSON function returns the Pearson product moment correlation
coefficient, r, a dimensionless index that ranges from -1.0 to 1.0 inclusive and
reflects the extent of a linear relationship between two data sets.
Return Type: Numeric
Syntax: PEARSON(values1,values2)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
PERCENTILE Function
The PERCENTILE function returns the k-th percentile of values in a range. You
can use this function to establish a threshold of acceptance. For example, you can
decide to examine candidates who score above the 90th percentile.
Return Type: Numeric
Syntax: PERCENTILE(values,k)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Note: If the set is empty or contains more than 8,191 data points,
PERCENTILE returns an error.
Example:
Formula Result
PERCENTRANK Function
The PERCENTRANK function returns the rank of a value in a data set as a
percentage of the data set. This function can be used to evaluate the relative
standing of a value within a data set. For example, you can use PERCENTRANK
to evaluate the standing of an aptitude test score among all scores for the test.
Return Type: Numeric
Syntax: PERCENTRANK(values,x,significance)
In the above syntax, parameters in bold are required.
Parameter Description
values The reference to a set of fields with numeric values that defines
relative standing.
Examples:
Formula Result
Formula Result
PERMUT Function
The PERMUT function returns the number of permutations for a given number of
objects that can be selected from number objects. A permutation is any set or subset
of objects or events where internal order is significant. Permutations are different
from combinations, for which the internal order is not significant. Use this function
for lottery-style probability calculations.
Return Type: Numeric
Syntax: PERMUT(number,number_chosen)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Suppose that you want to calculate the odds of selecting a winning lottery number.
Each lottery number contains three numbers, each of which can be between 0
(zero) and 99, inclusive. The following function calculates the number of possible
permutations.
Formula Result
POISSON Function
The POISSON function returns the Poisson distribution. A common application of
the Poisson distribution is predicting the number of events over a specific time, such
as the number of cars arriving at a toll plaza in 1 minute.
Return Type: Numeric
Syntax: POISSON(x,mean,cumulative)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
PROB Function
The PROB function returns the probability that values in a range are between two
limits. If upper_limit is not supplied, returns the probability that values in x_range
are equal to lower_limit.
Return Type: Numeric
Syntax: PROB(x_range,prob_range,lower_limit,upper_limit)
Parameter Description
x_range The range of numeric values of x with which there are associated
probabilities.
lower_limit The lower bound on the value for which you want a probability.
upper_limit The optional upper bound on the value for which you want a
probability.
Examples:
Formula Result
RANK Function
The RANK function returns the rank of a number in a list of numbers. The rank of a
number is its size relative to other values in a list. (If you were to sort the list, the
rank of the number would be its position.)
RANK gives duplicate numbers the same rank. However, the presence of duplicate
numbers affects the ranks of subsequent numbers. For example, in a list of integers
sorted in ascending order, if the number 10 appears twice and has a rank of 5, then
11 would have a rank of 7 (no number would have a rank of 6).
For some purposes, you might want to use a definition of rank that takes ties into
account. In the previous example, you would want a revised rank of 5.5 for the
number 10. This can be done by adding the following correction factor to the value
returned by RANK. This correction factor is appropriate both for the case where
rank is computed in descending order (order = 0 or omitted) or ascending order
(order = nonzero value).
Correction factor for tied ranks = [COUNT(ref) + 1 – RANK(number, ref, 0) –
RANK(number, ref, 1)] / 2.
Return Type: Numeric
Syntax: RANK(number,values,order)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
RSQ Function
The RSQ function returns the square of the Pearson product moment correlation
coefficient through data points in known_y's and known_x's. For more information,
see PEARSON Function. The r-squared value can be interpreted as the proportion
of the variance in y attributable to the variance in x. Note that:
l Arguments can either be numbers, names, or references that contain numbers.
l Logical values and text representations of numbers that you type directly into the
list of arguments are counted.
l If a reference argument contains text, logical values, or empty fields, those
values are ignored; however, fields with the value zero are included.
l Arguments that are error values or text that cannot be translated into numbers
cause errors.
Parameter Description
Note: If known_y's and known_x's are empty or have a different number of data
points, RSQ returns an error. If known_y's and known_x's contain only 1 data point,
RSQ returns an error.
Example:
Formula Result
SKEW Function
The SKEW function returns the skewness of a distribution. Skewness characterizes
the degree of asymmetry of a distribution around its mean. Positive skewness
indicates a distribution with an asymmetric tail extending toward more positive
values. Negative skewness indicates a distribution with an asymmetric tail
extending toward more negative values.
Return Type: Numeric
Syntax: SKEW(number1,number2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
SLOPE Function
The SLOPE function returns the slope of the linear regression line through data
points in known_y's and known_x's. The slope is the vertical distance divided by the
horizontal distance between any two points on the line, which is the rate of change
along the regression line.
The underlying algorithm used in the SLOPE and INTERCEPT functions is
different than the underlying algorithm used in the LINEST function. The difference
between these algorithms can lead to different results when data is undetermined
and collinear. For example, if the data points of the known_y's argument are 0 and
the data points of the known_x's argument are 1, then:
l SLOPE and INTERCEPT return errors. The SLOPE and INTERCEPT algorithm
is designed to look for one and only one answer, and in this case there can be
more than one answer.
l LINEST returns a value of 0. The LINEST algorithm is designed to return
reasonable results for collinear data, and in this case at least one answer can be
found.
Parameter Description
Note: The arguments must be numbers, names, or references that contain numbers.
If a reference argument contains text, logical values, or empty fields, those values
are ignored; however, fields with the value zero are included. If known_y's and
known_x's are empty or have a different number of data points, SLOPE returns an
error.
Example:
Formula Result
SMALL Function
The SMALL function returns the k-th smallest value in a data set. Use this function
to return values with a particular relative standing in a data set. If n is the number
of data points in the values field, SMALL(values,1) equals the smallest value and
SMALL(values,n) equals the largest value.
Return Type: Numeric
Syntax: SMALL(values,k)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
values A set of numeric data for which you want to determine the k-th
smallest value.
Examples:
Formula Result
STANDARDIZE Function
The STANDARDIZE function returns a normalized value from a distribution
characterized by mean and standard_dev.
Return Type: Numeric
Syntax: STANDARDIZE(x,mean,standard_dev)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
STDEV Function
The STDEV function estimates standard deviation based on a sample. The standard
deviation is a measure of how widely values are dispersed from the average value
(the mean).
STDEV assumes that its arguments are a sample of the population. If your data
represents the entire population, compute the standard deviation using STDEVP.
The standard deviation is calculated using the "n-1" method. To include logical
values and text representations of numbers in a reference as part of the calculation,
use the STDEVA function.
Return Type: Numeric
Syntax: STDEV(number1,number2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Suppose 10 tools stamped from the same machine during a production run are
collected as a random sample and measured for breaking strength.
Formula Result
STDEVA Function
The STDEVA function estimates standard deviation based on a sample. The
standard deviation is a measure of how widely values are dispersed from the
average value (the mean). The standard deviation is calculated using the "n-1"
method.
STDEVA assumes that its arguments are a sample of the population. If your data
represents the entire population, you must compute the standard deviation using
STDEVPA.
If you do not want to include logical values and text representations of numbers in a
reference as part of the calculation, use the STDEV Function.
Return Type: Numeric
Syntax: STDEVA(value1,value2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Suppose 10 tools stamped from the same machine during a production run are
collected as a random sample and measured for breaking strength.
Formula Result
STDEVP Function
The STDEVP function calculates standard deviation based on the entire population
given as arguments. The standard deviation is a measure of how widely values are
dispersed from the average value (the mean).
STDEVP assumes that its arguments are the entire population. If your data
represents a sample of the population, compute the standard deviation using
STDEV.
For large sample sizes, STDEV and STDEVP return approximately equal values.
Parameter Description
Example:
Suppose 10 tools stamped from the same machine during a production run are
collected as a random sample and measured for breaking strength.
Formula Result
STDEVPA Function
The STDEVPA function calculates standard deviation based on the entire
population given as arguments, including text and logical values. The standard
deviation is a measure of how widely values are dispersed from the average value
(the mean).
STDEVPA assumes that its arguments are the entire population. If your data
represents a sample of the population, you must compute the standard deviation by
using STDEVA.
For large sample sizes, STDEVA and STDEVPA return approximately equal
values.
If you do not want to include logical values and text representations of numbers in a
reference as part of the calculation, use the STDEVP Function.
The standard deviation is calculated using the "n" method.
Return Type: Numeric
Syntax: STDEVPA(value1,value2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Suppose 10 tools stamped from the same machine during a production run are
collected as a random sample and measured for breaking strength.
Formula Result
STEYX Function
The STEYX function returns the standard error of the predicted y-value for each x
in the regression. The standard error is a measure of the amount of error in the
prediction of y for an individual x.
Return Type: Numeric
Syntax: STEYX(known_y's,known_x's)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
SUM Function
The SUM function adds all of the numbers in the specified parameters. If the SUM
function references a multi-selection values list, it can be used with the
SELECTED function to return the sum of the numeric values for each of the
currently selected items.
Return Type: Numeric
Syntax: SUM(number1, number2,...)
Parameter Description
number1, number2, Parameters for which you want the total value. These parameters
and so on can be entered as hard-coded values, for example, 2, or Numeric-
field references, for example, [field name]. Referenced fields can
reside within the application or within Sub-Form, Cross-
Reference, or Related Records fields.
Examples:
Formula Result
SUM(3, [Risk]) 15
where the value in the Risk field is 12.
SUM([Risk], [Criticality]) 19
where the value in the Risk field is 12 and
the value in the Criticality field is 7.
SUM(REF([Orders],[Price])) 202.94
where the value in the Price field within
the Orders sub-form are 120.00, 50.19, and
32.75.
SUM(SELECTEDVALUENUMBER([Key 25
Factors]))
where Key Factors is a multi-selection
Values List field and the numeric values of
the current selections are 3, 8, 4, and 10.
SUMIF Function
The SUMIF function sums the values of a specified Numeric field across all
records in a Sub-Form, Cross-Reference, or Related Records field that contain a
specific value in a given field. For example, you can return the sum of all Price
field values across all cross-referenced records in which the Status field is set to
“Shipped.”
Return Type: Numeric
Syntax: SUMIF(eval_field_ref, criterion, sum_field_ref)
In the above syntax, parameters in bold are required.
Parameter Description
eval_field_ref The reference to the field against which the criterion will be
evaluated.
sum_field_ref The reference to a Numeric field that will be summed across all
qualified records.
Examples:
Formula Result
Formula Result
Formula Result
Parameter Description
eval_field_ref The reference to the field against which the criterion will be
evaluated.
sum_field_ref The reference to a Numeric field that will be summed across all
qualified records.
Examples:
Formula Result
Formula Result
Formula Result
SUMPRODUCT Function
The SUMPRODUCT function multiplies corresponding components in the given
sets of fields, and returns the sum of those products.
Return Type: Numeric
Syntax: SUMPRODUCT(values1,values2,values3, ...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
values1, values2, 2 to 255 sets of values whose components you want to multiply
values3, ... and then add.
Example:
Formula Result
SUMSQ Function
The SUMSQ function returns the sum of the squares of the arguments.
Return Type: Numeric
Syntax: SUMSQ(number1,number2, ...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number1, number2, 1 to 255 arguments for which you want the sum of the squares.
... You can also use a reference to an array instead of arguments
separated by commas.
Example:
Formula Result
SUMX2PY2 Function
The SUMX2PY2 function returns the sum of the sum of squares of corresponding
values in two sets of fields. The sum of the sum of squares is a common term in
many statistical calculations.
Return Type: Numeric
Syntax: SUMX2PY2(values_x,values_y)
Parameter Description
Example:
Formula Result
SUMX2MY2 Function
The SUMX2MY2 function returns the sum of the difference of squares of
corresponding values in two sets of fields.
Return Type: Numeric
Syntax: SUMX2MY2(values_x,values_y)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Note: The arguments should be either numbers, names, or references that contain
numbers. If a reference argument contains text, logical values, or empty cells, those
values are ignored; however, fields with the value zero are included. If values_x
and values_y have a different number of values, SUMX2MY2 returns an error.
Example:
Formula Result
SUMXMY2 Function
The SUMXMY2 function returns the sum of squares of differences of
corresponding values in two sets of fields.
Return Type: Numeric
Syntax: SUMXMY2(values_x,values_y)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
TRIMMEAN Function
The TRIMMEAN function returns the mean of the interior of a set of data. The
value is derived by determining the mean of a series of values and excluding a
percentage of the top and bottom values from the data set. This function can be used
to eliminate outliers when determining the mean.
Return Type: Numeric
Syntax: TRIMMEAN(values,percent)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
TRIMMEAN(REF([Facilities],[Risk 69
Rating]), .2)
The values 45 and 92 were thrown out
where Facilities is a cross-reference field (since 20% of the values were to be
and the values in the Risk Rating field are excluded) and the function found the
35, 50, 52, 60, 68, 75, 79, 82, 86, and 100. mean of the remaining values.
VAR Function
The VAR function estimates the variance based on a sample of numbers. This
function can compute the variance for up to 255 different values.
Return Type: Numeric
Syntax: VAR(number1, number2,...)
Parameter Description
number1, number2, Parameters for which you want to find the variance. These
... parameters can be entered as hard-coded values, for example, 2,
or Numeric-field references, for example, [field name]. Referenced
fields can reside within the application or within Sub-Form,
Cross-Reference, or Related Records fields.
Example:
Formula Result
VARA Function
The VARA function estimates the variance based on a sample of numbers, text, or
logical values (TRUE or FALSE).
Return Type: Numeric
Syntax: VARA(value1, value2,...)
In the above syntax, parameters in bold are required.
Parameter Description
value1,value2, and Parameters for which you want to find the variance. These
so on parameters can be entered as hard-coded values, for example, 2,
or field references, for example, [field name]. Referenced fields
can reside within the application or within Sub-Form, Cross-
Reference, or Related Records fields. If logical values (TRUE or
FALSE) are used, they are evaluated as 1 and 0, respectively.
Example:
Formula Result
VARP Function
The VARP function estimates the variance based on the entire population. This
function can compute the variance for up to 255 different values.
Return Type: Numeric
Syntax: VARP(number1, number2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
number1, number2, Parameters for which you want to find the variance. These
... parameters can be entered as hard-coded values, for example, 2,
or Numeric-field references, for example, [field name]. Referenced
fields can reside within the application or within Sub-Form,
Cross-Reference, or Related Records fields.
Note: This function assumes that the numbers represent the entire
population. If your data set represents a sample population, you
must compute the variance using VAR.
Example:
Formula Result
VARPA Function
The VARPA function estimates the variance based on a total population of
numbers, text or logical values (TRUE or FALSE).
Return Type: Numeric
Syntax: VARPA(value1, value2,...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
value1,value2, ... Parameters for which you want to find the variance. These
parameters can be entered as hard-coded values, for example, 2,
or field references, for example, [field name]. Referenced fields
can reside within the application or within Sub-Form, Cross-
Reference, or Related Records fields. If logical values (TRUE or
FALSE) are used, they are evaluated as 1 and 0, respectively.
Example:
Formula Result
WEIBULL Function
The WEIBULL function returns the Weibull distribution. You can use this
distribution in reliability analysis.
Return Type: Numeric
Syntax: WEIBULL(x,alpha,beta,cumulative)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
WEIBULL(210,40,200,TRUE) .999124
WEIBULL(210,40,200,FALSE) .001175
ZTEST Function
The ZTEST function returns the one-tailed probability value of a z-test. The
function returns the probability that the sample mean would be greater than the
average of observations in the data set.
Return Type: Numeric
Syntax: ZTEST(values,test,sigma)
In the above syntax, parameters in bold are required.
Parameter Description
Example:
Formula Result
System Functions
System functions allow you to work with Archer-specific variables and options to
produce dynamic results. Available functions within this category include:
l CONTAINS Function l REF Function
l CONTENTID Function l SELECTEDVALUENUMBER Function
l GETGROUPS Function l TRACKINGID Function
l GETUSERS Function l USER Function
l GROUP Function l USERFIRSTNAME Function
l ISCORRECT Function l USERLASTNAME Function
l ISEMPTY Function l USERMIDDLENAME Function
l ISNUMBER Function l VALUEOF Function
l MOSTRECENTVALUE l WEIGHTEDSCORE Function
Function
l WEIGHTING Function
l NOVALUE Function
l OTHERTEXT Function
CONTAINS Function
The CONTAINS function is used to determine if any value within a list of values
matches the value stored in a given field. If one of the values matches the field
value, the function evaluates to TRUE and one value is returned. If there is no
match between the list of values and the field value, the function evaluates to
FALSE and another value is returned. The CONTAINS function must be used in
conjunction with an IF function.
Although done infrequently, the CONTAINS function may be used to test whether
the string value of a given Text field is equal to any one of a list of given string
values. When a Text field is targeted, the string value in the field will be compared
to the given test strings. Matching will be based on complete strings only. The
function will not find a match based on a substring. For example, if the target Text
field contains the value “Confiscated laptop”, CONTAINS will not find a match for
a test string of “laptop”.
Return Type: TRUE or FALSE
Syntax: IF(CONTAINS(eval_type, field_ref, value1, value2...),value_if_
true,value_if_false)
In the above syntax, parameters in bold are required.
Parameter Description
Parameter Description
CONTENTID Function
The CONTENTID function returns a content record ID that uniquely identifies the
current record within the context of the current application or sub-form. Content IDs
are generated sequentially, beginning with the number 1.
Return Type: Numeric
Syntax: CONTENTID( )
This function does not have any parameters.
Example:
Formula Result
GETGROUPS Function
The GETGROUPS function returns a list of group IDs for the groups currently
selected in a specified User/Groups List or Record Permissions field. The list of
group IDs can then be evaluated by another function. For example, GETGROUPS
might be used inside a CONTAINS function to determine whether a given group is
contained in the list of groups retrieved from a specified User/Groups List field.
Return Type: Numeric
Syntax: GETGROUPS(field_ref)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
Formula Result
GETUSERS Function
The GETUSERS function returns a list of user IDs for the users currently selected
in a specified User/Groups List or Record Permissions field. The list of user IDs
can then be evaluated by another function. For example, GETUSERS might be used
inside a CONTAINS to determine whether a given user is contained in the list of
users retrieved from a specified User/Groups List field.
Return Type: Numeric
Syntax: GETUSERS(field_ref)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
GROUP Function
The GROUP function is used to maintain the validity of a formula reference to a
specific group selection in a User/Groups List or Record Permissions field, even if
the group name is changed later.
Parameter Description
If the NAME string contains at least one @ sign, the system will
assume that all text following the last @ sign is a domain
reference and the system will attempt to locate that domain. If
the NAME string does not contain a @ sign, the system will
look for an exact match for the entire group name string in the
Archer (NULL) domain and the default domain.
Note: The system will attempt to match the domain name against
both active and deleted (for example, soft-deleted) domains. Only
active domain names must be unique; it is possible that a deleted
domain has the same name as an active domain. If the group
name string exists in more than one of the domains that have the
same name, the system will fail the formula on validation.
Parameter Description
5. If only one group with that name exists, the system will
replace the group name string in the formula with the ID of
that group.
ID. If ref_type is ID, the function will expect one or more
system-assigned group ID numbers. The IDs in the list should be
quoted. When using ID with GROUP, an error will occur during
formula validation the group ID cannot be found in any domain.
Examples:
Formula Result
ISCORRECT Function
The ISCORRECT function evaluates a Values List question and determines
whether the selected value is identified as “Correct” or “Incorrect.” Values are
identified as either correct or incorrect on the Answer tab of the Define Fields
page. The function evaluates to TRUE if the selected value is set as the “Correct”
value. The function evaluates to FALSE if the selected value is not set as the
“Correct” value. The ISCORRECT function must be used in conjunction with an IF
function and can only be used against a Values List question within a questionnaire.
Return Type: Text, numeric, date or a Values List field selection, depending on
the type of data supplied for the value_if_true and value_if_false parameters.
Syntax: ISCORRECT([field_ref])
In the above syntax, parameters in bold are required.
Parameter Description
Example:
Formula Result
IF(ISCORRECT([Password Compliant
Question]),“Compliant”,“Not Compliant”)
where the value selected for the question is
identified as “Correct”.
ISEMPTY Function
The ISEMPTY function is used to determine if a given field contains a value or is
blank (empty). The function evaluates to TRUE if the specified field is blank, for
example, contains no value. The function evaluates to FALSE if the specified field
is not blank (contains a value). The ISEMPTY function must be used in conjunction
with an IF function.
Return Type: Text, numeric, date or a Values List field selection, depending on
the type of data supplied for the value_if_true and value_if_false parameters.
Syntax: ISEMPTY([field_ref])
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
ISNUMBER Function
The ISNUMBER function checks the specified value and returns TRUE or FALSE
depending on whether it is a number. You can use this function to get information
about a value before performing a calculation or other action with it.
Return Type: TRUE or FALSE
Syntax: ISNUMBER(value)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
value The value that you want tested. The value argument can be a
blank (empty cell), error, logical value, text, number, or reference
value, or a name referring to any of these. Returns TRUE if
Value refers to a number.
Example:
Formula Result
MOSTRECENTVALUE Function
The MOSTRECENTVALUE displays a specific value from the record that is
evaluated as the "most recent" from a list of related records. For example, if a
record in the Facilities application is related to multiple questionnaires, you could
use this function to return the value of the Quantitative Summary field from the
most recently submitted questionnaire.
Return Type: Text
Syntax: MOSTRECENTVALUE(field_to_display, date_criteria_field)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
field_to_display This is the reference for the field value that you want to display,
for example, REF([Cross-Reference field name],[field name]).
date_criteria_field This is the Date field that you will use to determine which of the
related records has the most recent value, for example, REF
([Cross-Reference field name],[Date field name]).
Example:
Formula Result
MOSTRECENTVALUE(REF([Risk 65
Questionnaire],[Inherent Risk]), REF([Risk
Questionnaire],[Submitted Date]))
where the value in the Inherent Score field
of the record with the most recent
Submitted Date value is "65".
NOVALUE Function
The NOVALUE function is used either to set a null value for a calculated Date,
Text, or Numeric field or to set a calculated Values List field to have no selection.
The NOVALUE function will only be valid within the context of the IF or
ISERROR functions.
Examples:
Formula Result
IF([Rating] >=0, “Action Required”, The calculated Text field is set to null.
NOVALUE( ))
where the value of Rating is less than 6
and the calculated field is a Text field .
OTHERTEXT Function
The OTHERTEXT function returns the text a user has entered in the "Other" field
for the specified Values List field or Values List question.
Return Type: Text
Syntax: OTHERTEXT([field_ref])
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
REF Function
The REF function returns a reference to a field that is a child field to a parent Sub-
Form, Cross-Reference, or Related Records field. It can be used within another
calculation that requires a set of fields or values as input. REF is only valid for use
with the following field types:
l Cross-Reference
l Related Records
l Sub-Form
Return Type: Text, Numeric, Date, or a Values List field selection, depending on
the type of data returned from the referenced field
Syntax: REF(parent_field, child_field, data_level_name)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
data_level_name The name of the level under which the field resides where a
Cross-Reference field targets a multi-level application. Passing
data_level_name is optional and is only necessary when a Cross-
Reference field targets a multi-level application.
Examples:
Formula Result
SELECTEDVALUENUMBER Function
The SELECTEDVALUENUMBER function extracts the numeric value from the
values list item selected from a Values List field. If the Values List field allows
multiple selections, this function must be used in conjunction with an aggregate
function, as the following example shows:
SUM(SELECTEDVALUENUMBER([Multi-Select Values List Field]))
In addition, if you reference a Values List field in a cross-referenced application,
both the Cross-Reference field used to form the application relationship and the
Values List field in the related application must be single-select fields in order to
use the SELECTEDVALUENUMBER function without wrapping it in an
aggregate function. If either the Cross-Reference or Values List field allows
multiple selections, an aggregate function must also be used, as shown in the
following example:
AVERAGE(SELECTEDVALUENUMBER(REF([Multi-Select Cross-Ref Field],
[Values List Field])))
If no numeric value is assigned to a values list item, that value will be treated as 0.
The only exception is when the AVERAGE function is used in conjunction with the
SELECTEDVALUENUMBER function. In this case, the null value will not be
used in the calculation. Use the following values as an example:
Value A: 10
Value B: 5
Value C: no numeric value assigned
If the SUM function is used in conjunction with SELECTEDVALUENUMBER,
Value C will be treated as 0 in the calculation. If all three values were selected in
the Values List field, the result of the calculation would be 15. However, if the
AVERAGE function were used and all three values were selected in the Values
List field, Value C would be ignored in the calculation since it has no numeric
value. The result would be 7.5.
Return Type: Numeric
Syntax: SELECTEDVALUENUMBER(field_ref)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
SELECTEDVALUENUMBER([Risk 10
Rating])
where the selected value in the Risk Rating
field is “High” and the numeric value
assigned to the value “High” is 10.
MAX(SELECTEDVALUENUMBER 10
([Affected Departments]))
where the Affected Departments field is a
multi-select Values List field, the selected
values are “Operations” and “IT,” and the
associated numeric values are 7 and 10,
respectively.
AVERAGE(SELECTEDVALUENUMBER 9
(REF([Vendors], [Risk Rating])))
where Vendors is a multi-select Cross-
Reference field to the Vendors application,
Risk Rating is a single-select Values List
field in the Vendors application, the
selected values in the related records are
“High” and “Low,” and the associated
numeric values are 10 and 8, respectively.
TRACKINGID Function
The TRACKINGID function returns a record ID that uniquely identifies the current
record across all applications. This function could be used in conjunction with the
CONTENTID function to produce a complex ID that combines the system-wide ID,
the application-specific ID, and data pulled from other fields.
Return Type: Numeric
Syntax: TRACKINGID( )
This function does not have parameters.
Example:
Formula Result
[Type Code] & "-" & TRACKINGID( ) & "-" & CONTENTID( ) WORM-
678904-34
where the Type Code field is WORM, the system-wide tracking ID is
678904, and the application-specific content record ID is 34.
USER Function
The USER function maintains the validity of a formula reference to a specific user
selection in a User/Groups List or Record Permissions field, even if the user name
is changed later. User references can be passed as either as literal names or logon
IDs. A logon name can optionally be referenced by a specific domain.
For example, if the literal user name "Jones, Mary" is referenced in a formula
within the USER function and that user’s name is subsequently changed to "Jones-
Smith, Mary", the original user name reference will automatically be updated in the
formula to "Jones-Smith, Mary".
As another example, suppose that the user Mary Jones is referenced in a formula by
her Archer logon name for the domain "bigcompany.com". Her logon name should
be passed to the USER function as "[email protected]". If an administrator
later changes Mary Jones’ logon name on that domain to "msmith", the original
logon name will automatically be updated to "[email protected]".
The USER function also directly accepts system-assigned user ID numbers. Each
user in the system has an internal ID number that is guaranteed to be unique. For
example, if two users both named Graham, Ned exist in the system, the user name
cannot be resolved to determine whether the intended Graham, Ned is selected in
the given User/Groups List or Record Permissions field. However, a system ID, for
example, 76219, can be used in place of the ambiguous user name to uniquely
identify the correct Graham, Ned.
Return Type: Text or Numeric, depending on the format selected for the ref_type
parameter
Syntax: USER(ref_type, value1, value2…)
In the above syntax, parameters in bold are required.
Parameter Description
Parameter Description
Examples:
Formula Result
Parameter Description
Parameter Description
Examples:
Formula Result
USERFIRSTNAME Function
The USERFIRSTNAME function returns the first name of either the record creator
or the record editor. The creator is defined as the user who created the record (or is
currently creating the record). The editor is defined as the user who last edited the
record.
Return Type: Text
Syntax: USERFIRSTNAME(user_type)
In the above syntax, parameters in bold are required.
Parameter Description
Examples:
Formula Result
USERLASTNAME Function
The USERLASTNAME function returns the last name of either the record creator
or the record editor. The creator is defined as the user who created the record (or is
currently creating the record). The editor is defined as the user who last edited the
record.
Return Type: Text
Syntax: USERLASTNAME(user_type)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
USERMIDDLENAME Function
The USERMIDDLENAME function returns the middle name of either the record
creator or the record editor. The creator is defined as the user who created the
record (or is currently creating the record). The editor is defined as the user who
last edited the record.
Return Type: Text
Syntax: USERMIDDLENAME(user_type)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
VALUEOF Function
The VALUEOF function maintains the validity of a Values List field selection. If
the text of a value is changed in the custom or global values list by an
administrative user, this function will automatically update the formula to utilize the
new text for the value. For example, if the value "Blue" is referenced in a formula
with the VALUEOF function and that value is subsequently changed to "Red"
within the values list, the value reference "Blue" will automatically be changed to
"Red" within the formula.
From a user perspective, the VALUEOF function serves two additional purposes, it
enables you to:
l Evaluate a Values List field for the presence of a specific value
l Set value selections in a Values List field.
The following example shows the use of the VALUEOF function within a formula
for a calculated Values List field. The VALUEOF function is used for both the
"value_if_true" and "value_if_false" parameters within the IF function syntax.
IF([Risk Rating]>=10, VALUEOF([Criticality], "High"), VALUEOF([Criticality],
"Low"))
Within a record, this formula will evaluate the "Risk Rating" field, and if the value
in that field is greater than or equal to 10, the formula will select the value "High"
in the Criticality calculated Values List field. If the value in the "Risk Rating" field
is less than 10, the formula will select the value "Low" in the Criticality field.
This second example shows the use of the VALUEOF function within a formula for
a calculated Text field. The VALUEOF function is used for the "value" parameter
within the CONTAINS function syntax.
IF(CONTAINS(ANY, [Location],VALUEOF([Location], "New
York")),"Yes","No")
Within a record, this formula will produce the value "Yes" or "No" in the calculated
Text field depending on whether the value "New York" has been selected in the
"Location" field, which is a Values List field. If the value "New York" has been
selected, the calculated Text field will display the value "Yes." If the value "New
York" has not been selected, the calculated Text field will display the value "No."
Return Type: Text
Syntax: VALUEOF(field_ref, value1, value2…)
In the above syntax, parameters in bold are required.
Parameter Description
value1, value 2, ... A value within a Values List field. The value should be entered
as "value", for example, "Urgent". If the Values List field allows
multiple selections, multiple values can be entered as
"value1";"value2";"value3", for example, "Washington";"New
York";"Massachusetts".
Examples:
Formula Result
IF(CONTAINS(ANY, Local
[Location],VALUEOF([Office], "Chicago”,
"Local", "Global")))
where the selected value in the Location
field is Chicago.
WEIGHTEDSCORE Function
The WEIGHTEDSCORE function returns the weighted score value for the values
selected in a Values List question. This function is only useful if you assigned a
weight to the Values List question and you assigned a numeric value to each of the
possible answers to the question.
Using this function will execute the following calculation:
[values list selection numeric value] * [values list question weighting] =
WEIGHTEDSCORE
Parameter Description
Example:
Formula Result
WEIGHTING Function
The WEIGHTING function returns the weighting value of a Values List question.
The WEIGHTING function can only be used within a questionnaire and can only
reference a Values List question.
Return Type: Numeric
Syntax: WEIGHTING([field_ref])
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
Text Functions
Text functions allow you to utilize and manipulate text strings to produce dynamic
values. Available functions within this category include:
l CONCATENATE Function
l FIND Function
l LEN Function
l LOWER Function
l MASKEDTEXT Function
l NUMBERFORMAT Function
l PROPER Function
l RIGHT Function
l SUBSTRING Function
l UPPER Function
l TRIM Function
CONCATENATE Function
The CONCATENATE function joins up to 255 text strings into 1 text string. The
joined items can be text, numbers, cell references, or a combination of those items.
You must specify any spaces or punctuation that you want to appear in the results
as an argument that is enclosed in quotation marks.
Return Type: Text
Syntax: CONCATENATE(text1, text2, ...)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
text2, ... Additional text items, up to a maximum of 255 items. The items
must be separated by commas.
Example:
Formula Result
FIND Function
The FIND function searches for a specific character or text string within another
text string. It returns the number of the character at which the specific character or
test string is first found. The FIND function is case sensitive.
Return Type: Numeric
Syntax: FIND(find_text, field_ref, start_num)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
find_text The character or text string you want to find. You can format this
parameter as a hard-coded character or text string, for example,
"sci", or as a Text-field reference, for example, [field name].
Examples:
Formula Result
LEFT Function
The LEFT function returns the first character or characters in a text string, based on
the number of characters that you specify. LEFT is intended for use with languages
that use the single-byte character set (SBCS). LEFT always counts each character,
whether single-byte or double-byte, as 1, regardless of what the default language
setting is.
Return Type: Numeric
Syntax: LEFT(text,num_chars)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
text The text string that contains the characters that you want to
extract.
num_chars The number of characters that you want LEFT to extract. Note
that:
l Num_chars must be greater than or equal to zero.
l If num_chars is greater than the length of text, LEFT returns
all of text.
l If num_chars is omitted, it is assumed to be 1.
Examples:
Formula Result
LEN Function
The LEN function returns the number of characters in the supplied string.
Return Type: Numeric
Syntax: LEN(text)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Example:
Formula Result
LOWER Function
The LOWER function converts all characters in the supplied text string to
lowercase. This function does not affect non-alphabetic characters.
Return Type: Text
Syntax: LOWER(text)
In the above syntax, parameters in bold are required.
Parameter Description
Examples:
Formula Result
MASKEDTEXT Function
The MASKEDTEXT function returns the string value of the referenced Text field
using the mask (if any) defined for the field. If the function references a Text field
for which a mask has not been defined, the function will return the raw value from
the field.
Parameter Description
Examples:
Formula Result
NUMBERFORMAT Function
The NUMBERFORMAT function is used to "pad" zeros (0) to the left of a given
numeric value based on the count of digits specified by the number "mask." The
zero padding is only applied if the number of digits in the numeric value falls short
of the number of digits specified in the mask. This function returns a text value
(string) that can be concatenated to other strings or stored directly in the Text field.
Return Type: Text
Syntax: NUMBERFORMAT(value, value_mask)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
value_mask The mask used to format the returned text value. The value_mask
parameter must be enclosed in quotes.
The final placeholder in the value_mask parameter must always
be a single pound sign (#). The placeholders allowed for this
function are:
0 = Zero placeholder
# = Value placeholder
Examples:
Formula Result
NUMBERFORMAT(TRACKINGID( ), 001
"00#")
where the tracking ID returned by the
TRACKINGID function is 1.
NUMBERFORMAT(TRACKINGID( ), 0000937
"000000#")
where the tracking ID returned by the
TRACKINGID function is 937.
PROPER Function
The PROPER function capitalizes the first letter of each word in the supplied
string, as well as the first letter that follows any non-alphabetic character in the
string. All other letters in the string are converted to lowercase.
Return Type: Text
Syntax: PROPER(text)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
Examples:
Formula Result
RIGHT Function
The RIGHT function returns a specific number of characters from the right side of
the string. For example, if you specify 3 characters, the last 3 characters from the
string will be returned.
Return Type: Text
Syntax: RIGHT(text, num_chars)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
text The text string that contains the characters that you want to
return. This parameter should be formatted as a Text-field
reference, for example, [field name].
num_chars Specifies the number of characters in the text string that you
want to return. This parameter must be greater than or equal to 0
(zero). If this parameter is negative, the function will return an
error.
Example:
Formula Result
SUBSTRING Function
The SUBSTRING function returns a specified number of characters from a text
string. When creating a formula with this function, you specify the character
position where you want to start extracting text, and you specify the number of
characters to return. For example, if you enter 1 as the start position and 3 as the
number of characters to return, you would get the substring "Mar" from a Text field
with the value "Marketing."
Return Type: Text
Syntax: SUBSTRING(text, start_num, num_chars)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
text_field The text string that contains the characters that you want to
return. This parameter should be formatted as a Text-field
reference, for example, [field name].
start_num Specifies the position of the first character that you want to
extract from the Text field. The first character in a string has a
start number of 1. The start_num value must be greater than or
equal to 1. If the start_num parameter is greater than the number
of characters in the Text field, the function will return "" (empty
text). If the start_num parameter is less than the number of
characters in the Text field, but start_num plus num_chars
exceeds the number of characters in the Text field, the function
will return all possible characters up to the end of the text.
num_chars Specifies the number of characters in the Text field that you want
to return. This parameter must be greater than or equal to 0
(zero). If num_chars is negative, the function will return an error.
Example:
Formula Result
TRIM Function
The TRIM function removes spaces from text strings, with the exception of single
spaces between words. A common use for the TRIM function is to remove extra
spaces from data received from an integration or data import. Often, data formatted
in another system has irregular spacing. Using the TRIM function ensures that
unnecessary spaces are removed from your Archer text.
Return Type: Text
Syntax: TRIM(text)
In the above syntax, parameters in bold are required.
The following table describes the parameters of the function.
Parameter Description
text The text string from which you want to remove the unnecessary
spaces.
Example:
Formula Result
UPPER Function
The UPPER function converts all characters in the supplied string to uppercase.
This function does not affect non-alphabetic characters.
Return Type: Text
Syntax: UPPER(text)
In the above syntax, parameters in bold are required.
Parameter Description
Examples:
Formula Result
When working with formulas, use best practices by reviewing the following topics:
l Calculated Field Use Cases
l Circular References
l Complex/Nested Formulas
l Common Mistakes
ID Generation
Requirements: Create a unique record ID that combines a threat-type code, the
current date, and a counter value that is automatically incremented with each new
record. Always express the counter value using five digits; pad zeroes on the value
when necessary. Example: WORM-05232005-00019
Solution: Create a calculated text field that uses the following formula:
[Type Code] & “-“ & DATEFORMAT(TODAY( ), “mmddyyyy”) & “-“ &
NUMERFORMAT(CONTENTID( ), 0000#)
Scoring
Requirements: Using key impact indicators, assign a priority score to a security
violation report. Do not display a raw numeric score. Instead, determine whether
the score falls within the High or Low priority range. Display a text value indicating
the final priority score. Example: High
Solution: Create a calculated Numeric field to compute the raw priority score.
Suppress the display of this field by removing it from the application layout, then
create a calculated text field that maps the raw score to a priority range. Display
the corresponding range name (High or Low) in the calculated text field. Use the
following formulas:
Numeric Field: SUM([Current Impact], [Potential Impact], [LOB Impact]) *
[Violation Potential])
Text Field: IF([Raw Score] <= 15, “Low”, “High”)
Date Countdown
Requirements: Compute and display the number of days remaining before a
trouble ticket record reaches its promised resolution deadline. Example: 5 Days
Remaining
Solution: Create a calculated Text field that uses the following formula:
([Due Date] - TODAY( )) & “Days Remaining”
Circular References
Circular references are sometimes difficult to detect. Circular references are
caused by formulas that form either a direct or indirect loop.
l A direct loop is formed when a series of field references form a closed circuit.
l An indirect loop can sometimes result when a series of field references includes
a reference to a field that is set to Always recalculate.
The Platform does not allow formulas that might result in circular references.
Whenever a possible circular reference condition exists, a validation message is
displayed. Previously if this condition existed, the message that displayed was:
“The formula will result in a circular field reference that cannot be resolved.”
Improvements were made to the Platform validation messages to help reconcile
circular references. The new validation message includes the field name and
module name of both the field and the field to which it references. Now the
message might look something like this:
Calc Depend
Field Module Level
Always All
The Calc Always column contains the value of the Always Recalculate flag set at
the calculated field. The Depend All column contains the value set by the Platform
for a questionnaire that has questions dependent on any calculated field.
To see the circular reference details, validation must be done in Formula Builder.
Using the fields from two different applications that reference each other, the
message for this condition might look like this:
Calc Depend
Field Module Level
Always All
Calc Depend
Field Module Level
Always All
The following figure shows an indirect loop caused by a circular reference. This
condition results in a circular reference because Rating is indirectly dependent on
Criticality. Because Rating is set to Recalculate Always, it calculates every time
that Criticality calculates.
Calc Depend
Field Module Level
Always All
Complex/Nested Formulas
Use the Always option of the Recalculation rules when a formula contains the
NOW( ) or TODAY( ) functions, or user first name, last name, and middle name
(Editor) parameters. When this option is selected, fields are recalculated whenever
content is saved regardless of content change. This option adds processing overhead
and can slow performance if used unnecessarily.
Using the Always option for any other purpose may result in cycles. This condition
makes it more difficult to find and to troubleshoot.
When using the DATEADD or DATEDIF function, the functions error when the
Date field is empty.
Common Mistakes
Syntax errors cause many of the common mistakes. The formula syntax changed
from version 4.x to 5.x.
This section includes common mistakes that occur when using the DATE,
ROUND, STRING, and VALUEOF functions.
DATE
Dates and times are converted to Greenwich Mean Time (GMT) in the Platform
database. As a result, dates and times in calculations are returned in GMT.
Dates and times are converted to the locale of the user when the date or time is
displayed in a field. For example, suppose the locale is Central Time and the date
entered in a Date field called Due Date is 8/3/2012 9:00 PM. The date and time
stored in the database is 8/4/2012 2:00 ARE. Any user viewing this record with this
field sees the user’s time zone, for example, EST 8/3/2012 10:00 PM.
When manipulating date and time and displaying them in a field type other than a
Date field, dates and times are displayed in GMT. For example, a calculated text
field with the formula DATEFORMAT([Due Date], “YYYY-MM-DD HH-MM
AM”) referencing the Due Date from the formula above returns 08-04-2012 2:00
AM.
A numeric calculated field with the formula DAY([Due Date]) returns 4.
ROUND
Rounds a number to a specified number of digits. When the number to the right of
the decimal point is 5 or greater, the number is rounded up to the nearest integer.
If the num_digits parameter is greater than 0 (zero), the number is rounded to the
specified number of decimal places. If the num_digits parameter is equal to 0, the
number is rounded to the nearest integer. If the num_digits parameter is less than 0,
the number is rounded to the left of the decimal point to the specified number of
decimal places.
For example, if the num_digits parameter is -1 and the number is 101.5, the number
is rounded to 100.
STRING
When using string manipulations, consider the data that is stored in the field. For
example, suppose a Text Area field named Description contains
<strong>Hello</strong>, and the formula is LEN([Description]). Although the user
only sees Hello, the calculation results are 22, which is the total number of
characters in the string.
VALUEOF
A common misconception of the VALUEOF is that it returns true or false if the
referenced value is selected in the referenced field. Often a formula is written as IF
(VALUEOF[Color], “Blue”, 1,0) and should be written as IF([Color] = VALUEOF
[Color], “Blue”, 1,0).
The only purpose of the VALUEOF function is to make a formula resilient to value
changes in a Values List. If the text of a value is changed in a custom or global
values list by an administrator, this function automatically updates the formula to
use the new text for the value.
For example, if the value "Blue" is referenced in a formula with the VALUEOF
function, and that value is subsequently changed to "Red" in the values list, the
value reference of "Blue" is automatically changed to "Red" in the formula.
Chapter 5: Troubleshooting
Using the formula as an example, the Open Date might be stored in B2 and the Due
Date stored in B3.
An error message for this formula might look like:
In this example, B3 is the parameter cell for Due Date and DATEDIF is expecting
a valid serial date.
Invalid Value
Resolution Use the ISEMPTY function to check for empty dates and to avoid
.calculating against an empty date.
Multiple Values
Cause DATEDIF expects only one value, and this record relates to multiple
incidents.
Resolution Use an interim function to generate one value for the second parameter,
for example, MAX..
Divide by Zero
Formula 1 + 10/[Value]
Formula SUBSTRING([Description],1,10)
Error Index and length must refer to a location within the string. Parameter
name: length
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Data Driven Events
Contents
Preface 5
About this Guide 5
Product Documentation 7
Support and Service 8
Chapter 1: About Data Driven Events 9
Data Driven Event Guidelines 9
Process Flow 9
Insert Scenario - Add New 10
Update Scenario - Edit 11
Special Considerations - Process Flow 12
Chapter 2: Rules 15
Managing Rules 15
About Rules 15
Rule Order 18
Create a Rule 18
Update the General Properties of the Rule 19
Define the Rule Criteria 20
Field Types and Operators 21
Changed Operators 23
Link Actions to a Rule 23
Configure the Rule Order 24
Delete a Rule 26
Remove an Action from a Rule 26
Chapter 3: Actions 29
Managing Actions 29
Action Types 29
Action Types 30
Apply Conditional Layout Action 30
Section-Level Options 31
Field-Level Options 33
User/Group Access 33
ACL Action Example 34
Conflict Resolution - ACL 34
Special Considerations - ACL 36
Create an Apply Conditional Layout Action 37
Filter Values List Items Action 39
Conflict Resolution - Filter Values List Items 39
Special Considerations - Filter Values List Items 40
Create a Filter Values List Action 42
Generate Notification Action 44
Special Considerations - Generate Notification 45
Create a Generate Notification Action 47
Update the General Properties of a Generate Notification Action 48
Define the Layout for the Generate Notification Action 49
3
RSA Archer GRC Platform Data Driven Events
4
RSA Archer GRC Platform Data Driven Events
Preface
A DDE is the conceptual combination of a rule and one or more linked actions.
Before building DDEs, review the Data Driven Event Guidelines.
A rule is a set of one or more data conditions or values that must be met for the rule
to evaluate to true. Rules are evaluated in a specified rule order.
An action is a predefined operation that is executed when linked to a rule. Actions
are executed only when the rule to which they are linked is evaluated as true.
When a DDE is triggered, each rule is evaluated and its linked actions are executed
as applicable. The action is only executed when the rule is true.
Preface 5
RSA Archer GRC Platform Data Driven Events
Rules and actions are stored in separate libraries. A single rule can have any
number of actions linked to it. Additionally, a single action can be linked to any
number of rules.
Rules and actions are defined in the context of a specific application or
questionnaire and are not available to other applications or questionnaires. In
leveled applications, rules and actions are defined in the context of a specific level
and are not available to other levels.
Depending on how rules are configured in an application or questionnaire, it is
possible that the actions defined for those rules could conflict with each other.
Conflict resolution is provided in each of the action types. See Action Types.
When defining an action, it is important to understand the effects and expected
behaviors that can occur when an action is executed. Each action type includes a
list of various things to consider when defining actions.
Data driven events includes a utility, named Event Analyzer, for troubleshooting
DDE rules. The Event Analyzer provides a real-time view of rule evaluations and
actions that are applied as a result of user interaction with the content edit page.
To create, edit, or delete both rules and actions, your user account must specify that
you:
l Are an application owner
l Have update rights on the Manage Application page
l Have ownership rights to the questionnaire (if working on a questionnaire)
For information on using the Event Analyzer to troubleshoot data driven events in an
application, see Troubleshoot Data Driven Events.
For information on action-related tasks, see the following topics:
l Managing Actions
l Create an Apply Conditional Layout Action
l Create a Filter Values List Action
l Create a Generate Notification Action
l Create a Set Date Action
l Create a Set Values List Selection Action
l Delete an Action
6 Preface
RSA Archer GRC Platform Data Driven Events
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Preface 7
RSA Archer GRC Platform Data Driven Events
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
8 Preface
RSA Archer GRC Platform Data Driven Events
Process Flow
Rules are evaluated and actions are executed in a rules session. A rules session is a
single, uninterrupted pass of evaluating rules in a specified order and executing
linked actions for rules that are true.
The rule and its corresponding actions are processed at different times during the
Record Edit and Record Save processes depending on the type of action being
invoked.
Note: In 5.0 to 5.1.3 versions, rules sessions are invoked when a user saves or
applies a record and when the user changes field values.
In version 5.1.4, rules sessions are no longer invoked when a user saves or applies a
record with the exception of Generate Notification actions.
See Insert Scenario - Add New and Update Scenario - Edit to see the processes for
adding a new record and for updating a record.
The following figure shows the Insert Scenario – Add New process flow.
The following figure shows the Update Scenario – Edit process flow.
Off-layout and private fields to which the user does not have field permissions:
l Can be used as a rule condition to evaluate.
l Cannot be directly set.
Calculated values are always evaluated after executing Save or Apply with the
exception of Generate Notification actions.
Generate Notification actions are only executed by a record being saved. This
action is executed at the end of the record save process and is the only action
executed after calculated fields and record permission fields are computed.
System fields can be used as rule conditions. The First Published Date and Last
Updated Date fields are not available until after the record is saved. Generate
Notification actions are entirely different from other actions and execute after these
values are calculated.
Chapter 2: Rules
Managing Rules
A rule is a set of one or more data conditions or values that must be met for the rule
to be true. Actions are executed only when the rule to which they are linked is true.
A rule can be linked to one or more action types. Rules are evaluated sequentially
according to the priority in which they are assigned in the Rule Order dialog box.
Administrators and application owners can use any of the following action types:
l Apply Conditional Layout
l Filter Values List Items
l Set Date
l Set Values List Selection
l Generate Notification
About Rules
l Rules are owned by the application or questionnaire and are not available to
other applications or questionnaires.
l Rules are evaluated and actions are executed in a rules session.
l A rules session is a single uninterrupted pass of evaluating rules in a specified
order and executing linked actions for any rules that are true.
l A rules session is invoked when a record is added, changed, or saved.
l Rules can be copied and edited to make similar rules.
l Rules can be based on field types that allow for a user selection or data entry.
See Field Types.
l The following fields cannot be used in a rule:
Note: Sub-forms can be used, but not the fields in the sub-form.
Attachment Image
Chapter 2: Rules 15
RSA Archer GRC Platform Data Driven Events
Discussion Tracking ID
l The following table shows when rules are evaluated and which actions are
executed based on user interaction.
16 Chapter 2: Rules
RSA Archer GRC Platform Data Driven Events
l The following table shows what happens when a rule is based on calculated
fields.
Chapter 2: Rules 17
RSA Archer GRC Platform Data Driven Events
Rule Order
Rule order determines the specific order in which the applicable actions of each
rule are executed. Administrators can use rule order to dynamically or conditionally
control when actions are executed based on a business process. The rule order is
specified in the Rule Order dialog box.
Rules are evaluated sequentially according to the priority in which they are
assigned. Rule 1 is ranked higher in priority than Rule 2, Rule 2 is ranked higher
than Rule 3, and so forth.
Example
Suppose that there are five rules. Each rule is evaluated individually starting with
the highest priority (Rule 1) and finishing with the lowest priority (Rule 5). The
appropriate actions of each rule are executed before the next rule in sequence is
evaluated. This process continues until all rules are evaluated and the applicable
actions of each rule are executed.
Rules can contain actions that conflict with each other. Conflict resolution for each
action type is provided in that action:
l Conflict Resolution - ACL
l Conflict Resolution - Filter Values List Items
l Conflict Resolution - Set Date
l Conflict Resolution - Set Values List Selection
Create a Rule
You can create a rule and link an action or actions to that rule. A single rule can
have multiple actions linked to it.
Procedure
1. Navigate to the Events tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
18 Chapter 2: Rules
RSA Archer GRC Platform Data Driven Events
Next Steps
Update the General Properties of the Rule
Define the Rule Criteria
Procedure
1. Navigate to the Events tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
Chapter 2: Rules 19
RSA Archer GRC Platform Data Driven Events
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
2. Click the rule that you want to update.
The Manage Rule page is displayed.
3. Complete the General Informationsection:
a. In the Name field, enter a name for the rule.
b. In the Status field, select Active. To prevent anyone from using this rule
until you are ready, select Inactive.
c. In the Description field, enter the brief description for the rule.
4. Click Apply.
Next Steps
Define the Criteria for a Rule
Procedure
1. Navigate to the Events tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
20 Chapter 2: Rules
RSA Archer GRC Platform Data Driven Events
4. Click Apply.
Next Steps
Link Actions to a Rule
Chapter 2: Rules 21
RSA Archer GRC Platform Data Driven Events
Date Equals
First Published Date Does Not Equal
Last Updated Date Current
Last
Next
Greater Than
Less Than
Between
After Today
Prior To Today
Changed
Changed To
Changed From
IP Address Equals
Record Status Does Not Equal
Changed
Changed To
Changed From
Numeric Equals
Does Not Equal
Greater Than
Less Than
Between
Changed
Changed To
Changed From
22 Chapter 2: Rules
RSA Archer GRC Platform Data Driven Events
Equals
Does Not Equal
Greater Than
Less Than
Between
Changed
Changed To
Changed From
Sub-form Changed
Changed Operators
The Changed operator only evaluates the previously saved value of a field against
the current value of the field. For new content, the initial state of the value is
considered empty.
Example
Chapter 2: Rules 23
RSA Archer GRC Platform Data Driven Events
Procedure
1. Navigate to the Events tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
2. Click the rule that you want to update.
The Manage Rule page is displayed.
3. In the Linked Actions section, click Select Actions.
The Action Lookup dialog box opens with the list of actions available to this
rule.
4. Select the action that you want to link to this rule.
5. Click OK to close the Action Lookup dialog box.
The selected actions are displayed in the Linked Actions section.
6. Click Apply.
Next Steps
Configure Rule Order
24 Chapter 2: Rules
RSA Archer GRC Platform Data Driven Events
Rule Order determines the specific order in which the applicable actions of each
rule are executed. Use rule order to dynamically or conditionally control when
actions are executed based on a business process. Rules are evaluated sequentially
according to the priority in which they are assigned. Rule 1 is ranked higher in
priority than Rule 2, Rule 2 is ranked higher than Rule 3, and so forth. For example,
the first rule is evaluated and (if the rule is true) all actions linked to that rule are
executed. Then the second rule is evaluated and (if true) all actions linked to that
rule is executed.
Procedure
1. Navigate to the Events tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
2. Click Configure Rule Order.
The Rule Order dialog box opens.
3. Click one or more rule names and drag and drop to the correct position.
4. If the application is leveled, in the Rule Order dialog box, click each level tab
and configure the appropriate order for each level.
5. Click OK to close the Rule Order dialog box.
6. Click Save.
Chapter 2: Rules 25
RSA Archer GRC Platform Data Driven Events
Delete a Rule
If you no longer need a rule, you can delete it from the system. Deleting a rule does
not delete the actions linked to it; those actions continue to exist in the Action
Library and maintain their links with other rules.
Procedure
1. Navigate to the Events tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
2. Click the row and view the description of the rule that you want to delete.
Procedure
1. Navigate to the Events tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
26 Chapter 2: Rules
RSA Archer GRC Platform Data Driven Events
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
2. Click the rule that you want to update.
The Manage Rule page is displayed.
3. In the Linked Actions section, click next to the action that you want to
disassociate from the rule.
4. Click Apply.
Chapter 2: Rules 27
RSA Archer GRC Platform Data Driven Events
Chapter 3: Actions
Managing Actions
An action is a predefined operation that is executed when linked to a rule.
Actions are:
l Stored in a library and can be used with any number of rules
l Only executed when linked to a rule that is true
l Reusable across multiple rules
l Owned by the application or questionnaire and are not available to other
applications or questionnaires
Fields that are defined in an application or questionnaire are used in an action. For
example, fields can be added to a section on the layout of an application or
questionnaire and then be conditionally required or hidden by an Apply Conditional
Layout (ACL) action.
Action Types
The following table describes each action type.
Apply Conditional Layout Configures dynamic record layouts based on the state of
the record.
Filter Values List Items Restricts the values available for selection in a Values
List field to a subset of the values defined for the field.
Set Date Configures and sets a value for a Date field that can be
overridden.
Set Values List Selection Configures and sets a value for a Values List field that
can be overridden.
Chapter 3: Actions 29
RSA Archer GRC Platform Data Driven Events
Action Types
An action is a predefined operation that is executed when linked to a rule. Actions
are stored in a library and can be used with any number of rules. Actions are only
executed when linked to a rule that is true. Actions are reusable across multiple
rules.
You can create actions based on the action types described in the following table.
Apply Conditional Layout Configures dynamic record layouts based on the state of
the record.
Filter Values List Items Restricts the values available for selection in a Values
List field to a subset of the values defined for the field.
Set Date Configures and sets a value for a Date field that can be
overridden.
Set Values List Selection Configures and sets a value for a Values List field that
can be overridden.
Note: Set actions are Set Date and Set Values List Selection. The filter action is
Filter Values List Items.
30 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
With the exception of Required field settings, ACLs are intended to serve only as a
cosmetic treatment to ease data entry and viewing in the form for a particular
application or questionnaire. Fields that are hidden by an ACL action are still
available in search results and filters for defining reports, searches, and
notifications.
Data that is hidden by an ACL action to a user cannot be printed or exported by that
user. Field access permissions are still applied for printing and exporting.
The Layout Configuration section enables you to select which sections and fields in
the application that you want to display as a result of this action. When working
with this section, keep the following points in mind:
l The key icon indicates a key field and the calculator icon indicates a
calculated field.
l The user must have edit privileges to edit a field. The settings on this page do not
grant edit privileges to an account that does not already have those privileges.
l Be careful when selecting to hide a required field. The field is still required,
even if it is not displayed.
l The settings in this section do not change the layout of the page. To change the
layout, use the Layout tab of the Manage Application page.
l If the layout of the application has multiple tabs, the Layout Configuration
section includes multiple tabs.
l Placeholders may still be displayed for a screen object even though the object is
not displayed.
Section-Level Options
Sections determine how fields are organized on the layout of an application or
questionnaire. A section-level option can override a field-level option. See Field-
Level Options. The following table describes the available section-level options.
Option Description
Use Default Settings All fields and objects in the section are displayed. Individual
fields and objects in the section can have field-level options
configured.
Display All fields and objects in the section are forced to display (subject
to the user having field permissions to that field). Individual
fields and objects in the section can have field-level options
configured.
Read Only All fields in the section are displayed as read only and are not
available for editing. Individual fields in the section cannot have
field-level options configured. Objects in the section function as
originally configured.
Chapter 3: Actions 31
RSA Archer GRC Platform Data Driven Events
Option Description
Do Not Display All fields and objects in the section are not displayed. Individual
fields and objects in the section cannot have field-level options
configured.
Setting a section to Read Only affects all of the fields in the section, but does not
impact the non-field objects in the section, such as custom interface and text box
objects. These objects continue to function as originally configured.
If multiple Apply Conditional Layout actions conflict for a field, the system
executes the action that is highest in the following order of precedence:
1. Section-level Read Only
2. Section-level Display*
3. Section-level Do Not Display
4. Section-level Use Default Settings
5. Field-level Required
6. Field-level Read Only
7. Field-level Display
8. Field-level Do Not Display
9. Field-level Use Default Settings
*When a Section-level Display action takes precedence, field-level settings are
respected. See the example in Conflict Resolution - ACL. For example, if an action
sets a section to Do Not Display and another action sets a field within the section to
Read Only, the section is not displayed because the section-level Do Not Display
setting takes precedence.
32 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Field-Level Options
Fields are defined in an application or questionnaire and then used in an action.
Fields are added to sections on the layout and can be conditionally required or
hidden by an ACL action. A field-level option can be overridden by a section-level
option. See Section-Level Options. The following table describes the available
field-level options.
Option Description
Read Only Field is displayed as read only and is not available for editing.
User/Group Access
An ACL action must have at least one user, group, or field (User/Groups List or
Record Permissions field) specified to save the action. The specified user, group, or
field determines to which users the ACL action applies. If one or more of the
following conditions are true, the ACL action is applied for a user:
l The user is directly specified in the ACL action.
l The user is a member of a group specified in the ACL action (or is a member of
a descendant group if the Cascade option is specified).
l The user or a group of which the user is a member is specified in a User/Groups
List or Record Permissions field that is specified in the ACL action.
Chapter 3: Actions 33
RSA Archer GRC Platform Data Driven Events
ACL Action Example
ACL Action Setup The ACL action has a Record Permissions field selected with a
default value of User A.
Initial Record When the record is initially created, there is no value committed
Creation in the database for the Record Permissions field. The ACL action
does not apply to any users.
Post-Record Creation After the record is saved, User A is committed in the database for
the Record Permissions field. The ACL action is applied only to
User A.
34 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Example 1
Result The section is not displayed and the field is not required because
Action 1 (section-level Do Not Display) takes precedence.
Example 2
Result The section is read only because Action 2 (section-level Read Only)
takes precedence.
Example 3
Result The section is displayed, field X is set to required, and field Y is not
displayed.
Because Action 1 (section-level Display) takes precedence, the
section is displayed and field-level settings are respected.
Chapter 3: Actions 35
RSA Archer GRC Platform Data Driven Events
The Read Only option is not available for fields that are inherently read only, for
example, System fields.
The Required option is not available for fields that cannot be set to Required in an
application.
Text Box Objects, Custom Objects, and Trending Charts have the following
options: Use Default Settings, Display, and Do Not Display. Placeholder objects
cannot be modified by an ACL action and do not have any available options.
Important: Sections and fields that are hidden by an ACL action are still available
in search results and filters for defining reports unless otherwise controlled by field
permissions.
36 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Example
Important: If a field with a base setting of Required is not visible to the user, the
user cannot save the record. To solve this, you must either modify the application to
display the required field for the user or change the field settings so that it is no
longer required.
Procedure
1. Navigate to the Actions tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
Chapter 3: Actions 37
RSA Archer GRC Platform Data Driven Events
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
e. Click the Actions tab.
2. Click Add New and do one of the following:
l To use the settings of an existing action as a starting point for the new action,
select Copy an existing Action and select the existing action from the list.
l To select new settings for the action, select Create a new Action from
scratch.
3. Under Available Action Types, select Apply Conditional Layout.
4. If the application has multiple levels, in the Add New Action dialog box, select
the appropriate level for the action and click OK.
5. Complete the General Information section:
a. In the Name field, enter a name for the action.
b. In the Status field, select Active. To prevent anyone from using the action
until you are ready, select Inactive.
c. In the Description field, enter a brief description.
This description is helpful later when you need to choose an action from a
list to associate with a rule.
6. Complete the Layout Configuration section:
a. Specify the sections that you want to be displayed. Click in the appropriate
section and select an option from the list.
b. For each section that you display, specify which fields should be required,
be read only, or hidden. You can also reset the settings to the default. The
options available may vary for different types of fields. Click in the
appropriate section and select an option from the list.
7. In the Qualified Users/Groups section, select the users, groups, or fields that
you want to include or exclude from this conditional layout.
8. Click Save.
After the action is saved, you can link the action to the applicable rule. The
relationship between rules and actions are specified on the Rules tab. For more
information, see Link Actions to a Rule. If the action has been linked to a rule,
the associated rules are listed in the Associated Rules section.
38 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Example
Scenario Field A is a Values List field with the following available values:
Red, Orange, Yellow, Green, and Blue.
Action 1 is a Filter Values List Items action that filters the list to
Red and Blue.
Action 1 is linked to Rule 1.
Example 1
If multiple Filter Values List Items actions targeting the same Values List field are
linked to different rules that are true at the same time, only the Filter Values List
Items action linked to the rule with the highest rule order is applied.
Chapter 3: Actions 39
RSA Archer GRC Platform Data Driven Events
Example 2
Result When both Rule 1 and Rule 2 are true at the same time, Field D is
automatically filtered to values of Red and Blue making them the
only values available for selection.
If a Set Values List Selection action and a Filter Values List Items action targeting
the same Values List field are in conflict, only the Filter Values List Items action is
applied.
Example 3
Result When both Rule 1 and Rule 2 are true at the same time, Field E is
automatically filtered to values of Red and Blue making them the
only values available for selection.
The field is also automatically set to a value of Blue. (There is no
conflict between Action 1 and Action 2 for the value of Blue.)
Green is not selected because there is a conflict between Action 1
and Action 2, and therefore only the Filter Values List Items
action (Action 2) is applied.
40 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
A calculated field cannot be the target of a Filter Values List Items action. If a
Filter Values List Items action is defined and the target Values List field is later
changed to a calculated field, the Filter Values List Items action is deleted.
If a child value in a hierarchical Values List is selected in a Filter Values List
Items action and the parent value is not, the parent value is displayed after the
action is executed but is not available for selection.
If a Values Lists field is the target of a Filter Values List Items action and is
deleted, the Filter Values List Items action is also deleted.
If a Value Lists value is selected in a Filter Values List Items action and is deleted,
that value is removed from the Filter Values List Items action. If that value is the
only value selected in the action, the field is also deleted from the Filter Values List
Items action.
If a Values List has an existing selection that is not in the filtered subset of values
for the Filter Values List Items action, the existing selection is removed when the
Filter Values List Items action executes.
Example
Scenario Field B is a Values List field with the available values of Red,
Orange, Yellow, Green, and Blue.
Field B currently is set to Green.
Action 1 is a Filter Values List Items action that filters the list to
Red and Blue.
Action 1 is linked to Rule 1.
Result When Rule 1 is true, the current value (Green) of Field B is replaced
by the filtered values of Red and Blue making them the only values
available for selection.
The Cumulative Filters option on the Options tab allows Filter Values List Items
actions that target the same field in different rules to have a cumulative effect.
Chapter 3: Actions 41
RSA Archer GRC Platform Data Driven Events
Example
Result When all three rules are true at the same time, the following occurs
in this order:
1. When Rule 1 is true, the list is filtered to Red being available for
selection, and the current value of Orange is not selected.
2. When Rule 2 is also true, the list is filtered to Red and Orange
being available for selection, and the current value of Orange is
selected.
3. When Rule 3 is also true, the list is filtered to Red, Orange, and
Yellow, making these values available for selection.
As an end result, the values Red, Orange, and Yellow are available
values for selection and the current selection (Orange) remains
selected.
42 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Procedure
1. Navigate to the Actions tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Select the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
6. Click Save.
After the action is saved, you can link the action to the applicable rule. The
relationship between rules and actions are specified on the Rules tab. For more
information, see Link Actions to a Rule. If the action has been linked to a rule,
the associated rules are listed in the Associated Rules section.
Chapter 3: Actions 43
RSA Archer GRC Platform Data Driven Events
Because Generate Notification actions are executed after calculated fields are
computed, it is possible to have two actions (one being a Generate Notification
action) linked to the same rule where one action executes and the other one does
not.
44 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Example
Result User edits this record and changes the value of Field C to 4.
The Set Values List Selection action executes before Field A is
recalculated. Field A is 3 before being recalculated, and the rule
evaluates to false (3 does not equal 5), so Field B is not set to
Blue.
When the user clicks Save, the following occurs:
1. The record is processed.
2. Field A is calculated (4 + 1), and its value is set to 5.
3. The rule evaluates to true, and the Generate Notification
action executes. (Set Values List Selection actions are only
executed by user interaction, so the server does not set Field B
to Blue.)
Action 1 did not execute, but Action 2 did execute even though
both of these actions are linked to the same rule.
Note: There is no conflict resolution for Generate Notification actions. These action
types are executed when content is saved for rules that are true.
Chapter 3: Actions 45
RSA Archer GRC Platform Data Driven Events
Example 1
Result When Record A is saved and both Rule 1 and Rule 2 are true, two
notifications are sent (one for Action 1 and one for Action 2).
Example 2
Result When Record A is saved and Rule 1 is true, two notifications are
sent (one for Action 1 and one for Action 2).
Example 3
Result When Record A is saved and both Rule 1 and Rule 2 are true,
only one notification is sent because both rules are linked to the
same Generate Notification action (Action 1).
46 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Procedure
1. Navigate to the Actions tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Select the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
e. Click the Actions tab.
2. Click Add New and do one of the following:
l To use the settings of an existing action as a starting point for the new action,
select Copy an existing Action and select the existing action from the list.
l To select new settings for the action, select Create a new Action from
scratch.
3. Under Available Action Types, select Generate Notification.
4. If the application has multiple levels, in the Add New Action dialog box, select
the appropriate level for the action and click OK.
The Manage Action page is displayed. This page is made up of three tabs, the
General tab, the Content tab and the Delivery tab. The General tab is displayed.
Next Steps
Update the General Properties of a Generate Notification Action
Chapter 3: Actions 47
RSA Archer GRC Platform Data Driven Events
Procedure
1. Navigate to the Actions tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Select the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
e. Click the Actions tab.
2. Do one of the following:
l For a new Generate Notification action, go to the next step.
l For an existing Generate Notification action, in the Action Library section,
click the action that you want to modify.
The Manage Action page is displayed at the General tab.
3. Complete the General Information section:
a. In the Name field, enter a name for the action.
b. In the Status field, select Active. To prevent anyone from using this rule
before you are ready, select Inactive.
c. In the Description field, enter a brief description.
This description is helpful later when you need to choose an action from a
list to associate with a rule.
4. Click Apply.
Next Steps
Define the Layout of a Generate Notification Action
48 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Procedure
1. Navigate to the Actions tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Select the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
e. Click the Actions tab.
2. Do one of the following:
l For a new Generate Notification action, go to the next step.
l For an existing Generate Notification action, in the Action Library section,
click the action that you want to modify.
The Manage Action page is displayed at the General tab.
3. In the Template Design section, in the Letterhead field, select the letterhead
for the notification.
4. In the Body Layout field, click to open the Body Layouts dialog box.
5. Select the applicable layout and click OK.
The preview displayed in the Preview field is updated based on your selection.
6. Click Apply.
Next Steps
Select the Content for the Generate Notification Action
Chapter 3: Actions 49
RSA Archer GRC Platform Data Driven Events
Procedure
1. Navigate to the Actions tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Select the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
e. Click the Actions tab.
2. Do one of the following:
l For a new Generate Notification action, go to the next step.
l For an existing Generate Notification action, in the Action Library section,
click the action that you want to modify.
The Manage Action page is displayed at the General tab.
3. Click the Content tab.
4. In the Template Design section, in the Subject field, enter the text that you
want to display in the email subject line.
You can also include fields (but not reports or links) in the subject line as
dynamic information. To enter a field, place your cursor in the desired location,
click the Select a Field arrow and select the appropriate field from the list.
Note: You cannot include the following fields in the subject line: Attachment,
Cross-Application Status Tracking, Image, Record Permissions, Risk
Assessment, Sub-Form, Questionnaire Reference, Access History, and History
Log.
50 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
5. In the Body fields, enter the text that you want to display in the body of the
message.
You can use the options in the Rich Text Editor toolbar to modify the
appearance of the text. You can also include fields, reports, and links in the
body. To enter this type of dynamic information, place your cursor in the desired
location, select information from the Select a Field list, the Select a Report list,
or the Select a Link list and insert it into the body.
6. Click Apply.
Next Steps
Define the Email Properties of a Generate Notification Action
Procedure
1. Navigate to the Actions tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Select the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
e. Click the Actions tab.
The Actions tab enables you to manage the actions associated with the event.
2. Do one of the following:
l For a new Generate Notification action, go to the next step.
l For an existing Generate Notification action, click the action that you want to
modify in the Action Library section.
The Manage Action page is displayed at the General tab.
Chapter 3: Actions 51
RSA Archer GRC Platform Data Driven Events
Next Steps
Configure the Delivery Schedule of a Generate Notification Action
Procedure
1. Navigate to the Actions tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Select the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
e. Click the Actions tab.
2. In the Action Library section, click the action that you want to modify.
The Manage Action page is displayed.
52 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Field Action
Operator Select Equals, Does Not Equal, Less Than, or Greater Than.
Actions Click to remove the criteria for that row from the reminder.
7. Click Apply.
Next Steps
Select Recipients for the Generate Notification Action
Chapter 3: Actions 53
RSA Archer GRC Platform Data Driven Events
Procedure
1. Navigate to the Actions tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Select the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
e. Click the Actions tab.
2. Do one of the following:
l For a new Generate Notification action, go to the next step.
l For an existing Generate Notification action, in the Action Library section,
click the action that you want to modify.
The Manage Action page is displayed at the General tab.
3. Click the Delivery tab.
4. In the Recipients section, select the users to receive the notifications:
a. Under Available, use the Find box to find user names.
b. Click the name to copy it to the Selected area.
You can also select Groups or Fields to dynamically determine the
recipients.
c. Verify that the names, groups, or fields listed under Selected are your
intended recipients.
Recipients cannot unsubscribe from notifications generated by the Generate
Notification action.
5. Click Save.
54 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Important: When a data driven event includes a rule with a Set Date action and is
used in a questionnaire, the Review Date and Submit Date must be included in the
General section of the questionnaire. By default, these fields are included in this
section.
Option Description
Current Date Sets the Date field to the current date (and time to 12:00
A.M., if enabled).
Set to Number of Days Sets the Date field to the current date plus the specified
from Current Date number of days from the current date (and time to 12:00
A.M., if enabled).
Set to Specific Date Sets the Date field to the date specified (and time, if
enabled).
Set to Date Field to Removes any value currently set in the Date field.
Blank
Example
Result When both Rule 1 and Rule 2 are true at the same time, Field
B is automatically set to the Current Date.
Chapter 3: Actions 55
RSA Archer GRC Platform Data Driven Events
If a date field that is the target of a Set Date action is deleted, the Set Date action
is also deleted.
A rule cannot have multiple Set Date actions linked to it that target the same Date
field.
A Set Date action replaces any current value specified in the field.
Example
Procedure
1. Navigate to the Manage Applications page:
a. Click the Administration workspace.
b. On the Navigation Menu, select Application Builder > Manage
Applications.
2. Click the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to it.
56 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
12. From the Date Option list, select the date that you want to insert based on the
following options.
Option Action
Set to Number of Days In the Future Days field that displays, specify the
from Current Date appropriate number of days in this field.
Set to Specific Date In the Specific Date field that displays, specify the
appropriate date.
If the field is configured for date and time, additional
fields display. Specify the time, if applicable.
Set Date Field to Blank If that field is a required field, the system will prompt the
user to insert a date.
Chapter 3: Actions 57
RSA Archer GRC Platform Data Driven Events
13. In the Associated Rules section, verify that the appropriate rule or rules are
associated with this action.
The relationship between rules and actions are specified on the Rules tab. For
more information, see Link Actions to a Rule.
14. Click Save.
Example
Scenario Field A is a Values List field with available values of Yes, No,
and N/A.
Action 1 is a Set Values List Selection action that sets the value
to Yes.
Action 1 is linked to Rule 1.
Example 1
58 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
If multiple Set Values List Selection actions targeting the same Values List field
are linked to different rules that are true at the same time, only the Set Values List
Selection action linked to the rule with the highest ranking in the rule order is set.
Example 2
Result When both Rule 1 and Rule 2 are true at the same time, Field E is
automatically set to Value 1.
Note: Changing the Minimum Selections and Maximum Selections fields after a
rule is defined does affect the validity of the Set Values List Selection action.
These fields can be changed and then saved without appearing to be in conflict with
the action values specified. You must make certain that all action values match the
defined parameters of the rule.
If a values list field that is the target of a Set Values List Selection action is
deleted, the Set Values List Selection action is also deleted.
If a Value Lists value is selected in a Set Values List Selection action and is
deleted, that value is removed from the Set Values List Selection action. If that
value is the only value selected in the action, the field is also deleted from the Set
Values List Selection action.
Chapter 3: Actions 59
RSA Archer GRC Platform Data Driven Events
A Set Values List Selection action replaces any current value selected in a field.
Example
Procedure
1. Navigate to the Manage Applications page:
a. Click the Administration workspace.
b. On the Navigation Menu, select Application Builder > Manage
Applications.
2. Click the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to it.
60 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Note: You can only select a Values List field, and you cannot select a
Calculated Values List field.
12. Click in the Value(s) field to select the value or values that you want
displayed for selection.
13. In the Associated Rules section, verify that the appropriate rule or rules are
associated with this action.
The relationship between rules and actions are specified on the Rules tab. For
more information, see Link Actions to a Rule.
14. Click Save.
Chapter 3: Actions 61
RSA Archer GRC Platform Data Driven Events
Procedure
1. Navigate to the Events tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
d. Click the Events tab.
2. Click the rule that you want to update.
The Manage Rule page is displayed.
3. In the Linked Actions section, click next to the action that you want to
disassociate from the rule.
4. Click Apply.
Delete an Action
If you no longer need an action, you can delete it from the system. Deleting an
action removes it from the Action Library and disassociates it from any rules to
which it is linked.
To disassociate an action from a rule without deleting the action, see Remove an
Action from a Rule.
Procedure
1. Navigate to the Actions tab:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Select the application that you want to update.
Note: If you cannot select the application, you do not have Edit privileges to
it.
The Manage Application page is displayed for that application. This page
enables you to configure the properties for the selected application.
62 Chapter 3: Actions
RSA Archer GRC Platform Data Driven Events
Chapter 3: Actions 63
RSA Archer GRC Platform Data Driven Events
Chapter 4: Troubleshooting
Note: Set actions are Set Date and Set Values List Selection. The filter action is
Filter Values List Items. Off-layout refers to the fields that are available for
selection but are not included in a section layout.
l If set and filter actions are executed though updates or inserts performed by data
feed or data import:
o Include those fields previously set by the actions in the source data.
o If the affected fields do not require a user to modify them, change the fields
affected by the set actions to be calculated fields.
Chapter 4: Troubleshooting 65
RSA Archer GRC Platform Data Driven Events
a rule that always evaluates to true. If multiple fields are affected, create a
section, place the fields in that section, and set the section to be hidden in the
ACL action.
o If the affected fields do not require a user to modify them, change the fields
affected by the set actions to be calculated fields.
l If set and filter actions are executed on fields that are private to users modifying
the record:
o If the field permissions prevent users from making their own selections, make
the field public and create an ACL action that makes the field read-only or
hidden. Make certain the field is on the layout.
Note: ACL actions do not affect interactions with fields anywhere else
besides View/Edit. If a user did not previously have rights to a field and the
field is made public, the user can now see the field in search results even
though the field is hidden in the View/Edit mode by the ACL action.
o If the affected fields do not require a user to modify them, change the fields
affected by the set actions to be calculated fields.
Event Analyzer
The Event Analyzer provides a real-time view of rule evaluations and actions that
are applied as a result of user interaction with the content edit page. The analyzer is
only available for applications and questionnaires that have valid configured Data
Driven Events (DDEs).
The analyzer only captures browser-executed actions. It will not analyze Generate
Notification actions. The initial state of the content or server evaluation or
processing is not logged to the console window.
Administrators can use the Event Analyzer to validate the actions against the
conditions of DDE rules in real time. If a problem is detected, the administrator can
make the necessary modifications to the DDE and validate the rule again until the
expected results are achieved.
Any change a user makes to the content that triggers a rule to be evaluated is
logged to the analyzer console window.
The information logged to the analyzer console window includes:
l Any rule that was evaluated.
l The true or false result of each individual filter condition in the rule.
l Any corresponding actions that were applied as a result of the overall rule
evaluating to true.
66 Chapter 4: Troubleshooting
RSA Archer GRC Platform Data Driven Events
Procedure
1. Open the application that contains the data driven events that you want to
troubleshoot.
2. Display a record in Edit mode.
3. Press CTRL+ALT and click the mouse button.
The Event Analyzer dialog box opens.
4. Click Enable to start monitoring data driven event activity.
5. Interact with the record to execute any data driven events within the application.
The Event Analyzer dialog box shows the following information:
l Rules evaluated
l Conditions evaluated (true or false)
l Actions executed
6. Click Clear at any time to reset the information displayed in the dialog box.
7. When finished, click Disable in the Event Analyzer dialog box.
You can also close the record to automatically disable the monitoring process.
Chapter 4: Troubleshooting 67
RSA Archer GRC Platform 5.4
Data Feed Manager
June 2013
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm.
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and EMC are either registered trademarks or trademarks of EMC
Corporation ("EMC") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This
software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Data Feed Manager
Contents
Preface 9
About this Guide 9
Use Cases 9
Product Documentation 10
Support and Service 11
Chapter 1: About Data Feeds 13
Data Feed Manager Capabilities 13
Data Feed Service Architecture 13
Data Transport 14
Record Iteration 15
Field-Level Data Manipulation 15
Field Mapping 16
Scheduling 16
Data Persistence 17
Integration Options 17
Data Feed Manager Tabs 18
Integration Exchange 19
Chapter 2: Managing Archer-to-Archer Data Feeds 21
Archer-to-Archer Data Feed 21
Add a New Data Feed Record 22
Manage the General Properties of a Data Feed 22
Define the Archer Web Services Transporter 25
Filename Tokens 30
Determining the Navigation Method 31
Data Navigation Methods 32
Define an XML File 33
Defining Source Data 34
Define the Source Data 35
Schema Sources 38
Apply a Calculation 39
Functions and Operators for Calculated Field Formulas 40
Perform a Lookup Translation 42
Incorporate Static Text 44
Define Data Filters 45
Advanced Operator Logic 46
Define Data Tokens 48
Data Tokens 50
Defining Data Mapping Activities 50
Map Data 51
Field Population Options 53
Define Key Fields 53
Set Update and Archive Options 56
Define a Schedule for the Data Feed 59
3
RSA Archer GRC Platform Data Feed Manager
4
RSA Archer GRC Platform Data Feed Manager
5
RSA Archer GRC Platform Data Feed Manager
6
RSA Archer GRC Platform Data Feed Manager
7
RSA Archer GRC Platform Data Feed Manager
Preface
Use Cases
Examples of data that you can integrate using the Data Feed Manager include:
l Network and asset discovery data
l Vulnerability scan results
l Performance scorecards
l Incident reports
l Audit results and recommendations
The Data Feed Manager supports the definition of the following data feed types:
l Archer-to-Archer
l Database Query
l FTP
Preface 9
RSA Archer GRC Platform Data Feed Manager
l HTTP
l Mail Monitor
l RSS
l Threat
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
10 Preface
RSA Archer GRC Platform Data Feed Manager
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 11
RSA Archer GRC Platform Data Feed Manager
Capability Description
Data transport and mapping The Data Feed Manager enables you to define the path
to your external data source and map incoming data to
applications or questionnaires within the Platform.
You can modify these settings at any time.
Data filtering and manipulation To ensure that only relevant information is pulled into
your Platform environment, the Data Feed Manager
supports value-based filtering of inbound data. You
can also modify incoming data with user-specified
calculations to ensure that it maps correctly to
Platform applications or questionnaires.
Auto-scheduling Through the Data Feed Manager, you can define set
schedules for individual data feeds.
Data Transport
The Data Feed Service (DFS) architecture accommodates the definition of various
data retrieval mechanisms. The following table describes the out-of-the-box
transporters.
Transporter Description
Archer Web Services Accesses the Web Services API and retrieves data from an
instance of the Platform. This transporter is used in Archer-to
Archer data feeds.
DeepSight 2.0 Uses the v2 Symantec web service to retrieve malicious code
and vulnerabilities threat feed data.
DeepSight 4.0 Uses the v4 Symantec web service to retrieve security risk and
vulnerability SCAP data feeds.
File Based Retrieves delimited data files, including support for multi-file
manifests.
Transporter Description
Record Iteration
After data retrieval, the Data Feed Manager provides mechanisms to iterate
individual records. Iteration methods are associated with data transport types,
providing end users a list of relevant iterators:
Data transform capabilities are integrated into this mechanism for certain types, as
well as supporting processes such as XSLT translation of retrieved XML document
data.
Finally, a data filtering capability is integrated directly into the iteration process,
allowing for value-based filtering of inbound data items.
Option Description
Raw Field Data Instructs the Data Feed Manager to capture field data in a raw,
as-is state, to be populated into the mapped Platform field.
Option Description
Static Text Supports the definition of static insert values for identification
of source data, labeling, or other static identifier purposes.
List Instructs the Data Feed Manager to import the data as a values
list. No transformation or calculations are to be applied to the
data.
Field Mapping
You can map inbound data fields to Platform application fields using a drag-and-
drop interface. The user interface simplifies the mapping process and allows for
rapid visualization of data relationships.
Scheduling
Each defined data feed can be configured to run on a set schedule, facilitating
regular data update processes at appropriate intervals. The following table
describes the scheduling options.
Option Description
Daily Includes a schedule based on the number of days between each data feed
run.
Hourly Includes a schedule based on the number of hours between each data feed
run.
Minutely Includes a schedule based on the number of minutes between each data
feed run.
Weekly Includes a schedule based on the number of weeks between each data
feed run.
Monthly Includes a schedule based on the number of months between each data
feed run.
When this option is selected, the Execute On and Weekday Options are
displayed. To schedule a data feed on the first or last day of the month,
select 1st or Last in the Execute On field and Day in the Weekday field.
Note: When using the Run Data Feed Now option, a data feed can be run
immediately, overriding the set data feed execution schedule.
Data Persistence
The Data Feed Manager supports persistence of data as Platform application data
or group/role information. The Save process incorporates error reporting functions,
allowing the system to aggregate data import failure information for problem
resolution and tracking purposes.
You can review the status history and results of your data feeds using the Data
Feed Execution History page.
Integration Options
The Data Feed Manager is one of several tools that RSA Archer offers to allow
seamless integration of enterprise data systems with the Platform. Another
commonly used tool is the Web Services API, which allows programmatic access
to features within the Platform, such as searching, user management, and data
import and export.
To help you decide whether the Data Feed Manager or the Web Services API is the
appropriate integration tool for your needs, the following table highlights the
characteristics of each tool.
Tab Description
Transport Defines the path to the external source. The Data Feed Manager
can connect to a variety of sources:
l Flat files
l XML files
l Databases
l Mail servers
l RSS feeds
l Threat feeds
l Other Platform applications and questionnaires
Navigation Identifies the structure of the data file and uploads any
transformation files (XSLT), if necessary. The Platform XML
translator is built in. This tab also contains processing
instructions, such as ignore first row or rows of data.
Tab Description
Source Definition Identifies the elements from the source data that will be extracted
by the Data Feed Manager. The source data can be imported "as
is" or can be modified prior to being imported. This tab also
defines filters that review the source data and limits what
information is returned.
Data Map Defines the Platform field where the external data is placed, and
provides instructions for handling the data. This tab also
specifies the unique identifiers (key fields) and contains
configuration instructions for:
l Creating records
l Updating records
l Archiving records
l Deleting records
Schedule Defines the frequency for how often the data feed will run along
with specifying the start time for the data feeds. Data feeds can
execute after the completion of another data feed, which is also
known as a convoy. This tab also provides the capability to
immediately run a data feed.
Integration Exchange
Before you begin a new integration project with the Data Feed Manager, visit the
RSA Archer Exchange on the EMC Community Network. In Exchange Integrations
category, you can review prebuilt integration packages from RSA Archer and third-
party providers such as Qualys, nCircle, and Sendmail.
New integration packages are available regularly, and each package includes the
following items:
l Data feed configuration file
l Target application(s)
l Any supporting files (such as an .xslt file)
When you download an integration package from the RSA Archer Exchange, you
can import the configuration file directly into the Data Feed Manager and, if
necessary, modify the configuration. You can also import the target applications
into the Platform environment and modify the applications through Application
Builder.
Important: If you do not know the Microsoft IIS configuration, contact your system
administrator before continuing.
When working with Archer-to-Archer data feeds, you can perform the following
tasks:
1. Add a New Data Feed Record
2. Manage the General Properties of a Data Feed
3. Define the Archer Web Services Transporter
4. Determine the Navigation Method
Procedure
1. Navigate to the Manage Data Feeds page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
2. In the Manage Data Feed page toolbar, click Add New.
3. Do one of the following:
l To configure new settings for a data feed, select Create a new Data Feed
from scratch.
l To use the settings of an existing data feed as a starting point, select Copy
an existing Data Feed and select the existing data feed from the Existing
Data Feeds list.
4. Click OK.
5. In the Name field, enter the name for the data feed.
The data feed name must be unique.
6. Click Save.
Next Steps
Manage the General Properties of a Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Perform one of the following tasks: Add a New Data Feed or Import a Data Feed.
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. In the Name field, enter the name for the data feed.
The data feed name must be unique.
3. From the Status list, select Active to run the data feed.
4. In the Description field, enter a description for the data feed.
5. In the Feed Type field, select the type of feed that you are configuring.
Option Description
Transport Only Locates a specific data file. This file contains additional
instructions for launching subsequent, standard data feeds.
With this data feed type, the data feed only completes the
Transport and Navigation activities. The Source Definition and
Field Mapping activities are not allowed. Processing of the
data feed does not attempt to process the data.
Important: If the data feed is intended to be used as part of a convoy, or you are
troubleshooting the data being pulled, select the Transport Only option. This option
enables you to use a transform to manipulate the data being returned by bringing the
source data in as a flat file and then configure a subsequent XML-based feed that
includes an XSLT file. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input” in
the RSA Archer Web Services API Reference Guide that can be downloaded from
the RSA Archer Community.
l Create a new user account by selecting Other and entering the name of
the new user account. When you save your data feed settings, the Data
Feed Manager automatically creates the new user account.
Note: This user account must have permissions for creating records and
updating History Logs fields. To avoid potential conflicts with other data
feeds, RSA Archer recommends that you use a different user account for
each data feed. Additionally, if you are going to simultaneously run multiple
data feeds, create a unique name to prevent termination of session tokens.
c. From the Locale list, select the country (language) format of your source
data. Different cultures or countries use different characters when
formatting similar data.
d. In Send Notifications, select whether to have the data feed trigger
notification emails when records are published or updated. If notifications
are not enabled in the selected target application, no notification emails are
sent when the data feed is run.
e. In Data Validation, select whether to have the system not perform data
validations against the selected target application when saving a record.
When this option is selected, validation that is based on field definition and
configuration is bypassed (with some exceptions). This option applies
regardless of whether targeting a questionnaire or application.
The system validates the following items regardless of whether the Data
Validation field is selected:
l Attachment or image field. Validity of the file.
l DateTime field. Minimum and maximum system values.
l Text field. Contains valid HTML.
l Field name. Uniqueness.
Note: The required field settings are disregarded if you select to ignore the
rules defined within the target application, however, the unique selection
cannot be ignored.
f. Click Apply.
Note: To avoid potential conflicts with other data feeds, RSA Archer
recommends that you use a different user account for each data feed.
Additionally, if you are going to simultaneously run multiple data feeds,
create a unique name to prevent termination of session tokens.
b. In the Target Path field, enter the path for the separate data file.
c. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you configure
your data feed, the Data Feed Manager validates the information for you. If it is not
valid, an error message is displayed. You can save the data feed and correct the
errors later; however, the data feed does not process until the errors are corrected
and the data feed validates.
Next Steps
To define the appropriate data transporter, select one the following:
l Archer Web Services Transporter
l Database Query Transporter
l File Transporter
l FTP Transporter
l HTTP Transporter
l Mail Monitor Transporter
l RSS Transporter
l Threat Transporter
Important: If you do not know the Microsoft IIS configurations, contact your system
administrator before continuing.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Transport tab.
3. From the Transport Method list, select Archer Web Services Transporter.
Important: If you do not know the Microsoft IIS configurations, contact your
Option Description
URL Enter the URL to the Web Services API for the Platform instance.
5. In the Transport Configuration section, select the Search Type for the data
feed from the following options.
Option Description
Note: Best practices include using a separate, dedicated user account for each
data feed. Assign maximum rights to run the report and view the data. A user
account for the Archer-to-Archer data feed absorbs a user license. Set the
records per file on report ID to 250.
6. Provide the parameters for the data feed according to the selected search type.
Note: If you use the report GUID, do b. If the Use Windows Authentication
not include the braces. Reports must option is not selected, enter the
be configured with a Column-Flat credentials of the account that will
display type. be running the report in User
Name and Password.
b. To run the report with Windows
credentials, select the Use Windows Note: Use the account that has
Authentication option. Single Sign- access role rights to the search.asmx
On (SSO) must be configured to use page. The account should also be
this option. an application owner with full
access permissions to the content of
c. If the Use Windows Authentication the applications. Do not use the
option is not selected, enter the same account that you used to log
credentials of the account that will be on.
running the report in User Name and
Password. c. (Optional) In the Domain field,
enter the name of the domain to be
Note: Use the account that has access searched against.
role rights to the search.asmx page.
The account should also be an d. In the Instance field, enter the
application owner with full access name of the instance to be searched
permissions to the content of the against.
applications. Do not use the same Use the instance name and not the
account that you used to log on. PIN.
e. From the Records Per File list, set
d. (Optional) In the Domain field, enter
how many records should be
the name of the domain to be searched
included in each file.
against.
The default value is 100.
e. In the Instance field, enter the name of
the instance to be searched against. f. In the Application GUID field,
Use the instance name and not the enter the module ID.
PIN. g. In the Configuration String field,
enter the XML search string.
f. In the Records Per File list, set how
many records should be included in
each file.
The default value is 100.
7. If a proxy needs to be used to access the remote site, in the Proxy section,
select whether the data feed must pass through a proxy to access the source
data. Select from the following options.
Option Description
No Proxy Indicates that the data feed does not pass through a proxy.
Use System Proxy Indicates that the Data Feed Service runs the feed with the
proxy configuration that is set up in the Control Panel.
Configure Proxy Indicates that the data feed must pass through a proxy.
Continue with providing the parameters for accessing the
proxy.
Option Description
Nothing Does not alter the source file when the data feed successfully completes
and deletes the local copy.
Rename Saves the source file under a new name when the data feed successfully
completes. In Destination File, specify where the file should be saved
and the new name for the file. For information on using filename tokens
when renaming files, see Filename Tokens.
Note: To save the data, the path of the destination file must be
accessible to the account running the Job Engine service.
Next Steps
l For a standard data feed, determine the navigation method.
l For transport-only data feed, define a schedule for the data feed.
Filename Tokens
Filename tokens are available for post processing when you want to save the source
information and specify a location or name for the file. When you select the
Rename option, you can use tokens to automatically generate unique names for the
files.
The following table describes the usable tokens for renaming data files.
Token Description
DataFileDirectoryName Enables the Data Feed Manager to update the filename with
the directory name, including the drive, of your file.
DataFileExtension Enables the Data Feed Manager to insert the file extension,
such as .csv, in the new filename.
DataFileFullName Enables the Data Feed Manager to insert the fully qualified
filename. This data includes the drive, directory, filename,
and extension of the original file.
For example, if the data file came from the following location,
C:\DataFeed\Source\ESL\processed\ThreatData.csv, filenames that have been
renamed using tokens would have the following output.
Example 1
Output C:\DataFeed\Source\ESL\processed\success\ThreatData_
01.31.2008.csv
Example 2
Output \\DFSRepository\2008\01\ThreatData_success.csv
Option Description
Xml File Iterator Use this option when importing an .XML file. When this
option is selected, the Xml File Definition section becomes
available. For more information on XML formatting
guidelines and samples, see the appendix “XML
Formatting Used in Field Results and Input” in the RSA
Archer Web Services API Reference Guide that can be
downloaded from the RSA Archer Community.
Delimited Text File Use this option to ensure that the Data Feed Manager
Iterator properly analyzes the data in your delimited file. When
this option is selected, the File Definition section becomes
available.
Database Query Iterator Use this option when importing data from a database.
Available and default navigation methods are based on the selected transport
method.
Note: The Navigation tab is available only for Standard data feed types.
FTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
HTTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Note: You must load a transform. A default transform is included with the
installation; however, you can develop your own XSLT if you require additional
data transformation. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input”
in the RSA Archer Web Services API Reference Guide that can be downloaded
from the RSA Archer Community.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Source Data
Note: The Source Data tab is available only for Standard data feed types.
You can select to import the data “as is” into the Platform or execute modifications
and calculations against the data to convert the incoming data into a format that
matches the requirements of the application or questionnaire it is imported into. You
can also use several advanced options, such as lookup translations and calculations,
so you can prepare and modify the data to meet your individual business needs.
Additionally, you can filter data so that only what you want to receive is imported
into the target application or questionnaire. By not defining filters on the Data Filter
tab, you instruct the Data Feed Manager to return all records in the data feed. Or,
using operator logic, you can add filters to include only records meeting certain
criteria in the data feed process.
Finally you can capture tokens of data from the last execution of a data feed that
can be used during the next run to identify which data to retrieve. On the Tokens
tab, you can add, edit, or delete token values in preparation of the next data feed
execution.
On the Source Definition tab, you can complete the following tasks:
l Define the Source Data
l Apply a Calculation
l Perform a Lookup Translation
l Incorporate Static Text
l Define Data Filters
l Define Data Tokens
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
l Ensure that the user account used has access to the content, or you will receive a
schema error when building the source definition. You can also receive a
schema error for the following reasons:
o If your connection string is not correct on the Transport tab.
o The account is unable to login.
o The report is not in the correct format.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. To supply the list of source fields, choose one of the following methods and
complete the tasks.
a. Click Load Fields located in the a. In the Source Name column, enter
Source Field title bar. the name of the first field that you
want to define for your data feed.
b. Depending on the selected transport
method, select how to retrieve the The first line is the record definition.
source schema. b. To continue adding source fields, do
any of the following:
l To add a source field, click Add
New and name the field.
l To add a source field in a
4. In the first line in the Source Fields section, from the Field Type list, select the
appropriate field option for the record definition.
Option Description
None Instructs the Data Feed Manager that the field is the record
definition and nothing is to be done with the data.
List Instructs the Data Feed Manager to import the data as a value
list. No transformation or calculations are to be applied to the
data.
5. For the remaining source fields, from the Field Type list, select one of the
following field options and complete the associated steps for that field option.
Option Description
Raw Field Data Instructs the Data Feed Manager to accept the data from the
data source "as is." No transformation or calculations are to
be applied to the data.
Static Text Allows you to add an additional field to the data feed, which
adds context to the data. Upon selection of this option, the
Status field for that source field is set to Not Configured and
is displayed for that source field.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Schema Sources
The source for the schema of your data feed depends on which transporter you are
using. The following table identifies and describes the schema sources that are
available for each of the out-of-the-box transporters.
Execute Search Executes the search in the Archer Web Services Transporter
Platform and detects the source
schema from the results.
Sample File Uses a skeleton of your actual Archer Web Services Transporter
source data file. For example, if
Database Query Transporter
you are importing data from a
.csv file, the source data file is a DeepSight Transporter 2.0
.csv file that includes the column DeepSight Transporter 4.0
names from your source data. If
you are importing data from an File Transporter
.XML file, the source data file FTP Transporter
includes the structure of your
HTTP Transporter
.XML without the actual field
values. iDefense Transporter
When you select the sample file, Mail Monitor Transporter
the Source Fields section RSS Transporter
populates with the fields
specified in the sample data file.
Load URL Loads the contents at the target DeepSight Transporter 2.0
URL and detects the source
DeepSight Transporter 4.0
schema from the contents.
HTTP Transporter
CAUTION: Using this option may
iDefense Transporter
trigger actions associated with
accessing the target URL. RSS Transporter
Standard Schema Uses the standard mail schema. Mail Monitor Transporter
Apply a Calculation
Complete this task to apply calculations to source fields to dynamically generate
new values, which can be populated in an application or questionnaire.
The following are examples of common calculations:
l CONCATENATE([TOLastName], ", ", [TOFirstName])
This calculation combines the values of two fields into a single value. For
example, it would take the value “Doe” from the Last Name field and the value
“John” from the First Name field and merge them into the value “Doe, John.”
Calculations for the Data Feed Manager use the same calculation engine and syntax
as the Application Builder feature.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field to which you want to apply a
calculation, select Calculated Field.
4. In the Actions column of that source field, click .
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Operators
The Formula Builder also offers a library of operators divided into categories. By
clicking a category, you can see the operators that it contains along with a
description of each operator.
Arithmetic:
Operator Description
+ Addition (3 + 3)
- Subtraction (5 - 2)
Negation (-4)
* Multiplication (2 * 3)
/ Division (3 / 2)
^ Exponentiation (3 ^ 2)
Comparison:
Operator Description
= Equal to (3 = 3)
Text Concatenation:
Operator Description
In this formula, the Sample Field is not populated with the value "0" if the field is
empty or null. Instead, this formula returns FALSE when the Sample Field is empty
or null.
Destination
Source Data Translation Application
Application
Field Name: State Field Name: State Field Name: State Field Name: State
ID1 ID2
California California CA CA
Texas Texas TX TX
Florida Florida FL FL
Using an application as an intermediary ensures that the data feed converts all of
the external data into the proper format prior to importing it to the destination
application.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field that you want to translate, select
Lookup Translation.
4. In the Actions column of that source field, click .
The Translation Editor dialog box opens.
5. From the Source list, select the source field.
6. From the Application list, select the application that translates the values.
7. From the Exceptions list, select from the following options the function that the
Data Feed Manager should execute when a value generates an exception.
Option Description
Log Warning Writes an error to the log file, and the value is not imported.
No updates are made to the translation application.
Insert Raw Data Inserts the raw value from your source file in the target
application if a match is not found.
Original Value Identifies the field in the translation application that maps to
the value from your external data file.
Translation Value Identifies the field in the translation application that maps to
the proper value in the target application or questionnaire.
Note: The selections from the Original Value and Translation Value lists must
be different, or a warning message is displayed.
8. Click OK.
The translation settings are saved. The Status field for that source field changes
to Configured.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field where you want to insert static text,
select Static Text.
4. In the Actions column of that source field, click .
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Note: The Data Filter tab is available only for Standard data feed types.
You can combine your data filters through advanced operator logic to provide
additional filters to your data.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Tokens
Important: Custom operator logic must validate before you can save or apply
changes to your data filter. If your custom operator logic does not validate, you are
prompted with an "Invalid Operator Logic" error message.
Examples
Single operator. Suppose you are importing assets from an external source into the
Assets application. You want to import assets from your external file only if they
are labeled as being in a production environment or if they are customer impacting.
To set up this process, you define data filters to evaluate both the System
Environment and Security Class elements in your external data file for the desired
values. Without using operator logic, your conditions are related with the AND
operator, and the data feed imports items that are both in a production environment
AND have a high security class. By using operator logic with the OR operator, you
achieve the desired result: Assets that are in a production environment OR have a
high security class are imported into the Assets application.
Based on the above criteria, the following table details the result of the operator
logic.
(1) System
(2) Security Class (3) Manufacturer Result
Environment
The system evaluates the parenthetical expression first. In the last example in the
previous table, since neither 1 or 2 evaluate to "TRUE," the entire condition fails
even if 3 evaluates to "TRUE".
Multiple operators with nested parenthetical expressions. You also can use
nested parenthetical expressions in your operator logic. Nested parenthetical
expressions allow you to combine the results of two separate logical conditions,
thereby creating an additional logical condition, as shown in the following example.
Based on the above criteria, the following table details the result of the operator
logic.
(1)
(3)
System (2) Security (4) Operating (5) Server
Manufactu Result
Environm Class System Room
rer
ent
The Data Feed Manager evaluates the nested parenthetical expressions first. In the
last example in the previous table, since neither 3 or 4 evaluate to "TRUE" in the
nested parenthetical expression, the primary parenthetical expression evaluates to
"FALSE," and thus the entire logical condition fails and the data is not imported,
even though all of the other conditions are met.
Tokens only store a single value for a source field that has been configured on the
Source Data tab. The list of tokens is based on these fields, as well as the
LastRunTime and LastFileName attributes of a previous data feed execution. If a
source field is not selected as a token, token data for that field is not stored.
Note: The Tokens tab is available only for Standard data feed types.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab, and then click the Tokens tab.
3. (Optional) To add an additional token, click Add New located in the Tokens
title bar and enter the field name.
4. In the Value field of the token that you want to modify, enter the updated value.
When modified, the updated value is used on the next data feed execution, and
the execution updates the value at its completion.
5. (Optional) To delete a token, click in the row of the token that you want to
remove.
6. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Map Data
Data Tokens
The Data Feed Manager allows capturing "tokens" of data from the last execution
of a data feed. A token can be any field of data from the last source row processed.
The following table identifies the fields for which tokens are available.
Field Input
To direct the Data Feed Manager to the correct destination for the data it will
import, use the options on the Data Map tab to configure the field mappings for your
data feed.
Note: The Data Map tab is available for Standard data feed types.
On the Data Map tab, you can complete the following tasks:
l Map Data
l Define Key Fields
l Set Update and Archive Options
Map Data
Complete this task to map the configured elements from the Source Definition tab to
fields in a Platform target application or questionnaire. The Data Feed Manager
updates the target field with the value from the mapped source field during the data
feed execution.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Field Map tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Field Map tab.
The Source Fields section lists the Source Field names listed on the Source
Data tab.
3. Complete one of the following tasks:
l To have the system analyze the source fields and automatically map them to
application or questionnaire fields, click Auto-Populate.
This option maps fields from the data source to application or questionnaire
fields that have the same name. Auto populate occurs on level 1 fields only.
Additionally, if there is an exact name match between the source field and
the target field, and the field type is one of the following, the field is not auto
populated: External links, Values list, Sub-form, Related records, Cross
reference, or CAST.
l From the Source Fields column, drag your source field and drop it next to the
application or questionnaire field in the Target Fields section.
The mapped field from the data source populates the designated target field.
Note: For target fields that have a field type of cross-reference, sub-form, or
related records, map the fields expanded under these field types. You cannot
directly map to a target field with any of these field types.
4. (Optional) In the Actions column of each mapped field for which you want to
configure additional options, click .
The Field Population dialog box opens with options based on the selected field
type.
5. (Optional) To assign a trust level to your source data for a field that is mapped,
in the Trust Level field, enter a value from "0" to "99."
Note: The Trust Level option is useful when you have multiple data feeds
populating the same target application. By assigning trust levels, the Data Feed
Manager can determine when and when not to overwrite existing data.
The Trust Level option allows you to develop a hierarchy for updates to your
target data by entering the desired trust level for the field. The value 0 is
considered the greatest trust level. The trust level accepts values up to 99,
which is the lowest level of trust.
For example, consider a situation where two data feeds map to the same target
application field. Data Feed A runs first and populates the Case Status field
with the value Open. When Data Feed B runs, the Data Feed Manager
recognizes that Data Feed B has data that maps to the same field. Data Feed
Manager evaluates the trust levels to determine which data is the most trusted.
Since the field from Data Feed B has the greater trust level, its value of Closed
overwrites the data from Data Feed A.
6. Complete any of the following optional tasks:
l To delete a mapping for a single field, click in the Actions column of the
field that you want to remove.
l To remove the mappings for all fields, click Clear Target Field Mappings
located in the Target Fields title bar.
7. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Key Fields
Option Description
Add Unknown Specifies that values from your data source that do
not appear in your target's list-based fields are to be
added. This option is available only for external link
and values list field types.
Append data to list-based field Specifies that additional values are to be added to
the target application record's existing values in list-
based field types.
Replace data in list-based field Specifies that the values in a list-based field type of
a target application or questionnaire record are
replaced with the values from the mapped data
source list.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Key Field Definitions tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Key Field Definitions tab.
The Reference Field section contains the target application or questionnaire and
any mapped cross-reference, related records, CAST, or sub-form fields that
require a key field definition to be created. You can use the Key Field
Definitions section to define the unique key identifiers and the data feed actions
during the feed execution.
3. In the Reference Field section, select the field that requires a key field
definition.
4. In the Key Field Definitions title bar, click Add New Key.
5. In the Field Name field, select a target application or questionnaire field that
uniquely identifies the record.
6. To assign compound unique identifiers for the record, complete the following:
a. In the Actions column, click .
The Select Key Field dialog box opens.
b. From the Available Fields list, select the fields.
c. Click OK.
A new row for each selected field is added, and the order number for the new
rows is assigned the same number.
7. To add unique identifiers in a hierarchical structure for sub-form field types,
click in the Actions column.
A new child row is added to the Key Field Definitions section.
Note: After setting the order of key fields, the Data Feed Manager scans the
data source for matches to the first unique identifier. If no matches are found, it
searches for matches to the second unique identifier, and so on. Once the Data
Feed Manager scans through all of the unique identifiers and does not find a
match, the system creates a new target record.
8. From the Action list, select one of the following matching criteria for the unique
identifier.
Option Description
MatchExact Specifies that the value in the data source field must match the
unique identifier value exactly for the target record to be
updated. If the match is not exact, a new record is created.
For example, if a data source field has a value of "Renee Jones"
and a mapped application field that is specified as a unique
identifier has a value of "Renee Ellen Jones," the system does
not update the target application record because it is not an
exact match.
MatchAny Specifies that the data in the data source must match at least
one condition in the list-based field for the target record to be
updated.
For example, if a target application record has the values Blue
and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes
only the value Blue, the record is updated because at least one
of the values matches.
MatchAll Specifies that the data in the source file must match all of the
conditions in the list-based field for the target record to be
updated.
For example, if the target application record has the values
Blue and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes the
values Blue and Green, the record is updated. However, if the
source data includes only the value Blue, the record is not
updated. A new target application record is created instead
because there is not a complete match.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Set Update and Archive Options
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Update/Archive tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Update/Archive tab.
3. In the Update Options section, select any of the following options.
Option Description
Create Instructs the data feed to create new records for data found in
the source file and not in the target application or
questionnaire.
Option Description
Set Value Instructs the data feed to set a value in a Values List field in a
record whenever the external data file does not contain a
matching record.
You can use this option to have the data feed set a Values List
to a value that identifies this record as Inactive or Not Current.
For example, if you have a Devices application with a record
for a specific laptop, and the external data file does not have a
matching record for that laptop, you can use this option to set
a Values List field in the laptop record to the value Inactive.
When you select this option, you also select the Values List
field in the target application or questionnaire and the value
you want to set in that field.
You cannot set the value in the Values List field of the target
leveled application under the following conditions:
l The Set Value Target Field is a global values list.
l Level 3 or lower in a leveled application.
l You are modifying the data feed configuration.
Note: When running a data feed that updates a values list, you
can view the time that the data feed updated the record in the
Execution History log. The last updated time is not displayed
under Last Updated on the Manage Data Feeds page.
In most scenarios, RSA Archer recommends selecting the Set Value option and
flagging these records with a specific value rather than deleting them. For
example, you can add a field to your application called Status and include the
values Current and Archived. If a data feed cannot find a matching record in the
data source with a system record, the system record could be updated to have a
value of Archived for the Status field.
5. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define a Schedule for the Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Schedule tab is available for both Standard and Transport-Only data feed
types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
Note: To configure your data feed to execute after an existing data feed runs,
select Reference. For example, you can select to have a Threats data feed run
immediately after your Assets data feed is completed. From the Reference Feed
list, select after which existing data feed your feed should execute.
4. (Optional) To override the set data feed execution schedule and immediately
execute your data feed, click Start in the Run Data Feed Now section.
5. Click Save.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Procedure
1. Navigate to the Manage Data Feeds page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
2. In the Manage Data Feed page toolbar, click Add New.
3. Do one of the following:
l To configure new settings for a data feed, select Create a new Data Feed
from scratch.
l To use the settings of an existing data feed as a starting point, select Copy
an existing Data Feed and select the existing data feed from the Existing
Data Feeds list.
4. Click OK.
5. In the Name field, enter the name for the data feed.
The data feed name must be unique.
6. Click Save.
Next Steps
Manage the General Properties of a Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
2. In the Name field, enter the name for the data feed.
The data feed name must be unique.
3. From the Status list, select Active to run the data feed.
4. In the Description field, enter a description for the data feed.
5. In the Feed Type field, select the type of feed that you are configuring.
Option Description
Transport Only Locates a specific data file. This file contains additional
instructions for launching subsequent, standard data feeds.
With this data feed type, the data feed only completes the
Transport and Navigation activities. The Source Definition and
Field Mapping activities are not allowed. Processing of the
data feed does not attempt to process the data.
Important: For the data feed to execute successfully, the server responsible for
running the data feed must have the required network access to the database.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Transport tab.
3. From the Transport Method list, select Database Query Transporter.
4. In the Database Configuration section, select the data provider based on the
type of connection string used.
Note: If Oracle dotConnect is the data provider, you do not need to install the
drivers for Oracle because these drivers are included in the Platform
installation. To determine the connection string for this data provider, go to the
following URL:
http://www.devart.com/dotconnect/oracle/docs/Devart.Data.Oracle~
Devart.Data.Oracle.OracleConnection~ConnectionString.html.
6. In the Connection String field, enter the connection string that allows the data
feed to locate and access the database and retrieve the specified source data.
7. In the User Name and Password fields, enter the credentials for an account
that has access to query the database if one was not inserted as part of the
connection string in the previous step.
8. In the Query field, enter the query that you want to execute against the
database.
You can also execute a stored procedure by entering it in the Query field. This
field cannot be longer than 4,000 characters.
The following figure shows a stored procedure that you can execute.
Option Description
Nothing Does not alter the source file when the data feed successfully
completes and deletes the local copy.
Rename Saves the source file under a new name when the data feed
successfully completes. In Destination File, specify where the
file should be saved and the new name for the file
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
l For a standard data feed, determine the navigation method.
l For transport-only data feed, define a schedule for the data feed.
Filename Tokens
Filename tokens are available for post processing when you want to save the source
information and specify a location or name for the file. When you select the
Rename option, you can use tokens to automatically generate unique names for the
files.
The following table describes the usable tokens for renaming data files.
Token Description
DataFileDirectoryName Enables the Data Feed Manager to update the filename with
the directory name, including the drive, of your file.
DataFileExtension Enables the Data Feed Manager to insert the file extension,
such as .csv, in the new filename.
DataFileFullName Enables the Data Feed Manager to insert the fully qualified
filename. This data includes the drive, directory, filename,
and extension of the original file.
For example, if the data file came from the following location,
C:\DataFeed\Source\ESL\processed\ThreatData.csv, filenames that have been
renamed using tokens would have the following output.
Example 1
Output C:\DataFeed\Source\ESL\processed\success\ThreatData_
01.31.2008.csv
Example 2
Output \\DFSRepository\2008\01\ThreatData_success.csv
Option Description
Xml File Iterator Use this option when importing an .XML file. When this
option is selected, the Xml File Definition section becomes
available. For more information on XML formatting
guidelines and samples, see the appendix “XML
Formatting Used in Field Results and Input” in the RSA
Archer Web Services API Reference Guide that can be
downloaded from the RSA Archer Community.
Delimited Text File Use this option to ensure that the Data Feed Manager
Iterator properly analyzes the data in your delimited file. When
this option is selected, the File Definition section becomes
available.
Database Query Iterator Use this option when importing data from a database.
Available and default navigation methods are based on the selected transport
method.
Note: The Navigation tab is available only for Standard data feed types.
FTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
HTTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
Note: The Source Data tab is available only for Standard data feed types.
You can select to import the data “as is” into the Platform or execute modifications
and calculations against the data to convert the incoming data into a format that
matches the requirements of the application or questionnaire it is imported into. You
can also use several advanced options, such as lookup translations and calculations,
so you can prepare and modify the data to meet your individual business needs.
Additionally, you can filter data so that only what you want to receive is imported
into the target application or questionnaire. By not defining filters on the Data Filter
tab, you instruct the Data Feed Manager to return all records in the data feed. Or,
using operator logic, you can add filters to include only records meeting certain
criteria in the data feed process.
Finally you can capture tokens of data from the last execution of a data feed that
can be used during the next run to identify which data to retrieve. On the Tokens
tab, you can add, edit, or delete token values in preparation of the next data feed
execution.
On the Source Definition tab, you can complete the following tasks:
l Define the Source Data
l Apply a Calculation
l Perform a Lookup Translation
l Incorporate Static Text
l Define Data Filters
l Define Data Tokens
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. To supply the list of source fields, choose one of the following methods and
complete the tasks.
a. Click Load Fields located in the a. In the Source Name column, enter
Source Field title bar. the name of the first field that you
want to define for your data feed.
b. Depending on the selected transport
method, select how to retrieve the The first line is the record definition.
source schema. b. To continue adding source fields, do
any of the following:
l To add a source field, click Add
New and name the field.
l To add a source field in a
4. In the first line in the Source Fields section, from the Field Type list, select the
appropriate field option for the record definition.
Option Description
None Instructs the Data Feed Manager that the field is the record
definition and nothing is to be done with the data.
List Instructs the Data Feed Manager to import the data as a value
list. No transformation or calculations are to be applied to the
data.
5. For the remaining source fields, from the Field Type list, select one of the
following field options and complete the associated steps for that field option.
Option Description
Raw Field Data Instructs the Data Feed Manager to accept the data from the
data source "as is." No transformation or calculations are to
be applied to the data.
Static Text Allows you to add an additional field to the data feed, which
adds context to the data. Upon selection of this option, the
Status field for that source field is set to Not Configured and
is displayed for that source field.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Apply a Calculation
Complete this task to apply calculations to source fields to dynamically generate
new values, which can be populated in an application or questionnaire.
The following are examples of common calculations:
l CONCATENATE([TOLastName], ", ", [TOFirstName])
This calculation combines the values of two fields into a single value. For
example, it would take the value “Doe” from the Last Name field and the value
“John” from the First Name field and merge them into the value “Doe, John.”
Calculations for the Data Feed Manager use the same calculation engine and syntax
as the Application Builder feature.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field to which you want to apply a
calculation, select Calculated Field.
4. In the Actions column of that source field, click .
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Destination
Source Data Translation Application
Application
Field Name: State Field Name: State Field Name: State Field Name: State
ID1 ID2
California California CA CA
Texas Texas TX TX
Florida Florida FL FL
Using an application as an intermediary ensures that the data feed converts all of
the external data into the proper format prior to importing it to the destination
application.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field that you want to translate, select
Lookup Translation.
4. In the Actions column of that source field, click .
The Translation Editor dialog box opens.
5. From the Source list, select the source field.
6. From the Application list, select the application that translates the values.
7. From the Exceptions list, select from the following options the function that the
Data Feed Manager should execute when a value generates an exception.
Option Description
Log Warning Writes an error to the log file, and the value is not imported.
No updates are made to the translation application.
Insert Raw Data Inserts the raw value from your source file in the target
application if a match is not found.
Original Value Identifies the field in the translation application that maps to
the value from your external data file.
Translation Value Identifies the field in the translation application that maps to
the proper value in the target application or questionnaire.
Note: The selections from the Original Value and Translation Value lists must
be different, or a warning message is displayed.
8. Click OK.
The translation settings are saved. The Status field for that source field changes
to Configured.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Note: The Data Filter tab is available only for Standard data feed types.
You can combine your data filters through advanced operator logic to provide
additional filters to your data.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Data Filter tab.
3. In the Sources column, select the source name to which you want to apply a
filter.
4. From the Field Name list, select the field name from your data source to which
you want to apply a filter.
5. From the Operator list, select an operator to define which type of filter you
want to apply to the source data.
6. In the Values column, enter a value based on your selection in the Operator
column.
7. To create custom operator logic to form relationships between the individual
filters, enter the custom operator logics in the Advanced operator logic field.
8. Complete any of the following optional tasks:
l To add an additional data filter, click Add New Filter located in the Data
Filter section title bar.
l To remove a data filter, in the Actions column of the filter you want to
remove, click .
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Tokens
Note: The Tokens tab is available only for Standard data feed types.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab, and then click the Tokens tab.
3. (Optional) To add an additional token, click Add New located in the Tokens
title bar and enter the field name.
4. In the Value field of the token that you want to modify, enter the updated value.
When modified, the updated value is used on the next data feed execution, and
the execution updates the value at its completion.
5. (Optional) To delete a token, click in the row of the token that you want to
remove.
6. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Map Data
Data Tokens
The Data Feed Manager allows capturing "tokens" of data from the last execution
of a data feed. A token can be any field of data from the last source row processed.
The following table identifies the fields for which tokens are available.
Field Input
Note: The Data Map tab is available for Standard data feed types.
On the Data Map tab, you can complete the following tasks:
l Map Data
l Define Key Fields
l Set Update and Archive Options
Map Data
Complete this task to map the configured elements from the Source Definition tab to
fields in a Platform target application or questionnaire. The Data Feed Manager
updates the target field with the value from the mapped source field during the data
feed execution.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Field Map tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Field Map tab.
The Source Fields section lists the Source Field names listed on the Source
Data tab.
3. Complete one of the following tasks:
l To have the system analyze the source fields and automatically map them to
application or questionnaire fields, click Auto-Populate.
This option maps fields from the data source to application or questionnaire
fields that have the same name. Auto populate occurs on level 1 fields only.
Additionally, if there is an exact name match between the source field and
the target field, and the field type is one of the following, the field is not auto
populated: External links, Values list, Sub-form, Related records, Cross
reference, or CAST.
l From the Source Fields column, drag your source field and drop it next to the
application or questionnaire field in the Target Fields section.
The mapped field from the data source populates the designated target field.
Note: For target fields that have a field type of cross-reference, sub-form, or
related records, map the fields expanded under these field types. You cannot
directly map to a target field with any of these field types.
4. (Optional) In the Actions column of each mapped field for which you want to
configure additional options, click .
The Field Population dialog box opens with options based on the selected field
type.
5. (Optional) To assign a trust level to your source data for a field that is mapped,
in the Trust Level field, enter a value from "0" to "99."
Note: The Trust Level option is useful when you have multiple data feeds
populating the same target application. By assigning trust levels, the Data Feed
Manager can determine when and when not to overwrite existing data.
The Trust Level option allows you to develop a hierarchy for updates to your
target data by entering the desired trust level for the field. The value 0 is
considered the greatest trust level. The trust level accepts values up to 99,
which is the lowest level of trust.
For example, consider a situation where two data feeds map to the same target
application field. Data Feed A runs first and populates the Case Status field
with the value Open. When Data Feed B runs, the Data Feed Manager
recognizes that Data Feed B has data that maps to the same field. Data Feed
Manager evaluates the trust levels to determine which data is the most trusted.
Since the field from Data Feed B has the greater trust level, its value of Closed
overwrites the data from Data Feed A.
6. Complete any of the following optional tasks:
l To delete a mapping for a single field, click in the Actions column of the
field that you want to remove.
l To remove the mappings for all fields, click Clear Target Field Mappings
located in the Target Fields title bar.
7. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Key Fields
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Key Field Definitions tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Key Field Definitions tab.
The Reference Field section contains the target application or questionnaire and
any mapped cross-reference, related records, CAST, or sub-form fields that
require a key field definition to be created. You can use the Key Field
Definitions section to define the unique key identifiers and the data feed actions
during the feed execution.
3. In the Reference Field section, select the field that requires a key field
definition.
4. In the Key Field Definitions title bar, click Add New Key.
5. In the Field Name field, select a target application or questionnaire field that
uniquely identifies the record.
6. To assign compound unique identifiers for the record, complete the following:
a. In the Actions column, click .
The Select Key Field dialog box opens.
b. From the Available Fields list, select the fields.
c. Click OK.
A new row for each selected field is added, and the order number for the new
rows is assigned the same number.
7. To add unique identifiers in a hierarchical structure for sub-form field types,
click in the Actions column.
A new child row is added to the Key Field Definitions section.
Note: After setting the order of key fields, the Data Feed Manager scans the
data source for matches to the first unique identifier. If no matches are found, it
searches for matches to the second unique identifier, and so on. Once the Data
Feed Manager scans through all of the unique identifiers and does not find a
match, the system creates a new target record.
8. From the Action list, select one of the following matching criteria for the unique
identifier.
Option Description
MatchExact Specifies that the value in the data source field must match the
unique identifier value exactly for the target record to be
updated. If the match is not exact, a new record is created.
For example, if a data source field has a value of "Renee Jones"
and a mapped application field that is specified as a unique
identifier has a value of "Renee Ellen Jones," the system does
not update the target application record because it is not an
exact match.
MatchAny Specifies that the data in the data source must match at least
one condition in the list-based field for the target record to be
updated.
For example, if a target application record has the values Blue
and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes
only the value Blue, the record is updated because at least one
of the values matches.
MatchAll Specifies that the data in the source file must match all of the
conditions in the list-based field for the target record to be
updated.
For example, if the target application record has the values
Blue and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes the
values Blue and Green, the record is updated. However, if the
source data includes only the value Blue, the record is not
updated. A new target application record is created instead
because there is not a complete match.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Set Update and Archive Options
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Update/Archive tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Update/Archive tab.
3. In the Update Options section, select any of the following options.
Option Description
Create Instructs the data feed to create new records for data found in
the source file and not in the target application or
questionnaire.
Option Description
Set Value Instructs the data feed to set a value in a Values List field in a
record whenever the external data file does not contain a
matching record.
You can use this option to have the data feed set a Values List
to a value that identifies this record as Inactive or Not Current.
For example, if you have a Devices application with a record
for a specific laptop, and the external data file does not have a
matching record for that laptop, you can use this option to set
a Values List field in the laptop record to the value Inactive.
When you select this option, you also select the Values List
field in the target application or questionnaire and the value
you want to set in that field.
You cannot set the value in the Values List field of the target
leveled application under the following conditions:
l The Set Value Target Field is a global values list.
l Level 3 or lower in a leveled application.
l You are modifying the data feed configuration.
Note: When running a data feed that updates a values list, you
can view the time that the data feed updated the record in the
Execution History log. The last updated time is not displayed
under Last Updated on the Manage Data Feeds page.
In most scenarios, RSA Archer recommends selecting the Set Value option and
flagging these records with a specific value rather than deleting them. For
example, you can add a field to your application called Status and include the
values Current and Archived. If a data feed cannot find a matching record in the
data source with a system record, the system record could be updated to have a
value of Archived for the Status field.
5. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define a Schedule for the Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Schedule tab is available for both Standard and Transport-Only data feed
types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
Note: To configure your data feed to execute after an existing data feed runs,
select Reference. For example, you can select to have a Threats data feed run
immediately after your Assets data feed is completed. From the Reference Feed
list, select after which existing data feed your feed should execute.
4. (Optional) To override the set data feed execution schedule and immediately
execute your data feed, click Start in the Run Data Feed Now section.
5. Click Save.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Procedure
1. Navigate to the Manage Data Feeds page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
2. In the Manage Data Feed page toolbar, click Add New.
3. Do one of the following:
l To configure new settings for a data feed, select Create a new Data Feed
from scratch.
l To use the settings of an existing data feed as a starting point, select Copy
an existing Data Feed and select the existing data feed from the Existing
Data Feeds list.
4. Click OK.
5. In the Name field, enter the name for the data feed.
Next Steps
Manage the General Properties of a Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Option Description
Transport Only Locates a specific data file. This file contains additional
instructions for launching subsequent, standard data feeds.
With this data feed type, the data feed only completes the
Transport and Navigation activities. The Source Definition and
Field Mapping activities are not allowed. Processing of the
data feed does not attempt to process the data.
Important: If the data feed is intended to be used as part of a convoy, or you are
troubleshooting the data being pulled, select the Transport Only option. This option
enables you to use a transform to manipulate the data being returned by bringing the
source data in as a flat file and then configure a subsequent XML-based feed that
includes an XSLT file. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input” in
the RSA Archer Web Services API Reference Guide that can be downloaded from
the RSA Archer Community.
Note: This user account must have permissions for creating records and
updating History Logs fields. To avoid potential conflicts with other data
feeds, RSA Archer recommends that you use a different user account for
each data feed. Additionally, if you are going to simultaneously run multiple
data feeds, create a unique name to prevent termination of session tokens.
c. From the Locale list, select the country (language) format of your source
data. Different cultures or countries use different characters when
formatting similar data.
d. In Send Notifications, select whether to have the data feed trigger
notification emails when records are published or updated. If notifications
are not enabled in the selected target application, no notification emails are
sent when the data feed is run.
e. In Data Validation, select whether to have the system not perform data
validations against the selected target application when saving a record.
When this option is selected, validation that is based on field definition and
configuration is bypassed (with some exceptions). This option applies
regardless of whether targeting a questionnaire or application.
The system validates the following items regardless of whether the Data
Validation field is selected:
l Attachment or image field. Validity of the file.
l DateTime field. Minimum and maximum system values.
Note: The required field settings are disregarded if you select to ignore the
rules defined within the target application, however, the unique selection
cannot be ignored.
f. Click Apply.
Note: To avoid potential conflicts with other data feeds, RSA Archer
recommends that you use a different user account for each data feed.
Additionally, if you are going to simultaneously run multiple data feeds,
create a unique name to prevent termination of session tokens.
b. In the Target Path field, enter the path for the separate data file.
c. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you configure
your data feed, the Data Feed Manager validates the information for you. If it is not
valid, an error message is displayed. You can save the data feed and correct the
errors later; however, the data feed does not process until the errors are corrected
and the data feed validates.
Next Steps
To define the appropriate data transporter, select one the following:
l Archer Web Services Transporter
l Database Query Transporter
l File Transporter
l FTP Transporter
l HTTP Transporter
l Mail Monitor Transporter
l RSS Transporter
l Threat Transporter
Important: For the data feed to execute successfully, the server responsible for
running the data feed must have the required access to the files.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Transport tab.
3. From the Transport Method list, select File Transporter.
4. In the Transport Configuration section, select the File Type for the data feed
from the following options.
Option Description
Single Data File References a single data file. This option requires you
to specify a path in the Path field. You can filter which
files to process by entering a standard file expression in
the File Filter field.
Manifest File Points the Data Feed Manager to a file that contains
instructions for locating a series of data files. This
option requires you to specify a path in the Path field.
You can filter which files to process by entering a
standard file expression in the File Filter field.
Zip File References a .zip file. The .zip file can be a single,
compressed data source file or a collection of files. This
option requires you to specify a path in the Path field.
You can filter which files from the .zip file to process
by entering a standard file expression in the File Filter
field. Use the Encryption Type list to identify the
encrypted file type, if any. If the encrypted .zip file is
password protected, enter the password in the Password
field.
Option Description
Nothing Does not alter the source file when the data feed successfully
completes and deletes the local copy.
Rename Saves the source file under a new name when the data feed
successfully completes. In Destination File, specify where the
file should be saved and the new name for the file.
Delete Delete the source file when the data feed successfully
completes.
Option Description
Nothing Does not alter the source file when the data feed successfully
completes and deletes the local copy.
Rename Saves the source file under a new name when the data feed
successfully completes. In Destination File, specify where the
file should be saved and the new name for the file
7. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
l For a standard data feed, determine the navigation method.
l For transport-only data feed, define a schedule for the data feed.
Filename Tokens
Filename tokens are available for post processing when you want to save the source
information and specify a location or name for the file. When you select the
Rename option, you can use tokens to automatically generate unique names for the
files.
The following table describes the usable tokens for renaming data files.
Token Description
DataFileDirectoryName Enables the Data Feed Manager to update the filename with
the directory name, including the drive, of your file.
DataFileExtension Enables the Data Feed Manager to insert the file extension,
such as .csv, in the new filename.
DataFileFullName Enables the Data Feed Manager to insert the fully qualified
filename. This data includes the drive, directory, filename,
and extension of the original file.
For example, if the data file came from the following location,
C:\DataFeed\Source\ESL\processed\ThreatData.csv, filenames that have been
renamed using tokens would have the following output.
Example 1
Output C:\DataFeed\Source\ESL\processed\success\ThreatData_
01.31.2008.csv
Example 2
Output \\DFSRepository\2008\01\ThreatData_success.csv
Option Description
Xml File Iterator Use this option when importing an .XML file. When this
option is selected, the Xml File Definition section becomes
available. For more information on XML formatting
guidelines and samples, see the appendix “XML
Formatting Used in Field Results and Input” in the RSA
Archer Web Services API Reference Guide that can be
downloaded from the RSA Archer Community.
Delimited Text File Use this option to ensure that the Data Feed Manager
Iterator properly analyzes the data in your delimited file. When
this option is selected, the File Definition section becomes
available.
Database Query Iterator Use this option when importing data from a database.
Available and default navigation methods are based on the selected transport
method.
Note: The Navigation tab is available only for Standard data feed types.
FTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
HTTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Navigation tab.
3. In the Navigation section, select Delimited Text File Iterator.
4. In the File Definition section, select the encoding and delimiters to match the
source file.
5. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Source Data
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Navigation tab.
3. From the Navigation Method list, select Xml File Iterator.
4. In the Xml File Definition section, select Transform.
5. In the Xml File Definition section toolbar, click Load Transform.
The Schema Source dialog box opens.
Note: You must load a transform. A default transform is included with the
installation; however, you can develop your own XSLT if you require additional
data transformation. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input”
in the RSA Archer Web Services API Reference Guide that can be downloaded
from the RSA Archer Community.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Source Data
Note: The Source Data tab is available only for Standard data feed types.
You can select to import the data “as is” into the Platform or execute modifications
and calculations against the data to convert the incoming data into a format that
matches the requirements of the application or questionnaire it is imported into. You
can also use several advanced options, such as lookup translations and calculations,
so you can prepare and modify the data to meet your individual business needs.
Additionally, you can filter data so that only what you want to receive is imported
into the target application or questionnaire. By not defining filters on the Data Filter
tab, you instruct the Data Feed Manager to return all records in the data feed. Or,
using operator logic, you can add filters to include only records meeting certain
criteria in the data feed process.
Finally you can capture tokens of data from the last execution of a data feed that
can be used during the next run to identify which data to retrieve. On the Tokens
tab, you can add, edit, or delete token values in preparation of the next data feed
execution.
On the Source Definition tab, you can complete the following tasks:
l Define the Source Data
l Apply a Calculation
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. To supply the list of source fields, choose one of the following methods and
complete the tasks.
a. Click Load Fields located in the a. In the Source Name column, enter
Source Field title bar. the name of the first field that you
want to define for your data feed.
b. Depending on the selected transport
method, select how to retrieve the The first line is the record definition.
source schema. b. To continue adding source fields, do
any of the following:
l To add a source field, click Add
New and name the field.
l To add a source field in a
4. In the first line in the Source Fields section, from the Field Type list, select the
appropriate field option for the record definition.
Option Description
None Instructs the Data Feed Manager that the field is the record
definition and nothing is to be done with the data.
List Instructs the Data Feed Manager to import the data as a value
list. No transformation or calculations are to be applied to the
data.
5. For the remaining source fields, from the Field Type list, select one of the
following field options and complete the associated steps for that field option.
Option Description
Raw Field Data Instructs the Data Feed Manager to accept the data from the
data source "as is." No transformation or calculations are to
be applied to the data.
Static Text Allows you to add an additional field to the data feed, which
adds context to the data. Upon selection of this option, the
Status field for that source field is set to Not Configured and
is displayed for that source field.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Apply a Calculation
Complete this task to apply calculations to source fields to dynamically generate
new values, which can be populated in an application or questionnaire.
The following are examples of common calculations:
l CONCATENATE([TOLastName], ", ", [TOFirstName])
This calculation combines the values of two fields into a single value. For
example, it would take the value “Doe” from the Last Name field and the value
“John” from the First Name field and merge them into the value “Doe, John.”
Calculations for the Data Feed Manager use the same calculation engine and syntax
as the Application Builder feature.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field to which you want to apply a
calculation, select Calculated Field.
4. In the Actions column of that source field, click .
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Destination
Source Data Translation Application
Application
Field Name: State Field Name: State Field Name: State Field Name: State
ID1 ID2
California California CA CA
Texas Texas TX TX
Florida Florida FL FL
Using an application as an intermediary ensures that the data feed converts all of
the external data into the proper format prior to importing it to the destination
application.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field that you want to translate, select
Lookup Translation.
4. In the Actions column of that source field, click .
The Translation Editor dialog box opens.
5. From the Source list, select the source field.
6. From the Application list, select the application that translates the values.
7. From the Exceptions list, select from the following options the function that the
Data Feed Manager should execute when a value generates an exception.
Option Description
Log Warning Writes an error to the log file, and the value is not imported.
No updates are made to the translation application.
Insert Raw Data Inserts the raw value from your source file in the target
application if a match is not found.
Original Value Identifies the field in the translation application that maps to
the value from your external data file.
Translation Value Identifies the field in the translation application that maps to
the proper value in the target application or questionnaire.
Note: The selections from the Original Value and Translation Value lists must
be different, or a warning message is displayed.
8. Click OK.
The translation settings are saved. The Status field for that source field changes
to Configured.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Note: The Data Filter tab is available only for Standard data feed types.
You can combine your data filters through advanced operator logic to provide
additional filters to your data.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Data Filter tab.
3. In the Sources column, select the source name to which you want to apply a
filter.
4. From the Field Name list, select the field name from your data source to which
you want to apply a filter.
5. From the Operator list, select an operator to define which type of filter you
want to apply to the source data.
6. In the Values column, enter a value based on your selection in the Operator
column.
7. To create custom operator logic to form relationships between the individual
filters, enter the custom operator logics in the Advanced operator logic field.
8. Complete any of the following optional tasks:
l To add an additional data filter, click Add New Filter located in the Data
Filter section title bar.
l To remove a data filter, in the Actions column of the filter you want to
remove, click .
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Tokens
Note: The Tokens tab is available only for Standard data feed types.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab, and then click the Tokens tab.
3. (Optional) To add an additional token, click Add New located in the Tokens
title bar and enter the field name.
4. In the Value field of the token that you want to modify, enter the updated value.
When modified, the updated value is used on the next data feed execution, and
the execution updates the value at its completion.
5. (Optional) To delete a token, click in the row of the token that you want to
remove.
6. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Map Data
Data Tokens
The Data Feed Manager allows capturing "tokens" of data from the last execution
of a data feed. A token can be any field of data from the last source row processed.
The following table identifies the fields for which tokens are available.
Field Input
Note: The Data Map tab is available for Standard data feed types.
On the Data Map tab, you can complete the following tasks:
l Map Data
l Define Key Fields
l Set Update and Archive Options
Map Data
Complete this task to map the configured elements from the Source Definition tab to
fields in a Platform target application or questionnaire. The Data Feed Manager
updates the target field with the value from the mapped source field during the data
feed execution.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Field Map tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Field Map tab.
The Source Fields section lists the Source Field names listed on the Source
Data tab.
3. Complete one of the following tasks:
l To have the system analyze the source fields and automatically map them to
application or questionnaire fields, click Auto-Populate.
This option maps fields from the data source to application or questionnaire
fields that have the same name. Auto populate occurs on level 1 fields only.
Additionally, if there is an exact name match between the source field and
the target field, and the field type is one of the following, the field is not auto
populated: External links, Values list, Sub-form, Related records, Cross
reference, or CAST.
l From the Source Fields column, drag your source field and drop it next to the
application or questionnaire field in the Target Fields section.
The mapped field from the data source populates the designated target field.
Note: For target fields that have a field type of cross-reference, sub-form, or
related records, map the fields expanded under these field types. You cannot
directly map to a target field with any of these field types.
4. (Optional) In the Actions column of each mapped field for which you want to
configure additional options, click .
The Field Population dialog box opens with options based on the selected field
type.
5. (Optional) To assign a trust level to your source data for a field that is mapped,
in the Trust Level field, enter a value from "0" to "99."
Note: The Trust Level option is useful when you have multiple data feeds
populating the same target application. By assigning trust levels, the Data Feed
Manager can determine when and when not to overwrite existing data.
The Trust Level option allows you to develop a hierarchy for updates to your
target data by entering the desired trust level for the field. The value 0 is
considered the greatest trust level. The trust level accepts values up to 99,
which is the lowest level of trust.
For example, consider a situation where two data feeds map to the same target
application field. Data Feed A runs first and populates the Case Status field
with the value Open. When Data Feed B runs, the Data Feed Manager
recognizes that Data Feed B has data that maps to the same field. Data Feed
Manager evaluates the trust levels to determine which data is the most trusted.
Since the field from Data Feed B has the greater trust level, its value of Closed
overwrites the data from Data Feed A.
6. Complete any of the following optional tasks:
l To delete a mapping for a single field, click in the Actions column of the
field that you want to remove.
l To remove the mappings for all fields, click Clear Target Field Mappings
located in the Target Fields title bar.
7. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Key Fields
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Key Field Definitions tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Key Field Definitions tab.
The Reference Field section contains the target application or questionnaire and
any mapped cross-reference, related records, CAST, or sub-form fields that
require a key field definition to be created. You can use the Key Field
Definitions section to define the unique key identifiers and the data feed actions
during the feed execution.
3. In the Reference Field section, select the field that requires a key field
definition.
4. In the Key Field Definitions title bar, click Add New Key.
5. In the Field Name field, select a target application or questionnaire field that
uniquely identifies the record.
6. To assign compound unique identifiers for the record, complete the following:
a. In the Actions column, click .
The Select Key Field dialog box opens.
b. From the Available Fields list, select the fields.
c. Click OK.
A new row for each selected field is added, and the order number for the new
rows is assigned the same number.
7. To add unique identifiers in a hierarchical structure for sub-form field types,
click in the Actions column.
A new child row is added to the Key Field Definitions section.
Note: After setting the order of key fields, the Data Feed Manager scans the
data source for matches to the first unique identifier. If no matches are found, it
searches for matches to the second unique identifier, and so on. Once the Data
Feed Manager scans through all of the unique identifiers and does not find a
match, the system creates a new target record.
8. From the Action list, select one of the following matching criteria for the unique
identifier.
Option Description
MatchExact Specifies that the value in the data source field must match the
unique identifier value exactly for the target record to be
updated. If the match is not exact, a new record is created.
For example, if a data source field has a value of "Renee Jones"
and a mapped application field that is specified as a unique
identifier has a value of "Renee Ellen Jones," the system does
not update the target application record because it is not an
exact match.
MatchAny Specifies that the data in the data source must match at least
one condition in the list-based field for the target record to be
updated.
For example, if a target application record has the values Blue
and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes
only the value Blue, the record is updated because at least one
of the values matches.
MatchAll Specifies that the data in the source file must match all of the
conditions in the list-based field for the target record to be
updated.
For example, if the target application record has the values
Blue and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes the
values Blue and Green, the record is updated. However, if the
source data includes only the value Blue, the record is not
updated. A new target application record is created instead
because there is not a complete match.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Set Update and Archive Options
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Update/Archive tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Update/Archive tab.
3. In the Update Options section, select any of the following options.
Option Description
Create Instructs the data feed to create new records for data found in
the source file and not in the target application or
questionnaire.
Option Description
Set Value Instructs the data feed to set a value in a Values List field in a
record whenever the external data file does not contain a
matching record.
You can use this option to have the data feed set a Values List
to a value that identifies this record as Inactive or Not Current.
For example, if you have a Devices application with a record
for a specific laptop, and the external data file does not have a
matching record for that laptop, you can use this option to set
a Values List field in the laptop record to the value Inactive.
When you select this option, you also select the Values List
field in the target application or questionnaire and the value
you want to set in that field.
You cannot set the value in the Values List field of the target
leveled application under the following conditions:
l The Set Value Target Field is a global values list.
l Level 3 or lower in a leveled application.
l You are modifying the data feed configuration.
Note: When running a data feed that updates a values list, you
can view the time that the data feed updated the record in the
Execution History log. The last updated time is not displayed
under Last Updated on the Manage Data Feeds page.
In most scenarios, RSA Archer recommends selecting the Set Value option and
flagging these records with a specific value rather than deleting them. For
example, you can add a field to your application called Status and include the
values Current and Archived. If a data feed cannot find a matching record in the
data source with a system record, the system record could be updated to have a
value of Archived for the Status field.
5. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define a Schedule for the Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Schedule tab is available for both Standard and Transport-Only data feed
types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
Note: To configure your data feed to execute after an existing data feed runs,
select Reference. For example, you can select to have a Threats data feed run
immediately after your Assets data feed is completed. From the Reference Feed
list, select after which existing data feed your feed should execute.
4. (Optional) To override the set data feed execution schedule and immediately
execute your data feed, click Start in the Run Data Feed Now section.
5. Click Save.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Procedure
1. Navigate to the Manage Data Feeds page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
2. In the Manage Data Feed page toolbar, click Add New.
3. Do one of the following:
l To configure new settings for a data feed, select Create a new Data Feed
from scratch.
l To use the settings of an existing data feed as a starting point, select Copy
an existing Data Feed and select the existing data feed from the Existing
Data Feeds list.
4. Click OK.
5. In the Name field, enter the name for the data feed.
Next Steps
Manage the General Properties of a Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Option Description
Transport Only Locates a specific data file. This file contains additional
instructions for launching subsequent, standard data feeds.
With this data feed type, the data feed only completes the
Transport and Navigation activities. The Source Definition and
Field Mapping activities are not allowed. Processing of the
data feed does not attempt to process the data.
Important: If the data feed is intended to be used as part of a convoy, or you are
troubleshooting the data being pulled, select the Transport Only option. This option
enables you to use a transform to manipulate the data being returned by bringing the
source data in as a flat file and then configure a subsequent XML-based feed that
includes an XSLT file. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input” in
the RSA Archer Web Services API Reference Guide that can be downloaded from
the RSA Archer Community.
Note: This user account must have permissions for creating records and
updating History Logs fields. To avoid potential conflicts with other data
feeds, RSA Archer recommends that you use a different user account for
each data feed. Additionally, if you are going to simultaneously run multiple
data feeds, create a unique name to prevent termination of session tokens.
c. From the Locale list, select the country (language) format of your source
data. Different cultures or countries use different characters when
formatting similar data.
d. In Send Notifications, select whether to have the data feed trigger
notification emails when records are published or updated. If notifications
are not enabled in the selected target application, no notification emails are
sent when the data feed is run.
e. In Data Validation, select whether to have the system not perform data
validations against the selected target application when saving a record.
When this option is selected, validation that is based on field definition and
configuration is bypassed (with some exceptions). This option applies
regardless of whether targeting a questionnaire or application.
The system validates the following items regardless of whether the Data
Validation field is selected:
l Attachment or image field. Validity of the file.
l DateTime field. Minimum and maximum system values.
Note: The required field settings are disregarded if you select to ignore the
rules defined within the target application, however, the unique selection
cannot be ignored.
f. Click Apply.
Note: To avoid potential conflicts with other data feeds, RSA Archer
recommends that you use a different user account for each data feed.
Additionally, if you are going to simultaneously run multiple data feeds,
create a unique name to prevent termination of session tokens.
b. In the Target Path field, enter the path for the separate data file.
c. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you configure
your data feed, the Data Feed Manager validates the information for you. If it is not
valid, an error message is displayed. You can save the data feed and correct the
errors later; however, the data feed does not process until the errors are corrected
and the data feed validates.
Next Steps
To define the appropriate data transporter, select one the following:
l Archer Web Services Transporter
l Database Query Transporter
l File Transporter
l FTP Transporter
l HTTP Transporter
l Mail Monitor Transporter
l RSS Transporter
l Threat Transporter
Important: For the data feed to execute successfully, the server responsible for
running the data feed must have the required access to the URL or FTP server.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Transport tab.
3. From the Transport Method list, select FTP Transporter.
4. In the Transport Configuration section, select the File Type for the data feed
from the following options.
Option Description
Single Data File References a single data file. This option requires you
to specify a path in the Path field. You can filter which
files to process by entering a standard file expression in
the File Filter field.
Manifest File Points the Data Feed Manager to a file that contains
instructions for locating a series of data files. This
option requires you to specify a path in the Path field.
You can filter which files to process by entering a
standard file expression in the File Filter field.
Zip File References a .zip file. The .zip file can be a single,
compressed data source file or a collection of files. This
option requires you to specify a path in the Path field.
You can filter which files from the .zip file to process
by entering a standard file expression in the File Filter
field. Use the Encryption Type list to identify the
encrypted file type, if any. If the encrypted .zip file is
password protected, enter the password in the Password
field.
5. If a proxy needs to be used to access the remote site, in the Proxy section,
select whether the data feed must pass through a proxy to access the source
data. Select from the following options.
Option Description
No Proxy Indicates that the data feed does not pass through a proxy.
Use System Proxy Indicates that the Data Feed Service runs the feed with the
proxy configuration that is set up in the Control Panel.
Configure Proxy Indicates that the data feed must pass through a proxy.
Continue with providing the parameters for accessing the
proxy.
Option Description
Nothing Does not alter the source file when the data feed successfully
completes and deletes the local copy.
Rename Saves the source file under a new name when the data feed
successfully completes. In Destination File, specify where the
file should be saved and the new name for the file.
Delete Delete the source file when the data feed successfully
completes.
Option Description
Nothing Does not alter the source file when the data feed successfully
completes and deletes the local copy.
Rename Saves the source file under a new name when the data feed
successfully completes. In Destination File, specify where the
file should be saved and the new name for the file
8. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
l For a standard data feed, determine the navigation method.
l For transport-only data feed, define a schedule for the data feed.
Filename Tokens
Filename tokens are available for post processing when you want to save the source
information and specify a location or name for the file. When you select the
Rename option, you can use tokens to automatically generate unique names for the
files.
The following table describes the usable tokens for renaming data files.
Token Description
DataFileDirectoryName Enables the Data Feed Manager to update the filename with
the directory name, including the drive, of your file.
DataFileExtension Enables the Data Feed Manager to insert the file extension,
such as .csv, in the new filename.
DataFileFullName Enables the Data Feed Manager to insert the fully qualified
filename. This data includes the drive, directory, filename,
and extension of the original file.
For example, if the data file came from the following location,
C:\DataFeed\Source\ESL\processed\ThreatData.csv, filenames that have been
renamed using tokens would have the following output.
Example 1
Output C:\DataFeed\Source\ESL\processed\success\ThreatData_
01.31.2008.csv
Example 2
Output \\DFSRepository\2008\01\ThreatData_success.csv
Option Description
Xml File Iterator Use this option when importing an .XML file. When this
option is selected, the Xml File Definition section becomes
available. For more information on XML formatting
guidelines and samples, see the appendix “XML
Formatting Used in Field Results and Input” in the RSA
Archer Web Services API Reference Guide that can be
downloaded from the RSA Archer Community.
Delimited Text File Use this option to ensure that the Data Feed Manager
Iterator properly analyzes the data in your delimited file. When
this option is selected, the File Definition section becomes
available.
Database Query Iterator Use this option when importing data from a database.
Available and default navigation methods are based on the selected transport
method.
Note: The Navigation tab is available only for Standard data feed types.
FTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
HTTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Navigation tab.
3. In the Navigation section, select Delimited Text File Iterator.
4. In the File Definition section, select the encoding and delimiters to match the
source file.
5. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Source Data
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Navigation tab.
3. From the Navigation Method list, select Xml File Iterator.
4. In the Xml File Definition section, select Transform.
5. In the Xml File Definition section toolbar, click Load Transform.
The Schema Source dialog box opens.
Note: You must load a transform. A default transform is included with the
installation; however, you can develop your own XSLT if you require additional
data transformation. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input”
in the RSA Archer Web Services API Reference Guide that can be downloaded
from the RSA Archer Community.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Source Data
Note: The Source Data tab is available only for Standard data feed types.
You can select to import the data “as is” into the Platform or execute modifications
and calculations against the data to convert the incoming data into a format that
matches the requirements of the application or questionnaire it is imported into. You
can also use several advanced options, such as lookup translations and calculations,
so you can prepare and modify the data to meet your individual business needs.
Additionally, you can filter data so that only what you want to receive is imported
into the target application or questionnaire. By not defining filters on the Data Filter
tab, you instruct the Data Feed Manager to return all records in the data feed. Or,
using operator logic, you can add filters to include only records meeting certain
criteria in the data feed process.
Finally you can capture tokens of data from the last execution of a data feed that
can be used during the next run to identify which data to retrieve. On the Tokens
tab, you can add, edit, or delete token values in preparation of the next data feed
execution.
On the Source Definition tab, you can complete the following tasks:
l Define the Source Data
l Apply a Calculation
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. To supply the list of source fields, choose one of the following methods and
complete the tasks.
a. Click Load Fields located in the a. In the Source Name column, enter
Source Field title bar. the name of the first field that you
want to define for your data feed.
b. Depending on the selected transport
method, select how to retrieve the The first line is the record definition.
source schema. b. To continue adding source fields, do
any of the following:
l To add a source field, click Add
New and name the field.
l To add a source field in a
4. In the first line in the Source Fields section, from the Field Type list, select the
appropriate field option for the record definition.
Option Description
None Instructs the Data Feed Manager that the field is the record
definition and nothing is to be done with the data.
List Instructs the Data Feed Manager to import the data as a value
list. No transformation or calculations are to be applied to the
data.
5. For the remaining source fields, from the Field Type list, select one of the
following field options and complete the associated steps for that field option.
Option Description
Raw Field Data Instructs the Data Feed Manager to accept the data from the
data source "as is." No transformation or calculations are to
be applied to the data.
Static Text Allows you to add an additional field to the data feed, which
adds context to the data. Upon selection of this option, the
Status field for that source field is set to Not Configured and
is displayed for that source field.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Schema Sources
The source for the schema of your data feed depends on which transporter you are
using. The following table identifies and describes the schema sources that are
available for each of the out-of-the-box transporters.
Execute Search Executes the search in the Archer Web Services Transporter
Platform and detects the source
schema from the results.
Sample File Uses a skeleton of your actual Archer Web Services Transporter
source data file. For example, if
Database Query Transporter
you are importing data from a
.csv file, the source data file is a DeepSight Transporter 2.0
.csv file that includes the column DeepSight Transporter 4.0
names from your source data. If
you are importing data from an File Transporter
.XML file, the source data file FTP Transporter
includes the structure of your
HTTP Transporter
.XML without the actual field
values. iDefense Transporter
When you select the sample file, Mail Monitor Transporter
the Source Fields section RSS Transporter
populates with the fields
specified in the sample data file.
Load URL Loads the contents at the target DeepSight Transporter 2.0
URL and detects the source
DeepSight Transporter 4.0
schema from the contents.
HTTP Transporter
CAUTION: Using this option may
iDefense Transporter
trigger actions associated with
accessing the target URL. RSS Transporter
Standard Schema Uses the standard mail schema. Mail Monitor Transporter
Apply a Calculation
Complete this task to apply calculations to source fields to dynamically generate
new values, which can be populated in an application or questionnaire.
The following are examples of common calculations:
l CONCATENATE([TOLastName], ", ", [TOFirstName])
This calculation combines the values of two fields into a single value. For
example, it would take the value “Doe” from the Last Name field and the value
“John” from the First Name field and merge them into the value “Doe, John.”
Calculations for the Data Feed Manager use the same calculation engine and syntax
as the Application Builder feature.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field to which you want to apply a
calculation, select Calculated Field.
4. In the Actions column of that source field, click .
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Destination
Source Data Translation Application
Application
Field Name: State Field Name: State Field Name: State Field Name: State
ID1 ID2
California California CA CA
Texas Texas TX TX
Florida Florida FL FL
Using an application as an intermediary ensures that the data feed converts all of
the external data into the proper format prior to importing it to the destination
application.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field that you want to translate, select
Lookup Translation.
4. In the Actions column of that source field, click .
The Translation Editor dialog box opens.
5. From the Source list, select the source field.
6. From the Application list, select the application that translates the values.
7. From the Exceptions list, select from the following options the function that the
Data Feed Manager should execute when a value generates an exception.
Option Description
Log Warning Writes an error to the log file, and the value is not imported.
No updates are made to the translation application.
Insert Raw Data Inserts the raw value from your source file in the target
application if a match is not found.
Original Value Identifies the field in the translation application that maps to
the value from your external data file.
Translation Value Identifies the field in the translation application that maps to
the proper value in the target application or questionnaire.
Note: The selections from the Original Value and Translation Value lists must
be different, or a warning message is displayed.
8. Click OK.
The translation settings are saved. The Status field for that source field changes
to Configured.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Note: The Data Filter tab is available only for Standard data feed types.
You can combine your data filters through advanced operator logic to provide
additional filters to your data.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Data Filter tab.
3. In the Sources column, select the source name to which you want to apply a
filter.
4. From the Field Name list, select the field name from your data source to which
you want to apply a filter.
5. From the Operator list, select an operator to define which type of filter you
want to apply to the source data.
6. In the Values column, enter a value based on your selection in the Operator
column.
7. To create custom operator logic to form relationships between the individual
filters, enter the custom operator logics in the Advanced operator logic field.
8. Complete any of the following optional tasks:
l To add an additional data filter, click Add New Filter located in the Data
Filter section title bar.
l To remove a data filter, in the Actions column of the filter you want to
remove, click .
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Tokens
Note: The Tokens tab is available only for Standard data feed types.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab, and then click the Tokens tab.
3. (Optional) To add an additional token, click Add New located in the Tokens
title bar and enter the field name.
4. In the Value field of the token that you want to modify, enter the updated value.
When modified, the updated value is used on the next data feed execution, and
the execution updates the value at its completion.
5. (Optional) To delete a token, click in the row of the token that you want to
remove.
6. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Map Data
Data Tokens
The Data Feed Manager allows capturing "tokens" of data from the last execution
of a data feed. A token can be any field of data from the last source row processed.
The following table identifies the fields for which tokens are available.
Field Input
Note: The Data Map tab is available for Standard data feed types.
On the Data Map tab, you can complete the following tasks:
l Map Data
l Define Key Fields
l Set Update and Archive Options
Map Data
Complete this task to map the configured elements from the Source Definition tab to
fields in a Platform target application or questionnaire. The Data Feed Manager
updates the target field with the value from the mapped source field during the data
feed execution.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Field Map tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Field Map tab.
The Source Fields section lists the Source Field names listed on the Source
Data tab.
3. Complete one of the following tasks:
l To have the system analyze the source fields and automatically map them to
application or questionnaire fields, click Auto-Populate.
This option maps fields from the data source to application or questionnaire
fields that have the same name. Auto populate occurs on level 1 fields only.
Additionally, if there is an exact name match between the source field and
the target field, and the field type is one of the following, the field is not auto
populated: External links, Values list, Sub-form, Related records, Cross
reference, or CAST.
l From the Source Fields column, drag your source field and drop it next to the
application or questionnaire field in the Target Fields section.
The mapped field from the data source populates the designated target field.
Note: For target fields that have a field type of cross-reference, sub-form, or
related records, map the fields expanded under these field types. You cannot
directly map to a target field with any of these field types.
4. (Optional) In the Actions column of each mapped field for which you want to
configure additional options, click .
The Field Population dialog box opens with options based on the selected field
type.
5. (Optional) To assign a trust level to your source data for a field that is mapped,
in the Trust Level field, enter a value from "0" to "99."
Note: The Trust Level option is useful when you have multiple data feeds
populating the same target application. By assigning trust levels, the Data Feed
Manager can determine when and when not to overwrite existing data.
The Trust Level option allows you to develop a hierarchy for updates to your
target data by entering the desired trust level for the field. The value 0 is
considered the greatest trust level. The trust level accepts values up to 99,
which is the lowest level of trust.
For example, consider a situation where two data feeds map to the same target
application field. Data Feed A runs first and populates the Case Status field
with the value Open. When Data Feed B runs, the Data Feed Manager
recognizes that Data Feed B has data that maps to the same field. Data Feed
Manager evaluates the trust levels to determine which data is the most trusted.
Since the field from Data Feed B has the greater trust level, its value of Closed
overwrites the data from Data Feed A.
6. Complete any of the following optional tasks:
l To delete a mapping for a single field, click in the Actions column of the
field that you want to remove.
l To remove the mappings for all fields, click Clear Target Field Mappings
located in the Target Fields title bar.
7. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Key Fields
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Key Field Definitions tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Key Field Definitions tab.
The Reference Field section contains the target application or questionnaire and
any mapped cross-reference, related records, CAST, or sub-form fields that
require a key field definition to be created. You can use the Key Field
Definitions section to define the unique key identifiers and the data feed actions
during the feed execution.
3. In the Reference Field section, select the field that requires a key field
definition.
4. In the Key Field Definitions title bar, click Add New Key.
5. In the Field Name field, select a target application or questionnaire field that
uniquely identifies the record.
6. To assign compound unique identifiers for the record, complete the following:
a. In the Actions column, click .
The Select Key Field dialog box opens.
b. From the Available Fields list, select the fields.
c. Click OK.
A new row for each selected field is added, and the order number for the new
rows is assigned the same number.
7. To add unique identifiers in a hierarchical structure for sub-form field types,
click in the Actions column.
A new child row is added to the Key Field Definitions section.
Note: After setting the order of key fields, the Data Feed Manager scans the
data source for matches to the first unique identifier. If no matches are found, it
searches for matches to the second unique identifier, and so on. Once the Data
Feed Manager scans through all of the unique identifiers and does not find a
match, the system creates a new target record.
8. From the Action list, select one of the following matching criteria for the unique
identifier.
Option Description
MatchExact Specifies that the value in the data source field must match the
unique identifier value exactly for the target record to be
updated. If the match is not exact, a new record is created.
For example, if a data source field has a value of "Renee Jones"
and a mapped application field that is specified as a unique
identifier has a value of "Renee Ellen Jones," the system does
not update the target application record because it is not an
exact match.
MatchAny Specifies that the data in the data source must match at least
one condition in the list-based field for the target record to be
updated.
For example, if a target application record has the values Blue
and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes
only the value Blue, the record is updated because at least one
of the values matches.
MatchAll Specifies that the data in the source file must match all of the
conditions in the list-based field for the target record to be
updated.
For example, if the target application record has the values
Blue and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes the
values Blue and Green, the record is updated. However, if the
source data includes only the value Blue, the record is not
updated. A new target application record is created instead
because there is not a complete match.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Set Update and Archive Options
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Update/Archive tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Update/Archive tab.
3. In the Update Options section, select any of the following options.
Option Description
Create Instructs the data feed to create new records for data found in
the source file and not in the target application or
questionnaire.
Option Description
Set Value Instructs the data feed to set a value in a Values List field in a
record whenever the external data file does not contain a
matching record.
You can use this option to have the data feed set a Values List
to a value that identifies this record as Inactive or Not Current.
For example, if you have a Devices application with a record
for a specific laptop, and the external data file does not have a
matching record for that laptop, you can use this option to set
a Values List field in the laptop record to the value Inactive.
When you select this option, you also select the Values List
field in the target application or questionnaire and the value
you want to set in that field.
You cannot set the value in the Values List field of the target
leveled application under the following conditions:
l The Set Value Target Field is a global values list.
l Level 3 or lower in a leveled application.
l You are modifying the data feed configuration.
Note: When running a data feed that updates a values list, you
can view the time that the data feed updated the record in the
Execution History log. The last updated time is not displayed
under Last Updated on the Manage Data Feeds page.
In most scenarios, RSA Archer recommends selecting the Set Value option and
flagging these records with a specific value rather than deleting them. For
example, you can add a field to your application called Status and include the
values Current and Archived. If a data feed cannot find a matching record in the
data source with a system record, the system record could be updated to have a
value of Archived for the Status field.
5. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define a Schedule for the Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Schedule tab is available for both Standard and Transport-Only data feed
types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
Note: To configure your data feed to execute after an existing data feed runs,
select Reference. For example, you can select to have a Threats data feed run
immediately after your Assets data feed is completed. From the Reference Feed
list, select after which existing data feed your feed should execute.
4. (Optional) To override the set data feed execution schedule and immediately
execute your data feed, click Start in the Run Data Feed Now section.
5. Click Save.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Procedure
1. Navigate to the Manage Data Feeds page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
2. In the Manage Data Feed page toolbar, click Add New.
3. Do one of the following:
l To configure new settings for a data feed, select Create a new Data Feed
from scratch.
l To use the settings of an existing data feed as a starting point, select Copy
an existing Data Feed and select the existing data feed from the Existing
Data Feeds list.
4. Click OK.
5. In the Name field, enter the name for the data feed.
Next Steps
Manage the General Properties of a Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Option Description
Transport Only Locates a specific data file. This file contains additional
instructions for launching subsequent, standard data feeds.
With this data feed type, the data feed only completes the
Transport and Navigation activities. The Source Definition and
Field Mapping activities are not allowed. Processing of the
data feed does not attempt to process the data.
Important: If the data feed is intended to be used as part of a convoy, or you are
troubleshooting the data being pulled, select the Transport Only option. This option
enables you to use a transform to manipulate the data being returned by bringing the
source data in as a flat file and then configure a subsequent XML-based feed that
includes an XSLT file. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input” in
the RSA Archer Web Services API Reference Guide that can be downloaded from
the RSA Archer Community.
Note: This user account must have permissions for creating records and
updating History Logs fields. To avoid potential conflicts with other data
feeds, RSA Archer recommends that you use a different user account for
each data feed. Additionally, if you are going to simultaneously run multiple
data feeds, create a unique name to prevent termination of session tokens.
c. From the Locale list, select the country (language) format of your source
data. Different cultures or countries use different characters when
formatting similar data.
d. In Send Notifications, select whether to have the data feed trigger
notification emails when records are published or updated. If notifications
are not enabled in the selected target application, no notification emails are
sent when the data feed is run.
e. In Data Validation, select whether to have the system not perform data
validations against the selected target application when saving a record.
When this option is selected, validation that is based on field definition and
configuration is bypassed (with some exceptions). This option applies
regardless of whether targeting a questionnaire or application.
The system validates the following items regardless of whether the Data
Validation field is selected:
l Attachment or image field. Validity of the file.
l DateTime field. Minimum and maximum system values.
Note: The required field settings are disregarded if you select to ignore the
rules defined within the target application, however, the unique selection
cannot be ignored.
f. Click Apply.
Note: To avoid potential conflicts with other data feeds, RSA Archer
recommends that you use a different user account for each data feed.
Additionally, if you are going to simultaneously run multiple data feeds,
create a unique name to prevent termination of session tokens.
b. In the Target Path field, enter the path for the separate data file.
c. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you configure
your data feed, the Data Feed Manager validates the information for you. If it is not
valid, an error message is displayed. You can save the data feed and correct the
errors later; however, the data feed does not process until the errors are corrected
and the data feed validates.
Next Steps
To define the appropriate data transporter, select one the following:
l Archer Web Services Transporter
l Database Query Transporter
l File Transporter
l FTP Transporter
l HTTP Transporter
l Mail Monitor Transporter
l RSS Transporter
l Threat Transporter
Important: If data is from an external HTTP or HTTPS site, you must be able to
access that external site from the server running the services for the data feed to
execute successfully.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Transport tab.
3. From the Transport Method list, select HTTP Transporter.
4. In the Transport Configuration section, select the File Type for the data feed
from the following options.
Option Description
Single Data File References a single data file. This option requires you
to specify a path in the Path field. You can filter which
files to process by entering a standard file expression in
the File Filter field.
Manifest File Points the Data Feed Manager to a file that contains
instructions for locating a series of data files. This
option requires you to specify a path in the Path field.
You can filter which files to process by entering a
standard file expression in the File Filter field.
Zip File References a .zip file. The .zip file can be a single,
compressed data source file or a collection of files. This
option requires you to specify a path in the Path field.
You can filter which files from the .zip file to process
by entering a standard file expression in the File Filter
field. Use the Encryption Type list to identify the
encrypted file type, if any. If the encrypted .zip file is
password protected, enter the password in the Password
field.
5. From the Action Type list, select one of the following options:
l Get. Uses the GET type of HTTP request. This type adds the parameters on
the query string.
l Put. Uses the POST type of HTTP request. This type includes the
parameters as form parameters on the request.
6. In the Logon Properties section, select one of the following Use Credentials
options:
l Anonymous. Allows public access to the data.
l Specific. Restricts access to the data. From the Specify Credentials options,
specify from which authorized account to make the HTTP request, and enter
the credentials for the appropriate account.
7. In the Data Request Properties section, configure the HTTP site to connect to
retrieve the data source by completing the following fields:
a. In Data Request URI, enter the uniform resource identifier (URI) of the
HTTP or HTTPS site that contains the data you want to import. This field
also allows you to specify a port, for example, http://company-
server:8080/httpFeed/.
b. If your request requires the use of header parameters, specify any key/value
pair that may be required as part of your Get or Put operation in Header
Parameters.
c. (Optional) To add multiple header parameters, click Add New in the Data
Request Properties toolbar.
d. (Optional) To remove a header parameter, click in the row of that header
parameter.
e. If the action type is Put, enter the posting data in Post Data.
8. If a proxy needs to be used to access the remote site, in the Proxy section,
select whether the data feed must pass through a proxy to access the source
data. Select from the following options.
Option Description
No Proxy Indicates that the data feed does not pass through a proxy.
Use System Proxy Indicates that the Data Feed Service runs the feed with the
proxy configuration that is set up in the Control Panel.
Configure Proxy Indicates that the data feed must pass through a proxy.
Continue with providing the parameters for accessing the
proxy.
Option Description
Nothing Does not alter the source file when the data feed successfully
completes and deletes the local copy.
Rename Saves the source file under a new name when the data feed
successfully completes. In Destination File, specify where the
file should be saved and the new name for the file
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
l For a standard data feed, determine the navigation method.
l For transport-only data feed, define a schedule for the data feed.
Filename Tokens
Filename tokens are available for post processing when you want to save the source
information and specify a location or name for the file. When you select the
Rename option, you can use tokens to automatically generate unique names for the
files.
The following table describes the usable tokens for renaming data files.
Token Description
DataFileDirectoryName Enables the Data Feed Manager to update the filename with
the directory name, including the drive, of your file.
DataFileExtension Enables the Data Feed Manager to insert the file extension,
such as .csv, in the new filename.
DataFileFullName Enables the Data Feed Manager to insert the fully qualified
filename. This data includes the drive, directory, filename,
and extension of the original file.
For example, if the data file came from the following location,
C:\DataFeed\Source\ESL\processed\ThreatData.csv, filenames that have been
renamed using tokens would have the following output.
Example 1
Output C:\DataFeed\Source\ESL\processed\success\ThreatData_
01.31.2008.csv
Example 2
Output \\DFSRepository\2008\01\ThreatData_success.csv
Option Description
Xml File Iterator Use this option when importing an .XML file. When this
option is selected, the Xml File Definition section becomes
available. For more information on XML formatting
guidelines and samples, see the appendix “XML
Formatting Used in Field Results and Input” in the RSA
Archer Web Services API Reference Guide that can be
downloaded from the RSA Archer Community.
Delimited Text File Use this option to ensure that the Data Feed Manager
Iterator properly analyzes the data in your delimited file. When
this option is selected, the File Definition section becomes
available.
Database Query Iterator Use this option when importing data from a database.
Available and default navigation methods are based on the selected transport
method.
Note: The Navigation tab is available only for Standard data feed types.
FTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
HTTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Source Data
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Navigation tab.
3. From the Navigation Method list, select Xml File Iterator.
4. In the Xml File Definition section, select Transform.
5. In the Xml File Definition section toolbar, click Load Transform.
The Schema Source dialog box opens.
Note: You must load a transform. A default transform is included with the
installation; however, you can develop your own XSLT if you require additional
data transformation. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input”
in the RSA Archer Web Services API Reference Guide that can be downloaded
from the RSA Archer Community.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Source Data
Note: The Source Data tab is available only for Standard data feed types.
You can select to import the data “as is” into the Platform or execute modifications
and calculations against the data to convert the incoming data into a format that
matches the requirements of the application or questionnaire it is imported into. You
can also use several advanced options, such as lookup translations and calculations,
so you can prepare and modify the data to meet your individual business needs.
Additionally, you can filter data so that only what you want to receive is imported
into the target application or questionnaire. By not defining filters on the Data Filter
tab, you instruct the Data Feed Manager to return all records in the data feed. Or,
using operator logic, you can add filters to include only records meeting certain
criteria in the data feed process.
Finally you can capture tokens of data from the last execution of a data feed that
can be used during the next run to identify which data to retrieve. On the Tokens
tab, you can add, edit, or delete token values in preparation of the next data feed
execution.
On the Source Definition tab, you can complete the following tasks:
l Define the Source Data
l Apply a Calculation
l Perform a Lookup Translation
l Incorporate Static Text
l Define Data Filters
l Define Data Tokens
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. To supply the list of source fields, choose one of the following methods and
complete the tasks.
a. Click Load Fields located in the a. In the Source Name column, enter
Source Field title bar. the name of the first field that you
want to define for your data feed.
b. Depending on the selected transport
method, select how to retrieve the The first line is the record definition.
source schema. b. To continue adding source fields, do
any of the following:
l To add a source field, click Add
New and name the field.
l To add a source field in a
4. In the first line in the Source Fields section, from the Field Type list, select the
appropriate field option for the record definition.
Option Description
None Instructs the Data Feed Manager that the field is the record
definition and nothing is to be done with the data.
List Instructs the Data Feed Manager to import the data as a value
list. No transformation or calculations are to be applied to the
data.
5. For the remaining source fields, from the Field Type list, select one of the
following field options and complete the associated steps for that field option.
Option Description
Raw Field Data Instructs the Data Feed Manager to accept the data from the
data source "as is." No transformation or calculations are to
be applied to the data.
Static Text Allows you to add an additional field to the data feed, which
adds context to the data. Upon selection of this option, the
Status field for that source field is set to Not Configured and
is displayed for that source field.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Schema Sources
The source for the schema of your data feed depends on which transporter you are
using. The following table identifies and describes the schema sources that are
available for each of the out-of-the-box transporters.
Execute Search Executes the search in the Archer Web Services Transporter
Platform and detects the source
schema from the results.
Sample File Uses a skeleton of your actual Archer Web Services Transporter
source data file. For example, if
Database Query Transporter
you are importing data from a
.csv file, the source data file is a DeepSight Transporter 2.0
.csv file that includes the column DeepSight Transporter 4.0
names from your source data. If
you are importing data from an File Transporter
.XML file, the source data file FTP Transporter
includes the structure of your
HTTP Transporter
.XML without the actual field
values. iDefense Transporter
When you select the sample file, Mail Monitor Transporter
the Source Fields section RSS Transporter
populates with the fields
specified in the sample data file.
Load URL Loads the contents at the target DeepSight Transporter 2.0
URL and detects the source
DeepSight Transporter 4.0
schema from the contents.
HTTP Transporter
CAUTION: Using this option may
iDefense Transporter
trigger actions associated with
accessing the target URL. RSS Transporter
Standard Schema Uses the standard mail schema. Mail Monitor Transporter
Apply a Calculation
Complete this task to apply calculations to source fields to dynamically generate
new values, which can be populated in an application or questionnaire.
The following are examples of common calculations:
l CONCATENATE([TOLastName], ", ", [TOFirstName])
This calculation combines the values of two fields into a single value. For
example, it would take the value “Doe” from the Last Name field and the value
“John” from the First Name field and merge them into the value “Doe, John.”
Calculations for the Data Feed Manager use the same calculation engine and syntax
as the Application Builder feature.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field to which you want to apply a
calculation, select Calculated Field.
4. In the Actions column of that source field, click .
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Destination
Source Data Translation Application
Application
Field Name: State Field Name: State Field Name: State Field Name: State
ID1 ID2
California California CA CA
Texas Texas TX TX
Florida Florida FL FL
Using an application as an intermediary ensures that the data feed converts all of
the external data into the proper format prior to importing it to the destination
application.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field that you want to translate, select
Lookup Translation.
4. In the Actions column of that source field, click .
The Translation Editor dialog box opens.
5. From the Source list, select the source field.
6. From the Application list, select the application that translates the values.
7. From the Exceptions list, select from the following options the function that the
Data Feed Manager should execute when a value generates an exception.
Option Description
Log Warning Writes an error to the log file, and the value is not imported.
No updates are made to the translation application.
Insert Raw Data Inserts the raw value from your source file in the target
application if a match is not found.
Original Value Identifies the field in the translation application that maps to
the value from your external data file.
Translation Value Identifies the field in the translation application that maps to
the proper value in the target application or questionnaire.
Note: The selections from the Original Value and Translation Value lists must
be different, or a warning message is displayed.
8. Click OK.
The translation settings are saved. The Status field for that source field changes
to Configured.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Note: The Data Filter tab is available only for Standard data feed types.
You can combine your data filters through advanced operator logic to provide
additional filters to your data.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Data Filter tab.
3. In the Sources column, select the source name to which you want to apply a
filter.
4. From the Field Name list, select the field name from your data source to which
you want to apply a filter.
5. From the Operator list, select an operator to define which type of filter you
want to apply to the source data.
6. In the Values column, enter a value based on your selection in the Operator
column.
7. To create custom operator logic to form relationships between the individual
filters, enter the custom operator logics in the Advanced operator logic field.
8. Complete any of the following optional tasks:
l To add an additional data filter, click Add New Filter located in the Data
Filter section title bar.
l To remove a data filter, in the Actions column of the filter you want to
remove, click .
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Tokens
Note: The Tokens tab is available only for Standard data feed types.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab, and then click the Tokens tab.
3. (Optional) To add an additional token, click Add New located in the Tokens
title bar and enter the field name.
4. In the Value field of the token that you want to modify, enter the updated value.
When modified, the updated value is used on the next data feed execution, and
the execution updates the value at its completion.
5. (Optional) To delete a token, click in the row of the token that you want to
remove.
6. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Map Data
Data Tokens
The Data Feed Manager allows capturing "tokens" of data from the last execution
of a data feed. A token can be any field of data from the last source row processed.
The following table identifies the fields for which tokens are available.
Field Input
Note: The Data Map tab is available for Standard data feed types.
On the Data Map tab, you can complete the following tasks:
l Map Data
l Define Key Fields
l Set Update and Archive Options
Map Data
Complete this task to map the configured elements from the Source Definition tab to
fields in a Platform target application or questionnaire. The Data Feed Manager
updates the target field with the value from the mapped source field during the data
feed execution.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Field Map tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Field Map tab.
The Source Fields section lists the Source Field names listed on the Source
Data tab.
3. Complete one of the following tasks:
l To have the system analyze the source fields and automatically map them to
application or questionnaire fields, click Auto-Populate.
This option maps fields from the data source to application or questionnaire
fields that have the same name. Auto populate occurs on level 1 fields only.
Additionally, if there is an exact name match between the source field and
the target field, and the field type is one of the following, the field is not auto
populated: External links, Values list, Sub-form, Related records, Cross
reference, or CAST.
l From the Source Fields column, drag your source field and drop it next to the
application or questionnaire field in the Target Fields section.
The mapped field from the data source populates the designated target field.
Note: For target fields that have a field type of cross-reference, sub-form, or
related records, map the fields expanded under these field types. You cannot
directly map to a target field with any of these field types.
4. (Optional) In the Actions column of each mapped field for which you want to
configure additional options, click .
The Field Population dialog box opens with options based on the selected field
type.
5. (Optional) To assign a trust level to your source data for a field that is mapped,
in the Trust Level field, enter a value from "0" to "99."
Note: The Trust Level option is useful when you have multiple data feeds
populating the same target application. By assigning trust levels, the Data Feed
Manager can determine when and when not to overwrite existing data.
The Trust Level option allows you to develop a hierarchy for updates to your
target data by entering the desired trust level for the field. The value 0 is
considered the greatest trust level. The trust level accepts values up to 99,
which is the lowest level of trust.
For example, consider a situation where two data feeds map to the same target
application field. Data Feed A runs first and populates the Case Status field
with the value Open. When Data Feed B runs, the Data Feed Manager
recognizes that Data Feed B has data that maps to the same field. Data Feed
Manager evaluates the trust levels to determine which data is the most trusted.
Since the field from Data Feed B has the greater trust level, its value of Closed
overwrites the data from Data Feed A.
6. Complete any of the following optional tasks:
l To delete a mapping for a single field, click in the Actions column of the
field that you want to remove.
l To remove the mappings for all fields, click Clear Target Field Mappings
located in the Target Fields title bar.
7. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Key Fields
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Key Field Definitions tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Key Field Definitions tab.
The Reference Field section contains the target application or questionnaire and
any mapped cross-reference, related records, CAST, or sub-form fields that
require a key field definition to be created. You can use the Key Field
Definitions section to define the unique key identifiers and the data feed actions
during the feed execution.
3. In the Reference Field section, select the field that requires a key field
definition.
4. In the Key Field Definitions title bar, click Add New Key.
5. In the Field Name field, select a target application or questionnaire field that
uniquely identifies the record.
6. To assign compound unique identifiers for the record, complete the following:
a. In the Actions column, click .
The Select Key Field dialog box opens.
b. From the Available Fields list, select the fields.
c. Click OK.
A new row for each selected field is added, and the order number for the new
rows is assigned the same number.
7. To add unique identifiers in a hierarchical structure for sub-form field types,
click in the Actions column.
A new child row is added to the Key Field Definitions section.
Note: After setting the order of key fields, the Data Feed Manager scans the
data source for matches to the first unique identifier. If no matches are found, it
searches for matches to the second unique identifier, and so on. Once the Data
Feed Manager scans through all of the unique identifiers and does not find a
match, the system creates a new target record.
8. From the Action list, select one of the following matching criteria for the unique
identifier.
Option Description
MatchExact Specifies that the value in the data source field must match the
unique identifier value exactly for the target record to be
updated. If the match is not exact, a new record is created.
For example, if a data source field has a value of "Renee Jones"
and a mapped application field that is specified as a unique
identifier has a value of "Renee Ellen Jones," the system does
not update the target application record because it is not an
exact match.
MatchAny Specifies that the data in the data source must match at least
one condition in the list-based field for the target record to be
updated.
For example, if a target application record has the values Blue
and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes
only the value Blue, the record is updated because at least one
of the values matches.
MatchAll Specifies that the data in the source file must match all of the
conditions in the list-based field for the target record to be
updated.
For example, if the target application record has the values
Blue and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes the
values Blue and Green, the record is updated. However, if the
source data includes only the value Blue, the record is not
updated. A new target application record is created instead
because there is not a complete match.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Set Update and Archive Options
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Update/Archive tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Update/Archive tab.
3. In the Update Options section, select any of the following options.
Option Description
Create Instructs the data feed to create new records for data found in
the source file and not in the target application or
questionnaire.
Option Description
Set Value Instructs the data feed to set a value in a Values List field in a
record whenever the external data file does not contain a
matching record.
You can use this option to have the data feed set a Values List
to a value that identifies this record as Inactive or Not Current.
For example, if you have a Devices application with a record
for a specific laptop, and the external data file does not have a
matching record for that laptop, you can use this option to set
a Values List field in the laptop record to the value Inactive.
When you select this option, you also select the Values List
field in the target application or questionnaire and the value
you want to set in that field.
You cannot set the value in the Values List field of the target
leveled application under the following conditions:
l The Set Value Target Field is a global values list.
l Level 3 or lower in a leveled application.
l You are modifying the data feed configuration.
Note: When running a data feed that updates a values list, you
can view the time that the data feed updated the record in the
Execution History log. The last updated time is not displayed
under Last Updated on the Manage Data Feeds page.
In most scenarios, RSA Archer recommends selecting the Set Value option and
flagging these records with a specific value rather than deleting them. For
example, you can add a field to your application called Status and include the
values Current and Archived. If a data feed cannot find a matching record in the
data source with a system record, the system record could be updated to have a
value of Archived for the Status field.
5. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define a Schedule for the Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Schedule tab is available for both Standard and Transport-Only data feed
types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
Note: To configure your data feed to execute after an existing data feed runs,
select Reference. For example, you can select to have a Threats data feed run
immediately after your Assets data feed is completed. From the Reference Feed
list, select after which existing data feed your feed should execute.
4. (Optional) To override the set data feed execution schedule and immediately
execute your data feed, click Start in the Run Data Feed Now section.
5. Click Save.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
When working with Mail Monitor data feeds, you can perform the following tasks:
1. Add a New Data Feed Record
2. Manage the General Properties of a Data Feed
3. Define a Mail Monitor Transporter
4. Determine the Navigation Method
5. Define Source Data
6. Define Data Mapping Activities
7. Define a Schedule for the Data Feed
Procedure
1. Navigate to the Manage Data Feeds page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
Next Steps
Manage the General Properties of a Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Option Description
Transport Only Locates a specific data file. This file contains additional
instructions for launching subsequent, standard data feeds.
With this data feed type, the data feed only completes the
Transport and Navigation activities. The Source Definition and
Field Mapping activities are not allowed. Processing of the
data feed does not attempt to process the data.
Important: If the data feed is intended to be used as part of a convoy, or you are
troubleshooting the data being pulled, select the Transport Only option. This option
enables you to use a transform to manipulate the data being returned by bringing the
source data in as a flat file and then configure a subsequent XML-based feed that
includes an XSLT file. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input” in
the RSA Archer Web Services API Reference Guide that can be downloaded from
the RSA Archer Community.
Note: This user account must have permissions for creating records and
updating History Logs fields. To avoid potential conflicts with other data
feeds, RSA Archer recommends that you use a different user account for
each data feed. Additionally, if you are going to simultaneously run multiple
data feeds, create a unique name to prevent termination of session tokens.
c. From the Locale list, select the country (language) format of your source
data. Different cultures or countries use different characters when
formatting similar data.
Note: The required field settings are disregarded if you select to ignore the
rules defined within the target application, however, the unique selection
cannot be ignored.
f. Click Apply.
Note: To avoid potential conflicts with other data feeds, RSA Archer
recommends that you use a different user account for each data feed.
Additionally, if you are going to simultaneously run multiple data feeds,
create a unique name to prevent termination of session tokens.
b. In the Target Path field, enter the path for the separate data file.
c. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you configure
your data feed, the Data Feed Manager validates the information for you. If it is not
valid, an error message is displayed. You can save the data feed and correct the
errors later; however, the data feed does not process until the errors are corrected
and the data feed validates.
Next Steps
To define the appropriate data transporter, select one the following:
l Archer Web Services Transporter
l Database Query Transporter
l File Transporter
l FTP Transporter
l HTTP Transporter
l Mail Monitor Transporter
l RSS Transporter
l Threat Transporter
Important: For the data feed to execute successfully, the server responsible for
running the data feed must have a service account with valid logon credentials.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Transport tab.
3. From the Transport Method list, select Mail Monitor Transporter.
4. In the Transport Configuration section, specify the required credentials to
allow the data feed to locate and access the appropriate mailbox and retrieve.
Option Description
POP3 Uses the POP3 protocol to retrieve emails from your organization's
mail server.
IMAP4 Uses the IMAP4 protocol to retrieve emails from your organization's
mail server.
Option Description
Nothing Does not alter the source file when the data feed successfully
completes and deletes the local copy.
Rename Saves the source file under a new name when the data feed
successfully completes. In Destination File, specify where the
file should be saved and the new name for the file
6. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
l For a standard data feed, determine the navigation method.
l For transport-only data feed, define a schedule for the data feed.
Filename Tokens
Filename tokens are available for post processing when you want to save the source
information and specify a location or name for the file. When you select the
Rename option, you can use tokens to automatically generate unique names for the
files.
The following table describes the usable tokens for renaming data files.
Token Description
DataFileDirectoryName Enables the Data Feed Manager to update the filename with
the directory name, including the drive, of your file.
DataFileExtension Enables the Data Feed Manager to insert the file extension,
such as .csv, in the new filename.
DataFileFullName Enables the Data Feed Manager to insert the fully qualified
filename. This data includes the drive, directory, filename,
and extension of the original file.
For example, if the data file came from the following location,
C:\DataFeed\Source\ESL\processed\ThreatData.csv, filenames that have been
renamed using tokens would have the following output.
Example 1
Output C:\DataFeed\Source\ESL\processed\success\ThreatData_
01.31.2008.csv
Example 2
Output \\DFSRepository\2008\01\ThreatData_success.csv
Option Description
Xml File Iterator Use this option when importing an .XML file. When this
option is selected, the Xml File Definition section becomes
available. For more information on XML formatting
guidelines and samples, see the appendix “XML
Formatting Used in Field Results and Input” in the RSA
Archer Web Services API Reference Guide that can be
downloaded from the RSA Archer Community.
Delimited Text File Use this option to ensure that the Data Feed Manager
Iterator properly analyzes the data in your delimited file. When
this option is selected, the File Definition section becomes
available.
Database Query Iterator Use this option when importing data from a database.
Available and default navigation methods are based on the selected transport
method.
Note: The Navigation tab is available only for Standard data feed types.
FTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
HTTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Note: You must load a transform. A default transform is included with the
installation; however, you can develop your own XSLT if you require additional
data transformation. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input”
in the RSA Archer Web Services API Reference Guide that can be downloaded
from the RSA Archer Community.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Source Data
Note: The Source Data tab is available only for Standard data feed types.
You can select to import the data “as is” into the Platform or execute modifications
and calculations against the data to convert the incoming data into a format that
matches the requirements of the application or questionnaire it is imported into. You
can also use several advanced options, such as lookup translations and calculations,
so you can prepare and modify the data to meet your individual business needs.
Additionally, you can filter data so that only what you want to receive is imported
into the target application or questionnaire. By not defining filters on the Data Filter
tab, you instruct the Data Feed Manager to return all records in the data feed. Or,
using operator logic, you can add filters to include only records meeting certain
criteria in the data feed process.
Finally you can capture tokens of data from the last execution of a data feed that
can be used during the next run to identify which data to retrieve. On the Tokens
tab, you can add, edit, or delete token values in preparation of the next data feed
execution.
On the Source Definition tab, you can complete the following tasks:
l Define the Source Data
l Apply a Calculation
l Perform a Lookup Translation
l Incorporate Static Text
l Define Data Filters
l Define Data Tokens
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
l Ensure that the user account used has access to the content, or you will receive a
schema error when building the source definition. You can also receive a
schema error for the following reasons:
o If your connection string is not correct on the Transport tab.
o The account is unable to login.
o The report is not in the correct format.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. To supply the list of source fields, choose one of the following methods and
complete the tasks.
a. Click Load Fields located in the a. In the Source Name column, enter
Source Field title bar. the name of the first field that you
want to define for your data feed.
b. Depending on the selected transport
method, select how to retrieve the The first line is the record definition.
source schema. b. To continue adding source fields, do
any of the following:
l To add a source field, click Add
New and name the field.
l To add a source field in a
4. In the first line in the Source Fields section, from the Field Type list, select the
appropriate field option for the record definition.
Option Description
None Instructs the Data Feed Manager that the field is the record
definition and nothing is to be done with the data.
List Instructs the Data Feed Manager to import the data as a value
list. No transformation or calculations are to be applied to the
data.
5. For the remaining source fields, from the Field Type list, select one of the
following field options and complete the associated steps for that field option.
Option Description
Raw Field Data Instructs the Data Feed Manager to accept the data from the
data source "as is." No transformation or calculations are to
be applied to the data.
Static Text Allows you to add an additional field to the data feed, which
adds context to the data. Upon selection of this option, the
Status field for that source field is set to Not Configured and
is displayed for that source field.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Schema Sources
The source for the schema of your data feed depends on which transporter you are
using. The following table identifies and describes the schema sources that are
available for each of the out-of-the-box transporters.
Execute Search Executes the search in the Archer Web Services Transporter
Platform and detects the source
schema from the results.
Sample File Uses a skeleton of your actual Archer Web Services Transporter
source data file. For example, if
Database Query Transporter
you are importing data from a
.csv file, the source data file is a DeepSight Transporter 2.0
.csv file that includes the column DeepSight Transporter 4.0
names from your source data. If
you are importing data from an File Transporter
.XML file, the source data file FTP Transporter
includes the structure of your
HTTP Transporter
.XML without the actual field
values. iDefense Transporter
When you select the sample file, Mail Monitor Transporter
the Source Fields section RSS Transporter
populates with the fields
specified in the sample data file.
Load URL Loads the contents at the target DeepSight Transporter 2.0
URL and detects the source
DeepSight Transporter 4.0
schema from the contents.
HTTP Transporter
CAUTION: Using this option may
iDefense Transporter
trigger actions associated with
accessing the target URL. RSS Transporter
Standard Schema Uses the standard mail schema. Mail Monitor Transporter
Schema Sources
The source for the schema of your data feed depends on which transporter you are
using. The following table identifies and describes the schema sources that are
available for each of the out-of-the-box transporters.
Execute Search Executes the search in the Archer Web Services Transporter
Platform and detects the source
schema from the results.
Sample File Uses a skeleton of your actual Archer Web Services Transporter
source data file. For example, if
Database Query Transporter
you are importing data from a
.csv file, the source data file is a DeepSight Transporter 2.0
.csv file that includes the column DeepSight Transporter 4.0
names from your source data. If
you are importing data from an File Transporter
.XML file, the source data file FTP Transporter
includes the structure of your
HTTP Transporter
.XML without the actual field
values. iDefense Transporter
When you select the sample file, Mail Monitor Transporter
the Source Fields section RSS Transporter
populates with the fields
specified in the sample data file.
Load URL Loads the contents at the target DeepSight Transporter 2.0
URL and detects the source
DeepSight Transporter 4.0
schema from the contents.
HTTP Transporter
CAUTION: Using this option may
iDefense Transporter
trigger actions associated with
accessing the target URL. RSS Transporter
Standard Schema Uses the standard mail schema. Mail Monitor Transporter
Apply a Calculation
Complete this task to apply calculations to source fields to dynamically generate
new values, which can be populated in an application or questionnaire.
The following are examples of common calculations:
l CONCATENATE([TOLastName], ", ", [TOFirstName])
This calculation combines the values of two fields into a single value. For
example, it would take the value “Doe” from the Last Name field and the value
“John” from the First Name field and merge them into the value “Doe, John.”
Calculations for the Data Feed Manager use the same calculation engine and syntax
as the Application Builder feature.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field to which you want to apply a
calculation, select Calculated Field.
4. In the Actions column of that source field, click .
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Destination
Source Data Translation Application
Application
Field Name: State Field Name: State Field Name: State Field Name: State
ID1 ID2
California California CA CA
Texas Texas TX TX
Florida Florida FL FL
Using an application as an intermediary ensures that the data feed converts all of
the external data into the proper format prior to importing it to the destination
application.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field that you want to translate, select
Lookup Translation.
4. In the Actions column of that source field, click .
The Translation Editor dialog box opens.
5. From the Source list, select the source field.
6. From the Application list, select the application that translates the values.
7. From the Exceptions list, select from the following options the function that the
Data Feed Manager should execute when a value generates an exception.
Option Description
Log Warning Writes an error to the log file, and the value is not imported.
No updates are made to the translation application.
Insert Raw Data Inserts the raw value from your source file in the target
application if a match is not found.
Original Value Identifies the field in the translation application that maps to
the value from your external data file.
Translation Value Identifies the field in the translation application that maps to
the proper value in the target application or questionnaire.
Note: The selections from the Original Value and Translation Value lists must
be different, or a warning message is displayed.
8. Click OK.
The translation settings are saved. The Status field for that source field changes
to Configured.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Note: The Data Filter tab is available only for Standard data feed types.
You can combine your data filters through advanced operator logic to provide
additional filters to your data.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Data Filter tab.
3. In the Sources column, select the source name to which you want to apply a
filter.
4. From the Field Name list, select the field name from your data source to which
you want to apply a filter.
5. From the Operator list, select an operator to define which type of filter you
want to apply to the source data.
6. In the Values column, enter a value based on your selection in the Operator
column.
7. To create custom operator logic to form relationships between the individual
filters, enter the custom operator logics in the Advanced operator logic field.
8. Complete any of the following optional tasks:
l To add an additional data filter, click Add New Filter located in the Data
Filter section title bar.
l To remove a data filter, in the Actions column of the filter you want to
remove, click .
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Tokens
Note: The Tokens tab is available only for Standard data feed types.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab, and then click the Tokens tab.
3. (Optional) To add an additional token, click Add New located in the Tokens
title bar and enter the field name.
4. In the Value field of the token that you want to modify, enter the updated value.
When modified, the updated value is used on the next data feed execution, and
the execution updates the value at its completion.
5. (Optional) To delete a token, click in the row of the token that you want to
remove.
6. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Map Data
Data Tokens
The Data Feed Manager allows capturing "tokens" of data from the last execution
of a data feed. A token can be any field of data from the last source row processed.
The following table identifies the fields for which tokens are available.
Field Input
Note: The Data Map tab is available for Standard data feed types.
On the Data Map tab, you can complete the following tasks:
l Map Data
l Define Key Fields
l Set Update and Archive Options
Map Data
Complete this task to map the configured elements from the Source Definition tab to
fields in a Platform target application or questionnaire. The Data Feed Manager
updates the target field with the value from the mapped source field during the data
feed execution.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Field Map tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Field Map tab.
The Source Fields section lists the Source Field names listed on the Source
Data tab.
3. Complete one of the following tasks:
l To have the system analyze the source fields and automatically map them to
application or questionnaire fields, click Auto-Populate.
This option maps fields from the data source to application or questionnaire
fields that have the same name. Auto populate occurs on level 1 fields only.
Additionally, if there is an exact name match between the source field and
the target field, and the field type is one of the following, the field is not auto
populated: External links, Values list, Sub-form, Related records, Cross
reference, or CAST.
l From the Source Fields column, drag your source field and drop it next to the
application or questionnaire field in the Target Fields section.
The mapped field from the data source populates the designated target field.
Note: For target fields that have a field type of cross-reference, sub-form, or
related records, map the fields expanded under these field types. You cannot
directly map to a target field with any of these field types.
4. (Optional) In the Actions column of each mapped field for which you want to
configure additional options, click .
The Field Population dialog box opens with options based on the selected field
type.
5. (Optional) To assign a trust level to your source data for a field that is mapped,
in the Trust Level field, enter a value from "0" to "99."
Note: The Trust Level option is useful when you have multiple data feeds
populating the same target application. By assigning trust levels, the Data Feed
Manager can determine when and when not to overwrite existing data.
The Trust Level option allows you to develop a hierarchy for updates to your
target data by entering the desired trust level for the field. The value 0 is
considered the greatest trust level. The trust level accepts values up to 99,
which is the lowest level of trust.
For example, consider a situation where two data feeds map to the same target
application field. Data Feed A runs first and populates the Case Status field
with the value Open. When Data Feed B runs, the Data Feed Manager
recognizes that Data Feed B has data that maps to the same field. Data Feed
Manager evaluates the trust levels to determine which data is the most trusted.
Since the field from Data Feed B has the greater trust level, its value of Closed
overwrites the data from Data Feed A.
6. Complete any of the following optional tasks:
l To delete a mapping for a single field, click in the Actions column of the
field that you want to remove.
l To remove the mappings for all fields, click Clear Target Field Mappings
located in the Target Fields title bar.
7. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Key Fields
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Key Field Definitions tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Key Field Definitions tab.
The Reference Field section contains the target application or questionnaire and
any mapped cross-reference, related records, CAST, or sub-form fields that
require a key field definition to be created. You can use the Key Field
Definitions section to define the unique key identifiers and the data feed actions
during the feed execution.
3. In the Reference Field section, select the field that requires a key field
definition.
4. In the Key Field Definitions title bar, click Add New Key.
5. In the Field Name field, select a target application or questionnaire field that
uniquely identifies the record.
6. To assign compound unique identifiers for the record, complete the following:
a. In the Actions column, click .
The Select Key Field dialog box opens.
b. From the Available Fields list, select the fields.
c. Click OK.
A new row for each selected field is added, and the order number for the new
rows is assigned the same number.
7. To add unique identifiers in a hierarchical structure for sub-form field types,
click in the Actions column.
A new child row is added to the Key Field Definitions section.
Note: After setting the order of key fields, the Data Feed Manager scans the
data source for matches to the first unique identifier. If no matches are found, it
searches for matches to the second unique identifier, and so on. Once the Data
Feed Manager scans through all of the unique identifiers and does not find a
match, the system creates a new target record.
8. From the Action list, select one of the following matching criteria for the unique
identifier.
Option Description
MatchExact Specifies that the value in the data source field must match the
unique identifier value exactly for the target record to be
updated. If the match is not exact, a new record is created.
For example, if a data source field has a value of "Renee Jones"
and a mapped application field that is specified as a unique
identifier has a value of "Renee Ellen Jones," the system does
not update the target application record because it is not an
exact match.
MatchAny Specifies that the data in the data source must match at least
one condition in the list-based field for the target record to be
updated.
For example, if a target application record has the values Blue
and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes
only the value Blue, the record is updated because at least one
of the values matches.
MatchAll Specifies that the data in the source file must match all of the
conditions in the list-based field for the target record to be
updated.
For example, if the target application record has the values
Blue and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes the
values Blue and Green, the record is updated. However, if the
source data includes only the value Blue, the record is not
updated. A new target application record is created instead
because there is not a complete match.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Set Update and Archive Options
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Update/Archive tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Update/Archive tab.
3. In the Update Options section, select any of the following options.
Option Description
Create Instructs the data feed to create new records for data found in
the source file and not in the target application or
questionnaire.
Option Description
Set Value Instructs the data feed to set a value in a Values List field in a
record whenever the external data file does not contain a
matching record.
You can use this option to have the data feed set a Values List
to a value that identifies this record as Inactive or Not Current.
For example, if you have a Devices application with a record
for a specific laptop, and the external data file does not have a
matching record for that laptop, you can use this option to set
a Values List field in the laptop record to the value Inactive.
When you select this option, you also select the Values List
field in the target application or questionnaire and the value
you want to set in that field.
You cannot set the value in the Values List field of the target
leveled application under the following conditions:
l The Set Value Target Field is a global values list.
l Level 3 or lower in a leveled application.
l You are modifying the data feed configuration.
Note: When running a data feed that updates a values list, you
can view the time that the data feed updated the record in the
Execution History log. The last updated time is not displayed
under Last Updated on the Manage Data Feeds page.
In most scenarios, RSA Archer recommends selecting the Set Value option and
flagging these records with a specific value rather than deleting them. For
example, you can add a field to your application called Status and include the
values Current and Archived. If a data feed cannot find a matching record in the
data source with a system record, the system record could be updated to have a
value of Archived for the Status field.
5. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define a Schedule for the Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Schedule tab is available for both Standard and Transport-Only data feed
types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
Note: To configure your data feed to execute after an existing data feed runs,
select Reference. For example, you can select to have a Threats data feed run
immediately after your Assets data feed is completed. From the Reference Feed
list, select after which existing data feed your feed should execute.
4. (Optional) To override the set data feed execution schedule and immediately
execute your data feed, click Start in the Run Data Feed Now section.
5. Click Save.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Procedure
1. Navigate to the Manage Data Feeds page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
2. In the Manage Data Feed page toolbar, click Add New.
3. Do one of the following:
l To configure new settings for a data feed, select Create a new Data Feed
from scratch.
l To use the settings of an existing data feed as a starting point, select Copy
an existing Data Feed and select the existing data feed from the Existing
Data Feeds list.
4. Click OK.
5. In the Name field, enter the name for the data feed.
The data feed name must be unique.
6. Click Save.
Next Steps
Manage the General Properties of a Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Option Description
Transport Only Locates a specific data file. This file contains additional
instructions for launching subsequent, standard data feeds.
With this data feed type, the data feed only completes the
Transport and Navigation activities. The Source Definition and
Field Mapping activities are not allowed. Processing of the
data feed does not attempt to process the data.
Important: If the data feed is intended to be used as part of a convoy, or you are
troubleshooting the data being pulled, select the Transport Only option. This option
enables you to use a transform to manipulate the data being returned by bringing the
source data in as a flat file and then configure a subsequent XML-based feed that
includes an XSLT file. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input” in
the RSA Archer Web Services API Reference Guide that can be downloaded from
the RSA Archer Community.
Note: This user account must have permissions for creating records and
updating History Logs fields. To avoid potential conflicts with other data
feeds, RSA Archer recommends that you use a different user account for
each data feed. Additionally, if you are going to simultaneously run multiple
data feeds, create a unique name to prevent termination of session tokens.
c. From the Locale list, select the country (language) format of your source
data. Different cultures or countries use different characters when
formatting similar data.
d. In Send Notifications, select whether to have the data feed trigger
notification emails when records are published or updated. If notifications
are not enabled in the selected target application, no notification emails are
sent when the data feed is run.
e. In Data Validation, select whether to have the system not perform data
validations against the selected target application when saving a record.
When this option is selected, validation that is based on field definition and
configuration is bypassed (with some exceptions). This option applies
regardless of whether targeting a questionnaire or application.
The system validates the following items regardless of whether the Data
Validation field is selected:
l Attachment or image field. Validity of the file.
l DateTime field. Minimum and maximum system values.
Note: The required field settings are disregarded if you select to ignore the
rules defined within the target application, however, the unique selection
cannot be ignored.
f. Click Apply.
Note: To avoid potential conflicts with other data feeds, RSA Archer
recommends that you use a different user account for each data feed.
Additionally, if you are going to simultaneously run multiple data feeds,
create a unique name to prevent termination of session tokens.
b. In the Target Path field, enter the path for the separate data file.
c. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you configure
your data feed, the Data Feed Manager validates the information for you. If it is not
valid, an error message is displayed. You can save the data feed and correct the
errors later; however, the data feed does not process until the errors are corrected
and the data feed validates.
Next Steps
To define the appropriate data transporter, select one the following:
l Archer Web Services Transporter
l Database Query Transporter
l File Transporter
l FTP Transporter
l HTTP Transporter
l Mail Monitor Transporter
l RSS Transporter
l Threat Transporter
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Transport tab.
3. From the Transport Method list, select RSS Transporter.
4. In the Transport Configuration section, enter the URL and credentials to
allow the data feed to locate and access the records and retrieve the specified
source data.
5. In the Proxy section, select whether the data feed must pass through a proxy to
access the source data from the following options.
Option Description
No Proxy Indicates that the data feed does not pass through a proxy.
Use System Proxy Indicates that the Data Feed Service runs the feed with the
proxy configuration that is set up in the Control Panel.
Configure Proxy Indicates that the data feed must pass through a proxy.
Continue with providing the parameters for accessing the
proxy.
Option Description
Nothing Does not alter the source file when the data feed successfully
completes and deletes the local copy.
Rename Saves the source file under a new name when the data feed
successfully completes. In Destination File, specify where the
file should be saved and the new name for the file
7. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
l For a standard data feed, determine the navigation method.
l For transport-only data feed, define a schedule for the data feed.
Filename Tokens
Filename tokens are available for post processing when you want to save the source
information and specify a location or name for the file. When you select the
Rename option, you can use tokens to automatically generate unique names for the
files.
The following table describes the usable tokens for renaming data files.
Token Description
DataFileDirectoryName Enables the Data Feed Manager to update the filename with
the directory name, including the drive, of your file.
DataFileExtension Enables the Data Feed Manager to insert the file extension,
such as .csv, in the new filename.
DataFileFullName Enables the Data Feed Manager to insert the fully qualified
filename. This data includes the drive, directory, filename,
and extension of the original file.
For example, if the data file came from the following location,
C:\DataFeed\Source\ESL\processed\ThreatData.csv, filenames that have been
renamed using tokens would have the following output.
Example 1
Output C:\DataFeed\Source\ESL\processed\success\ThreatData_
01.31.2008.csv
Example 2
Output \\DFSRepository\2008\01\ThreatData_success.csv
Option Description
Xml File Iterator Use this option when importing an .XML file. When this
option is selected, the Xml File Definition section becomes
available. For more information on XML formatting
guidelines and samples, see the appendix “XML
Formatting Used in Field Results and Input” in the RSA
Archer Web Services API Reference Guide that can be
downloaded from the RSA Archer Community.
Delimited Text File Use this option to ensure that the Data Feed Manager
Iterator properly analyzes the data in your delimited file. When
this option is selected, the File Definition section becomes
available.
Database Query Iterator Use this option when importing data from a database.
Available and default navigation methods are based on the selected transport
method.
Note: The Navigation tab is available only for Standard data feed types.
FTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
HTTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Note: You must load a transform. A default transform is included with the
installation; however, you can develop your own XSLT if you require additional
data transformation. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input”
in the RSA Archer Web Services API Reference Guide that can be downloaded
from the RSA Archer Community.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Source Data
Note: The Source Data tab is available only for Standard data feed types.
You can select to import the data “as is” into the Platform or execute modifications
and calculations against the data to convert the incoming data into a format that
matches the requirements of the application or questionnaire it is imported into. You
can also use several advanced options, such as lookup translations and calculations,
so you can prepare and modify the data to meet your individual business needs.
Additionally, you can filter data so that only what you want to receive is imported
into the target application or questionnaire. By not defining filters on the Data Filter
tab, you instruct the Data Feed Manager to return all records in the data feed. Or,
using operator logic, you can add filters to include only records meeting certain
criteria in the data feed process.
Finally you can capture tokens of data from the last execution of a data feed that
can be used during the next run to identify which data to retrieve. On the Tokens
tab, you can add, edit, or delete token values in preparation of the next data feed
execution.
On the Source Definition tab, you can complete the following tasks:
l Define the Source Data
l Apply a Calculation
l Perform a Lookup Translation
l Incorporate Static Text
l Define Data Filters
l Define Data Tokens
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
l Ensure that the user account used has access to the content, or you will receive a
schema error when building the source definition. You can also receive a
schema error for the following reasons:
o If your connection string is not correct on the Transport tab.
o The account is unable to login.
o The report is not in the correct format.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. To supply the list of source fields, choose one of the following methods and
complete the tasks.
a. Click Load Fields located in the a. In the Source Name column, enter
Source Field title bar. the name of the first field that you
want to define for your data feed.
b. Depending on the selected transport
method, select how to retrieve the The first line is the record definition.
source schema. b. To continue adding source fields, do
any of the following:
l To add a source field, click Add
New and name the field.
l To add a source field in a
4. In the first line in the Source Fields section, from the Field Type list, select the
appropriate field option for the record definition.
Option Description
None Instructs the Data Feed Manager that the field is the record
definition and nothing is to be done with the data.
List Instructs the Data Feed Manager to import the data as a value
list. No transformation or calculations are to be applied to the
data.
5. For the remaining source fields, from the Field Type list, select one of the
following field options and complete the associated steps for that field option.
Option Description
Raw Field Data Instructs the Data Feed Manager to accept the data from the
data source "as is." No transformation or calculations are to
be applied to the data.
Static Text Allows you to add an additional field to the data feed, which
adds context to the data. Upon selection of this option, the
Status field for that source field is set to Not Configured and
is displayed for that source field.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Schema Sources
The source for the schema of your data feed depends on which transporter you are
using. The following table identifies and describes the schema sources that are
available for each of the out-of-the-box transporters.
Execute Search Executes the search in the Archer Web Services Transporter
Platform and detects the source
schema from the results.
Sample File Uses a skeleton of your actual Archer Web Services Transporter
source data file. For example, if
Database Query Transporter
you are importing data from a
.csv file, the source data file is a DeepSight Transporter 2.0
.csv file that includes the column DeepSight Transporter 4.0
names from your source data. If
you are importing data from an File Transporter
.XML file, the source data file FTP Transporter
includes the structure of your
HTTP Transporter
.XML without the actual field
values. iDefense Transporter
When you select the sample file, Mail Monitor Transporter
the Source Fields section RSS Transporter
populates with the fields
specified in the sample data file.
Load URL Loads the contents at the target DeepSight Transporter 2.0
URL and detects the source
DeepSight Transporter 4.0
schema from the contents.
HTTP Transporter
CAUTION: Using this option may
iDefense Transporter
trigger actions associated with
accessing the target URL. RSS Transporter
Standard Schema Uses the standard mail schema. Mail Monitor Transporter
Apply a Calculation
Complete this task to apply calculations to source fields to dynamically generate
new values, which can be populated in an application or questionnaire.
The following are examples of common calculations:
l CONCATENATE([TOLastName], ", ", [TOFirstName])
This calculation combines the values of two fields into a single value. For
example, it would take the value “Doe” from the Last Name field and the value
“John” from the First Name field and merge them into the value “Doe, John.”
Calculations for the Data Feed Manager use the same calculation engine and syntax
as the Application Builder feature.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field to which you want to apply a
calculation, select Calculated Field.
4. In the Actions column of that source field, click .
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Destination
Source Data Translation Application
Application
Field Name: State Field Name: State Field Name: State Field Name: State
ID1 ID2
California California CA CA
Texas Texas TX TX
Florida Florida FL FL
Using an application as an intermediary ensures that the data feed converts all of
the external data into the proper format prior to importing it to the destination
application.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field that you want to translate, select
Lookup Translation.
4. In the Actions column of that source field, click .
The Translation Editor dialog box opens.
5. From the Source list, select the source field.
6. From the Application list, select the application that translates the values.
7. From the Exceptions list, select from the following options the function that the
Data Feed Manager should execute when a value generates an exception.
Option Description
Log Warning Writes an error to the log file, and the value is not imported.
No updates are made to the translation application.
Insert Raw Data Inserts the raw value from your source file in the target
application if a match is not found.
Original Value Identifies the field in the translation application that maps to
the value from your external data file.
Translation Value Identifies the field in the translation application that maps to
the proper value in the target application or questionnaire.
Note: The selections from the Original Value and Translation Value lists must
be different, or a warning message is displayed.
8. Click OK.
The translation settings are saved. The Status field for that source field changes
to Configured.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Note: The Data Filter tab is available only for Standard data feed types.
You can combine your data filters through advanced operator logic to provide
additional filters to your data.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Data Filter tab.
3. In the Sources column, select the source name to which you want to apply a
filter.
4. From the Field Name list, select the field name from your data source to which
you want to apply a filter.
5. From the Operator list, select an operator to define which type of filter you
want to apply to the source data.
6. In the Values column, enter a value based on your selection in the Operator
column.
7. To create custom operator logic to form relationships between the individual
filters, enter the custom operator logics in the Advanced operator logic field.
8. Complete any of the following optional tasks:
l To add an additional data filter, click Add New Filter located in the Data
Filter section title bar.
l To remove a data filter, in the Actions column of the filter you want to
remove, click .
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Tokens
Note: The Tokens tab is available only for Standard data feed types.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab, and then click the Tokens tab.
3. (Optional) To add an additional token, click Add New located in the Tokens
title bar and enter the field name.
4. In the Value field of the token that you want to modify, enter the updated value.
When modified, the updated value is used on the next data feed execution, and
the execution updates the value at its completion.
5. (Optional) To delete a token, click in the row of the token that you want to
remove.
6. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Map Data
Data Tokens
The Data Feed Manager allows capturing "tokens" of data from the last execution
of a data feed. A token can be any field of data from the last source row processed.
The following table identifies the fields for which tokens are available.
Field Input
Note: The Data Map tab is available for Standard data feed types.
On the Data Map tab, you can complete the following tasks:
l Map Data
l Define Key Fields
l Set Update and Archive Options
Map Data
Complete this task to map the configured elements from the Source Definition tab to
fields in a Platform target application or questionnaire. The Data Feed Manager
updates the target field with the value from the mapped source field during the data
feed execution.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Field Map tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Field Map tab.
The Source Fields section lists the Source Field names listed on the Source
Data tab.
3. Complete one of the following tasks:
l To have the system analyze the source fields and automatically map them to
application or questionnaire fields, click Auto-Populate.
This option maps fields from the data source to application or questionnaire
fields that have the same name. Auto populate occurs on level 1 fields only.
Additionally, if there is an exact name match between the source field and
the target field, and the field type is one of the following, the field is not auto
populated: External links, Values list, Sub-form, Related records, Cross
reference, or CAST.
l From the Source Fields column, drag your source field and drop it next to the
application or questionnaire field in the Target Fields section.
The mapped field from the data source populates the designated target field.
Note: For target fields that have a field type of cross-reference, sub-form, or
related records, map the fields expanded under these field types. You cannot
directly map to a target field with any of these field types.
4. (Optional) In the Actions column of each mapped field for which you want to
configure additional options, click .
The Field Population dialog box opens with options based on the selected field
type.
5. (Optional) To assign a trust level to your source data for a field that is mapped,
in the Trust Level field, enter a value from "0" to "99."
Note: The Trust Level option is useful when you have multiple data feeds
populating the same target application. By assigning trust levels, the Data Feed
Manager can determine when and when not to overwrite existing data.
The Trust Level option allows you to develop a hierarchy for updates to your
target data by entering the desired trust level for the field. The value 0 is
considered the greatest trust level. The trust level accepts values up to 99,
which is the lowest level of trust.
For example, consider a situation where two data feeds map to the same target
application field. Data Feed A runs first and populates the Case Status field
with the value Open. When Data Feed B runs, the Data Feed Manager
recognizes that Data Feed B has data that maps to the same field. Data Feed
Manager evaluates the trust levels to determine which data is the most trusted.
Since the field from Data Feed B has the greater trust level, its value of Closed
overwrites the data from Data Feed A.
6. Complete any of the following optional tasks:
l To delete a mapping for a single field, click in the Actions column of the
field that you want to remove.
l To remove the mappings for all fields, click Clear Target Field Mappings
located in the Target Fields title bar.
7. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Key Fields
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Key Field Definitions tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Key Field Definitions tab.
The Reference Field section contains the target application or questionnaire and
any mapped cross-reference, related records, CAST, or sub-form fields that
require a key field definition to be created. You can use the Key Field
Definitions section to define the unique key identifiers and the data feed actions
during the feed execution.
3. In the Reference Field section, select the field that requires a key field
definition.
4. In the Key Field Definitions title bar, click Add New Key.
5. In the Field Name field, select a target application or questionnaire field that
uniquely identifies the record.
6. To assign compound unique identifiers for the record, complete the following:
a. In the Actions column, click .
The Select Key Field dialog box opens.
b. From the Available Fields list, select the fields.
c. Click OK.
A new row for each selected field is added, and the order number for the new
rows is assigned the same number.
7. To add unique identifiers in a hierarchical structure for sub-form field types,
click in the Actions column.
A new child row is added to the Key Field Definitions section.
Note: After setting the order of key fields, the Data Feed Manager scans the
data source for matches to the first unique identifier. If no matches are found, it
searches for matches to the second unique identifier, and so on. Once the Data
Feed Manager scans through all of the unique identifiers and does not find a
match, the system creates a new target record.
8. From the Action list, select one of the following matching criteria for the unique
identifier.
Option Description
MatchExact Specifies that the value in the data source field must match the
unique identifier value exactly for the target record to be
updated. If the match is not exact, a new record is created.
For example, if a data source field has a value of "Renee Jones"
and a mapped application field that is specified as a unique
identifier has a value of "Renee Ellen Jones," the system does
not update the target application record because it is not an
exact match.
MatchAny Specifies that the data in the data source must match at least
one condition in the list-based field for the target record to be
updated.
For example, if a target application record has the values Blue
and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes
only the value Blue, the record is updated because at least one
of the values matches.
MatchAll Specifies that the data in the source file must match all of the
conditions in the list-based field for the target record to be
updated.
For example, if the target application record has the values
Blue and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes the
values Blue and Green, the record is updated. However, if the
source data includes only the value Blue, the record is not
updated. A new target application record is created instead
because there is not a complete match.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Set Update and Archive Options
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Update/Archive tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Update/Archive tab.
3. In the Update Options section, select any of the following options.
Option Description
Create Instructs the data feed to create new records for data found in
the source file and not in the target application or
questionnaire.
Option Description
Set Value Instructs the data feed to set a value in a Values List field in a
record whenever the external data file does not contain a
matching record.
You can use this option to have the data feed set a Values List
to a value that identifies this record as Inactive or Not Current.
For example, if you have a Devices application with a record
for a specific laptop, and the external data file does not have a
matching record for that laptop, you can use this option to set
a Values List field in the laptop record to the value Inactive.
When you select this option, you also select the Values List
field in the target application or questionnaire and the value
you want to set in that field.
You cannot set the value in the Values List field of the target
leveled application under the following conditions:
l The Set Value Target Field is a global values list.
l Level 3 or lower in a leveled application.
l You are modifying the data feed configuration.
Note: When running a data feed that updates a values list, you
can view the time that the data feed updated the record in the
Execution History log. The last updated time is not displayed
under Last Updated on the Manage Data Feeds page.
In most scenarios, RSA Archer recommends selecting the Set Value option and
flagging these records with a specific value rather than deleting them. For
example, you can add a field to your application called Status and include the
values Current and Archived. If a data feed cannot find a matching record in the
data source with a system record, the system record could be updated to have a
value of Archived for the Status field.
5. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define a Schedule for the Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Schedule tab is available for both Standard and Transport-Only data feed
types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
Note: To configure your data feed to execute after an existing data feed runs,
select Reference. For example, you can select to have a Threats data feed run
immediately after your Assets data feed is completed. From the Reference Feed
list, select after which existing data feed your feed should execute.
4. (Optional) To override the set data feed execution schedule and immediately
execute your data feed, click Start in the Run Data Feed Now section.
5. Click Save.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Note: Data feeds using the DeepSight 2.0 transporter are deprecated by Symantec
and will soon become unusable. From the RSA Archer Exchange, download a copy
of the data feeds that use the DeepSight 4.0 transporters and import them.
Prerequisites
Before you can work with threat feeds in the Platform, verify that you have the
following:
l License to one of the supported threat feed providers, including a user name and
password.
l License to the RSA Archer Threat Management solution master.
l A user account on the Platform with access rights to the Data Feed Manager.
l Access to the RSA Archer Exchange to download the threat feed package file.
For more information, see Integration Exchange.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
When working with threat data feeds, you can perform the following tasks:
1. Import a Data Feed
2. Manage the General Properties of a Data Feed
3. Define a Threat Feed Transporter
4. Define Source Data
5. Define Data Mapping Activities
6. Define a Schedule for the Data Feed
7. Activate a Threat Feed
The following table provides you the information you need when configuring your
threat feed.
Importing the threat feed When you log on to the Import a Data Feed
configuration file Platform to import the threat
feed file, use a user account
(Manage Data Feeds page)
that has full access rights to
the Data Feed Manager.
Setting the feed information Select the user account that Manage the General
is appropriate for your Properties of a Data Feed
(Data Feed Manager page >
threat feed.
General tab)
The imported configuration
file sets the Feed Type to
Standard. Do not make any
changes to this setting.
processing settings.
Configuring the source The imported configuration Define the Source Data
fields file provides the default
source fields. Do not edit or
(Data Feed Manager page >
remove any these fields.
Source Definition tab >
However, you can add new
Source Data tab)
calculated, static text, or
lookup translation fields.
Activating the threat feed Before running a threat Activate a Threat Feed
feed, you need to activate
(Data Feed Manager page)
the threat feed and run a
baseload.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Option Description
Transport Only Locates a specific data file. This file contains additional
instructions for launching subsequent, standard data feeds.
With this data feed type, the data feed only completes the
Transport and Navigation activities. The Source Definition and
Field Mapping activities are not allowed. Processing of the
data feed does not attempt to process the data.
Important: If the data feed is intended to be used as part of a convoy, or you are
troubleshooting the data being pulled, select the Transport Only option. This option
enables you to use a transform to manipulate the data being returned by bringing the
source data in as a flat file and then configure a subsequent XML-based feed that
includes an XSLT file. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input” in
the RSA Archer Web Services API Reference Guide that can be downloaded from
the RSA Archer Community.
Note: This user account must have permissions for creating records and
updating History Logs fields. To avoid potential conflicts with other data
feeds, RSA Archer recommends that you use a different user account for
each data feed. Additionally, if you are going to simultaneously run multiple
data feeds, create a unique name to prevent termination of session tokens.
c. From the Locale list, select the country (language) format of your source
data. Different cultures or countries use different characters when
formatting similar data.
d. In Send Notifications, select whether to have the data feed trigger
notification emails when records are published or updated. If notifications
are not enabled in the selected target application, no notification emails are
sent when the data feed is run.
e. In Data Validation, select whether to have the system not perform data
validations against the selected target application when saving a record.
When this option is selected, validation that is based on field definition and
configuration is bypassed (with some exceptions). This option applies
regardless of whether targeting a questionnaire or application.
The system validates the following items regardless of whether the Data
Validation field is selected:
l Attachment or image field. Validity of the file.
l DateTime field. Minimum and maximum system values.
l Text field. Contains valid HTML.
l Field name. Uniqueness.
Note: The required field settings are disregarded if you select to ignore the
rules defined within the target application, however, the unique selection
cannot be ignored.
f. Click Apply.
Note: To avoid potential conflicts with other data feeds, RSA Archer
recommends that you use a different user account for each data feed.
Additionally, if you are going to simultaneously run multiple data feeds,
create a unique name to prevent termination of session tokens.
b. In the Target Path field, enter the path for the separate data file.
c. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you configure
your data feed, the Data Feed Manager validates the information for you. If it is not
valid, an error message is displayed. You can save the data feed and correct the
errors later; however, the data feed does not process until the errors are corrected
and the data feed validates.
Next Steps
To define the appropriate data transporter, select one the following:
l Archer Web Services Transporter
l Database Query Transporter
l File Transporter
l FTP Transporter
l HTTP Transporter
l Mail Monitor Transporter
l RSS Transporter
l Threat Transporter
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Transport tab.
3. Do not change the Transport Method setting.
4. In Transport Configuration, verify that the appropriate URL is displayed in
the URL field.
5. In the User Name and Password fields, enter the credentials of the account
that will run the threat feed.
Note: For this information, see your license agreement with the threat feed
provider.
6. If a proxy needs to be used to access the remote site, in the Proxy section,
select from the following options whether the data feed must pass through a
proxy to access the source data.
Option Description
No Proxy Indicates that the data feed does not pass through a proxy.
Use System Proxy Indicates that the Data Feed Service runs the feed with the
proxy configuration that is set up in the Control Panel.
Configure Proxy Indicates that the data feed must pass through a proxy.
Continue with providing the parameters for accessing the
proxy.
of the source data when the integration is complete. In On Success, select from
the following options.
Option Description
Nothing Does not alter the source file when the data feed successfully
completes and deletes the local copy.
Rename Saves the source file under a new name when the data feed
successfully completes. In Destination File, specify where the
file should be saved and the new name for the file
Note: If you want to rename all files, use a token, for example, {Now
(MM.dd.yyyy)}.{DataFileName}. Otherwise, only the last file downloaded is
renamed.
8. Click Apply.
Next Steps
Define the Source Data
Activate a Threat Feed
Filename Tokens
Filename tokens are available for post processing when you want to save the source
information and specify a location or name for the file. When you select the
Rename option, you can use tokens to automatically generate unique names for the
files.
The following table describes the usable tokens for renaming data files.
Token Description
DataFileDirectoryName Enables the Data Feed Manager to update the filename with
the directory name, including the drive, of your file.
DataFileExtension Enables the Data Feed Manager to insert the file extension,
such as .csv, in the new filename.
DataFileFullName Enables the Data Feed Manager to insert the fully qualified
filename. This data includes the drive, directory, filename,
and extension of the original file.
For example, if the data file came from the following location,
C:\DataFeed\Source\ESL\processed\ThreatData.csv, filenames that have been
renamed using tokens would have the following output.
Example 1
Output C:\DataFeed\Source\ESL\processed\success\ThreatData_
01.31.2008.csv
Example 2
Output \\DFSRepository\2008\01\ThreatData_success.csv
Option Description
Xml File Iterator Use this option when importing an .XML file. When this
option is selected, the Xml File Definition section becomes
available. For more information on XML formatting
guidelines and samples, see the appendix “XML
Formatting Used in Field Results and Input” in the RSA
Archer Web Services API Reference Guide that can be
downloaded from the RSA Archer Community.
Delimited Text File Use this option to ensure that the Data Feed Manager
Iterator properly analyzes the data in your delimited file. When
this option is selected, the File Definition section becomes
available.
Database Query Iterator Use this option when importing data from a database.
Available and default navigation methods are based on the selected transport
method.
Note: The Navigation tab is available only for Standard data feed types.
FTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
HTTP Transporter Delimited Text File Iterator Delimited Text File Iterator
Xml File Iterator
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Note: You must load a transform. A default transform is included with the
installation; however, you can develop your own XSLT if you require additional
data transformation. For more information on XML formatting guidelines and
samples, see the appendix “XML Formatting Used in Field Results and Input”
in the RSA Archer Web Services API Reference Guide that can be downloaded
from the RSA Archer Community.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Source Data
Note: The Source Data tab is available only for Standard data feed types.
You can select to import the data “as is” into the Platform or execute modifications
and calculations against the data to convert the incoming data into a format that
matches the requirements of the application or questionnaire it is imported into. You
can also use several advanced options, such as lookup translations and calculations,
so you can prepare and modify the data to meet your individual business needs.
Additionally, you can filter data so that only what you want to receive is imported
into the target application or questionnaire. By not defining filters on the Data Filter
tab, you instruct the Data Feed Manager to return all records in the data feed. Or,
using operator logic, you can add filters to include only records meeting certain
criteria in the data feed process.
Finally you can capture tokens of data from the last execution of a data feed that
can be used during the next run to identify which data to retrieve. On the Tokens
tab, you can add, edit, or delete token values in preparation of the next data feed
execution.
On the Source Definition tab, you can complete the following tasks:
l Define the Source Data
l Apply a Calculation
l Perform a Lookup Translation
l Incorporate Static Text
l Define Data Filters
l Define Data Tokens
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
l Ensure that the user account used has access to the content, or you will receive a
schema error when building the source definition. You can also receive a
schema error for the following reasons:
o If your connection string is not correct on the Transport tab.
o The account is unable to login.
o The report is not in the correct format.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. To supply the list of source fields, choose one of the following methods and
complete the tasks.
a. Click Load Fields located in the a. In the Source Name column, enter
Source Field title bar. the name of the first field that you
want to define for your data feed.
b. Depending on the selected transport
method, select how to retrieve the The first line is the record definition.
source schema. b. To continue adding source fields, do
any of the following:
l To add a source field, click Add
New and name the field.
l To add a source field in a
4. In the first line in the Source Fields section, from the Field Type list, select the
appropriate field option for the record definition.
Option Description
None Instructs the Data Feed Manager that the field is the record
definition and nothing is to be done with the data.
List Instructs the Data Feed Manager to import the data as a value
list. No transformation or calculations are to be applied to the
data.
5. For the remaining source fields, from the Field Type list, select one of the
following field options and complete the associated steps for that field option.
Option Description
Raw Field Data Instructs the Data Feed Manager to accept the data from the
data source "as is." No transformation or calculations are to
be applied to the data.
Static Text Allows you to add an additional field to the data feed, which
adds context to the data. Upon selection of this option, the
Status field for that source field is set to Not Configured and
is displayed for that source field.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Schema Sources
The source for the schema of your data feed depends on which transporter you are
using. The following table identifies and describes the schema sources that are
available for each of the out-of-the-box transporters.
Execute Search Executes the search in the Archer Web Services Transporter
Platform and detects the source
schema from the results.
Sample File Uses a skeleton of your actual Archer Web Services Transporter
source data file. For example, if
Database Query Transporter
you are importing data from a
.csv file, the source data file is a DeepSight Transporter 2.0
.csv file that includes the column DeepSight Transporter 4.0
names from your source data. If
you are importing data from an File Transporter
.XML file, the source data file FTP Transporter
includes the structure of your
HTTP Transporter
.XML without the actual field
values. iDefense Transporter
When you select the sample file, Mail Monitor Transporter
the Source Fields section RSS Transporter
populates with the fields
specified in the sample data file.
Load URL Loads the contents at the target DeepSight Transporter 2.0
URL and detects the source
DeepSight Transporter 4.0
schema from the contents.
HTTP Transporter
CAUTION: Using this option may
iDefense Transporter
trigger actions associated with
accessing the target URL. RSS Transporter
Standard Schema Uses the standard mail schema. Mail Monitor Transporter
Apply a Calculation
Complete this task to apply calculations to source fields to dynamically generate
new values, which can be populated in an application or questionnaire.
The following are examples of common calculations:
l CONCATENATE([TOLastName], ", ", [TOFirstName])
This calculation combines the values of two fields into a single value. For
example, it would take the value “Doe” from the Last Name field and the value
“John” from the First Name field and merge them into the value “Doe, John.”
Calculations for the Data Feed Manager use the same calculation engine and syntax
as the Application Builder feature.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field to which you want to apply a
calculation, select Calculated Field.
4. In the Actions column of that source field, click .
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Operators
The Formula Builder also offers a library of operators divided into categories. By
clicking a category, you can see the operators that it contains along with a
description of each operator.
Arithmetic:
Operator Description
+ Addition (3 + 3)
- Subtraction (5 - 2)
Negation (-4)
* Multiplication (2 * 3)
/ Division (3 / 2)
^ Exponentiation (3 ^ 2)
Comparison:
Operator Description
= Equal to (3 = 3)
Text Concatenation:
Operator Description
In this formula, the Sample Field is not populated with the value "0" if the field is
empty or null. Instead, this formula returns FALSE when the Sample Field is empty
or null.
Destination
Source Data Translation Application
Application
Field Name: State Field Name: State Field Name: State Field Name: State
ID1 ID2
California California CA CA
Texas Texas TX TX
Florida Florida FL FL
Using an application as an intermediary ensures that the data feed converts all of
the external data into the proper format prior to importing it to the destination
application.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field that you want to translate, select
Lookup Translation.
4. In the Actions column of that source field, click .
The Translation Editor dialog box opens.
5. From the Source list, select the source field.
6. From the Application list, select the application that translates the values.
7. From the Exceptions list, select from the following options the function that the
Data Feed Manager should execute when a value generates an exception.
Option Description
Log Warning Writes an error to the log file, and the value is not imported.
No updates are made to the translation application.
Insert Raw Data Inserts the raw value from your source file in the target
application if a match is not found.
Original Value Identifies the field in the translation application that maps to
the value from your external data file.
Translation Value Identifies the field in the translation application that maps to
the proper value in the target application or questionnaire.
Note: The selections from the Original Value and Translation Value lists must
be different, or a warning message is displayed.
8. Click OK.
The translation settings are saved. The Status field for that source field changes
to Configured.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Source Data tab is available only for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab and then click the Source Data tab.
3. From the Field Type list of the source field where you want to insert static text,
select Static Text.
4. In the Actions column of that source field, click .
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Filters
Note: The Data Filter tab is available only for Standard data feed types.
You can combine your data filters through advanced operator logic to provide
additional filters to your data.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Data Tokens
Important: Custom operator logic must validate before you can save or apply
changes to your data filter. If your custom operator logic does not validate, you are
prompted with an "Invalid Operator Logic" error message.
Examples
Single operator. Suppose you are importing assets from an external source into the
Assets application. You want to import assets from your external file only if they
are labeled as being in a production environment or if they are customer impacting.
To set up this process, you define data filters to evaluate both the System
Environment and Security Class elements in your external data file for the desired
values. Without using operator logic, your conditions are related with the AND
operator, and the data feed imports items that are both in a production environment
AND have a high security class. By using operator logic with the OR operator, you
achieve the desired result: Assets that are in a production environment OR have a
high security class are imported into the Assets application.
Based on the above criteria, the following table details the result of the operator
logic.
(1) System
(2) Security Class (3) Manufacturer Result
Environment
The system evaluates the parenthetical expression first. In the last example in the
previous table, since neither 1 or 2 evaluate to "TRUE," the entire condition fails
even if 3 evaluates to "TRUE".
Multiple operators with nested parenthetical expressions. You also can use
nested parenthetical expressions in your operator logic. Nested parenthetical
expressions allow you to combine the results of two separate logical conditions,
thereby creating an additional logical condition, as shown in the following example.
Based on the above criteria, the following table details the result of the operator
logic.
(1)
(3)
System (2) Security (4) Operating (5) Server
Manufactu Result
Environm Class System Room
rer
ent
The Data Feed Manager evaluates the nested parenthetical expressions first. In the
last example in the previous table, since neither 3 or 4 evaluate to "TRUE" in the
nested parenthetical expression, the primary parenthetical expression evaluates to
"FALSE," and thus the entire logical condition fails and the data is not imported,
even though all of the other conditions are met.
Tokens only store a single value for a source field that has been configured on the
Source Data tab. The list of tokens is based on these fields, as well as the
LastRunTime and LastFileName attributes of a previous data feed execution. If a
source field is not selected as a token, token data for that field is not stored.
Note: The Tokens tab is available only for Standard data feed types.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Source Definition tab, and then click the Tokens tab.
3. (Optional) To add an additional token, click Add New located in the Tokens
title bar and enter the field name.
4. In the Value field of the token that you want to modify, enter the updated value.
When modified, the updated value is used on the next data feed execution, and
the execution updates the value at its completion.
5. (Optional) To delete a token, click in the row of the token that you want to
remove.
6. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Map Data
Data Tokens
The Data Feed Manager allows capturing "tokens" of data from the last execution
of a data feed. A token can be any field of data from the last source row processed.
The following table identifies the fields for which tokens are available.
Field Input
To direct the Data Feed Manager to the correct destination for the data it will
import, use the options on the Data Map tab to configure the field mappings for your
data feed.
Note: The Data Map tab is available for Standard data feed types.
On the Data Map tab, you can complete the following tasks:
l Map Data
l Define Key Fields
l Set Update and Archive Options
Map Data
Complete this task to map the configured elements from the Source Definition tab to
fields in a Platform target application or questionnaire. The Data Feed Manager
updates the target field with the value from the mapped source field during the data
feed execution.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Field Map tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Field Map tab.
The Source Fields section lists the Source Field names listed on the Source
Data tab.
3. Complete one of the following tasks:
l To have the system analyze the source fields and automatically map them to
application or questionnaire fields, click Auto-Populate.
This option maps fields from the data source to application or questionnaire
fields that have the same name. Auto populate occurs on level 1 fields only.
Additionally, if there is an exact name match between the source field and
the target field, and the field type is one of the following, the field is not auto
populated: External links, Values list, Sub-form, Related records, Cross
reference, or CAST.
l From the Source Fields column, drag your source field and drop it next to the
application or questionnaire field in the Target Fields section.
The mapped field from the data source populates the designated target field.
Note: For target fields that have a field type of cross-reference, sub-form, or
related records, map the fields expanded under these field types. You cannot
directly map to a target field with any of these field types.
4. (Optional) In the Actions column of each mapped field for which you want to
configure additional options, click .
The Field Population dialog box opens with options based on the selected field
type.
5. (Optional) To assign a trust level to your source data for a field that is mapped,
in the Trust Level field, enter a value from "0" to "99."
Note: The Trust Level option is useful when you have multiple data feeds
populating the same target application. By assigning trust levels, the Data Feed
Manager can determine when and when not to overwrite existing data.
The Trust Level option allows you to develop a hierarchy for updates to your
target data by entering the desired trust level for the field. The value 0 is
considered the greatest trust level. The trust level accepts values up to 99,
which is the lowest level of trust.
For example, consider a situation where two data feeds map to the same target
application field. Data Feed A runs first and populates the Case Status field
with the value Open. When Data Feed B runs, the Data Feed Manager
recognizes that Data Feed B has data that maps to the same field. Data Feed
Manager evaluates the trust levels to determine which data is the most trusted.
Since the field from Data Feed B has the greater trust level, its value of Closed
overwrites the data from Data Feed A.
6. Complete any of the following optional tasks:
l To delete a mapping for a single field, click in the Actions column of the
field that you want to remove.
l To remove the mappings for all fields, click Clear Target Field Mappings
located in the Target Fields title bar.
7. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define Key Fields
Option Description
Add Unknown Specifies that values from your data source that do
not appear in your target's list-based fields are to be
added. This option is available only for external link
and values list field types.
Append data to list-based field Specifies that additional values are to be added to
the target application record's existing values in list-
based field types.
Replace data in list-based field Specifies that the values in a list-based field type of
a target application or questionnaire record are
replaced with the values from the mapped data
source list.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Key Field Definitions tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Key Field Definitions tab.
The Reference Field section contains the target application or questionnaire and
any mapped cross-reference, related records, CAST, or sub-form fields that
require a key field definition to be created. You can use the Key Field
Definitions section to define the unique key identifiers and the data feed actions
during the feed execution.
3. In the Reference Field section, select the field that requires a key field
definition.
4. In the Key Field Definitions title bar, click Add New Key.
5. In the Field Name field, select a target application or questionnaire field that
uniquely identifies the record.
6. To assign compound unique identifiers for the record, complete the following:
a. In the Actions column, click .
The Select Key Field dialog box opens.
b. From the Available Fields list, select the fields.
c. Click OK.
A new row for each selected field is added, and the order number for the new
rows is assigned the same number.
7. To add unique identifiers in a hierarchical structure for sub-form field types,
click in the Actions column.
A new child row is added to the Key Field Definitions section.
Note: After setting the order of key fields, the Data Feed Manager scans the
data source for matches to the first unique identifier. If no matches are found, it
searches for matches to the second unique identifier, and so on. Once the Data
Feed Manager scans through all of the unique identifiers and does not find a
match, the system creates a new target record.
8. From the Action list, select one of the following matching criteria for the unique
identifier.
Option Description
MatchExact Specifies that the value in the data source field must match the
unique identifier value exactly for the target record to be
updated. If the match is not exact, a new record is created.
For example, if a data source field has a value of "Renee Jones"
and a mapped application field that is specified as a unique
identifier has a value of "Renee Ellen Jones," the system does
not update the target application record because it is not an
exact match.
MatchAny Specifies that the data in the data source must match at least
one condition in the list-based field for the target record to be
updated.
For example, if a target application record has the values Blue
and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes
only the value Blue, the record is updated because at least one
of the values matches.
MatchAll Specifies that the data in the source file must match all of the
conditions in the list-based field for the target record to be
updated.
For example, if the target application record has the values
Blue and Green selected in the field specified as the unique
identifier, and the mapped field in the source data includes the
values Blue and Green, the record is updated. However, if the
source data includes only the value Blue, the record is not
updated. A new target application record is created instead
because there is not a complete match.
9. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Set Update and Archive Options
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Update/Archive tab is available for Standard data feed types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. Click the Data Map tab and then click the Update/Archive tab.
3. In the Update Options section, select any of the following options.
Option Description
Create Instructs the data feed to create new records for data found in
the source file and not in the target application or
questionnaire.
Option Description
Set Value Instructs the data feed to set a value in a Values List field in a
record whenever the external data file does not contain a
matching record.
You can use this option to have the data feed set a Values List
to a value that identifies this record as Inactive or Not Current.
For example, if you have a Devices application with a record
for a specific laptop, and the external data file does not have a
matching record for that laptop, you can use this option to set
a Values List field in the laptop record to the value Inactive.
When you select this option, you also select the Values List
field in the target application or questionnaire and the value
you want to set in that field.
You cannot set the value in the Values List field of the target
leveled application under the following conditions:
l The Set Value Target Field is a global values list.
l Level 3 or lower in a leveled application.
l You are modifying the data feed configuration.
Note: When running a data feed that updates a values list, you
can view the time that the data feed updated the record in the
Execution History log. The last updated time is not displayed
under Last Updated on the Manage Data Feeds page.
In most scenarios, RSA Archer recommends selecting the Set Value option and
flagging these records with a specific value rather than deleting them. For
example, you can add a field to your application called Status and include the
values Current and Archived. If a data feed cannot find a matching record in the
data source with a system record, the system record could be updated to have a
value of Archived for the Status field.
5. Click Apply.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Next Steps
Define a Schedule for the Data Feed
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Note: The Schedule tab is available for both Standard and Transport-Only data feed
types.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
Note: To configure your data feed to execute after an existing data feed runs,
select Reference. For example, you can select to have a Threats data feed run
immediately after your Assets data feed is completed. From the Reference Feed
list, select after which existing data feed your feed should execute.
4. (Optional) To override the set data feed execution schedule and immediately
execute your data feed, click Start in the Run Data Feed Now section.
5. Click Save.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Important: Only one version of the DeepSight transporter can be active at a time. If
you try to activate a threat feed that uses one of the two DeepSight transporters, and
another threat feed that uses the other DeepSight transporter is already active, a
warning message is displayed. To continue activating this threat feed, set the Status
for the other DeepSight threat feed to Inactive.
Procedure
1. Select the data feed that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed or click in the Actions column.
2. From the Status list, verify that Active is selected.
3. Click the Schedule tab.
4. In the Immediate Processing section, click Start.
If this is the first time that you run the threat feed, the baseload begins. The
Run Data Feed Now field displays the status.
5. In the Recurrences section, verify that the schedule settings are appropriate for
subsequent runs.
6. Click Save.
Note: You can exit the Data Feed Manager page while the baseload is running.
Important: When you configure an iDefense or DeepSight threat data feed, you
need to set specific parameters to properly connect the threat feed with your
instance of the Platform. For information on these required settings, see Threat
Feed Configuration.
Procedure
1. Navigate to the Manage Data Feeds page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
2. Click Import on the Manage Data Feeds toolbar.
3. In the Open dialog box, click the configuration file and select its Platform
version number.
4. Click Open.
The selected data feed configuration file is displayed in the Manage Data Feeds
page.
Note: The Schedule tab is available for both Standard and Transport-Only data feed
types.
Procedure
1. Select the data feed that you want to run:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed.
2. Click the Schedule tab.
3. Click Start in the Run Data Feed Now section.
Important: For a data feed to run, it must be both active and valid. As you
configure your data feed, the Data Feed Manager validates the information for
you. If it is not valid, an error message is displayed. You can save the data feed
and correct the errors later; however, the data feed does not process until the
errors are corrected and the data feed validates.
Note: The Schedule tab is available for both Standard and Transport-Only data feed
types.
Procedure
1. Select the data feed for which you want to view the data feed details:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
c. In the Name column, click the data feed.
2. Click the Schedule tab.
3. Click Run Detail.
The Run Detail dialog box opens. This dialog box has the Statistics and
Messages tabs. The Statistics tab shows the entity, rows processed, status, and
start date and time. The Messages tab shows the job activity, type, and date and
time of the activity.
4. Click OK to close the dialog box.
Procedure
1. Navigate to the Manage Data Feeds page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration > Manage Data Feeds.
2. Locate the data feed for which you want to view the Execution History.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Data Imports
Contents
Preface 5
About this Guide 5
File Formats 5
Preparing for a Data Import 5
Product Documentation 6
Support and Service 6
Chapter 1: Data Imports 9
Data Import Preparation 9
File Formats for Data Imports 10
Importing Data Into Leveled Applications 10
Field Types for Data Imports 12
Field Types for Sub-Form Data Input 12
Unsupported Field Types 12
Data Requirements and Import Results 13
Using Excel as a .CSV Editor 15
Enable End Users to Perform Data Imports 16
Chapter 2: Data Import Wizard 17
Using the Data Import Wizard 17
Access the Data Import Wizard 17
Select the Data File and Import Options 18
Select Unique Record Identifiers 20
Unique Identifiers 21
Map Import Data to Application Fields 22
Review Data Import Wizard Settings 23
Initiate Data Validation and Import 23
Data Validation Errors 24
Chapter 3: Reports 31
Review Job Queues 31
3
RSA Archer GRC Platform Data Imports
Preface
File Formats
Your import file must be a flat, delimited-values data file. A flat file contains all
data in a single table and does not include any hierarchical structure. In a delimited-
values file, each row is equal to one record, and field values are separated in each
record by a comma, tab, or some other designated character. For more information
on the proper file format for data imports, see File Formats for Data Imports.
Preface 5
RSA Archer GRC Platform Data Imports
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
6 Preface
RSA Archer GRC Platform Data Imports
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 7
RSA Archer GRC Platform Data Imports
Important: If you are importing data that uses a double-byte character set, such as
Japanese, the alias of each field must be set to a single-byte character set, such as
English. To do this, open the Manage Field page for each field and rename the
Alias field using single-byte characters.
Consider the following points as you examine your import file and the application
into which you are importing data:
l Your file must be a delimited-values data file, and because the Data Import
Wizard requires you to specify the primary and secondary delimiters used in your
data file, it is important to know what these characters are before you begin the
data import.
l Importing data into an application copies data from an import file into existing
application, questionnaire, or sub-form fields. It does not create any new fields.
Therefore, your application must contain all necessary fields before you begin
the import process. If you import sub-form records, the application to which you
import must contain a Sub-Form field. This Sub-Form field must reference a sub-
form that contains the appropriate fields.
l Mapping fields from your external data file to fields in your application is much
easier if the corresponding fields have the same name. The system automatically
maps import fields to application fields when they have the same name, which
can save you a lot of time in manually mapping fields.
l If you map a field from your external data file to a required field, each record in
your data file must include a value for this required field.
l If your import file contains date or date-time values, you are asked to specify the
format used for these values. Your import file must use a consistent format for
date and time values, and you should know what these formats are before you
begin the Data Import Wizard. Also, if your import file contains date-time
values, note the separator (hyphen, period, comma, space, or so on) that is used
between the date and time values and between the time and the AM/PM
designation.
l When importing data into a leveled application, you must import each level's data
separately, starting with the top data level. Each level must be imported from a
separate external data file.
l When importing data into an application that contains a sub-form, you must
import application records and sub-form entries separately. You need one
external data file for your application records and another for your sub-form
entries. The sub-form data file must contain unique field values from the
application records, such as Tracking ID values, so the sub-form entries can be
appropriately mapped to the application records where they will reside.
1. Execute a search in your leveled application and select only level-1 fields for
display in the search results (using column format). Export those results.
2. Re-execute your search and select level-2 fields for display in your search
results. Also select a field from the first data level to include in your search
results that associates your level-2 records with your level-1 records (The
values for that level-1 field must be unique for each record.). Export those
records.
3. Repeat step 2 for each subsequent data level and include only an individual
level's fields along with a parent-level field in each search and export process.
Note that the parent level is the data level that directly precedes each child
level. For example, the third data level's parent level is the second data level.
Note: If you try to import each level by selecting specific columns of data to import
from a single master file, you have duplicate upper-level records and/or your lower-
level records are not associated with their parent records. You must use a separate
file for each level's data import.
Example
The following steps explain the process for importing data into a three-level
application:
1. Perform a new import or an import update of the level-1 field data.
2. Perform a new import or an import update of the level-2 field data. Your import
file must contain the level-2 field values along with unique values for a field in
level 1 of the application, such as the Tracking ID field. When you are mapping
values from your external data file to fields in your application in step 3 of the
Data Import Wizard, you map the level-2 data to the appropriate level-2 fields,
and you map the level-1 values to the appropriate level-1 field. This action
creates the association between level-1 and level-2 records.
3. Perform a new import or an import update of the level-3 field data. Your import
file must contain the level-3 field values along with unique values for a field in
level 2 of the application, such as the Tracking ID field. When you are mapping
values from your external data file to fields in your application in step 3 of the
Data Import Wizard, you map the level-3 data to the appropriate level-3 fields,
and you map the level-2 values to the appropriate level-2 field. This action
creates the association between level-2 and level-3 records.
Cross Application CAST values can be specified only during an import update.
Status Tracking (CAST) If you are adding additional field values rather than updating
existing values with your data import, this field is not
available in the Application Fields drop-down list on the
second page of the Data Import Wizard. CAST values are
specified in the target/child application. Because a CAST
value is specific to two different records, you must include
unique identifiers for both the parent and the child record.
Example
To update the Implementation Status of two vulnerabilities
on 10 assets, you need 20 rows of data. You need the asset
identifier, for example, IP Address or Asset Name, the
vulnerability identifier, for example, BugTraq ID, and a status
value, for example, Implemented.
Cross-Reference The values that you import into a Cross-Reference field must
be key-field values for the related application. If you import
values that are not key-field values for the related
application, the data importer cannot link records in the
import application to records in the cross-referenced
application.
Matrix When importing data into this field type, you must specify
the column name and corresponding row value for each
column in the Matrix field. Column names are separated from
row values with a comma, and a semicolon is used to
separate column and row pairs.
The following is an example of an import value for a Matrix
field:
Maintenance Burden, Low; Portability, Medium; Power
Consumption, High
In this example, "Maintenance Burden," "Portability," and
"Power Consumption" are column names, and "Low,"
"Medium," and "High" are the corresponding row values.
Numeric If the application with which you are working has a ranged
Numeric field, and you import values that are outside of the
field's defined ranges, records with these values are not
returned when users execute advanced searches in the
application using numeric-range filters.
Also, if you import numeric values that exceed your Numeric
field's maximum number of decimal places, the values are
rounded off to meet the field's requirements. If you import
values with fewer decimal places than the minimum number
of decimal places allowed in the Numeric field, these values
are padded with zeros, for example, 4.22000.
In addition, if you import values that are above or below the
Numeric field's minimum and maximum values, an error is
reported.
Record Permissions If you import an empty value into a Record Permissions field,
the field is empty in the new or updated record, even if the
field is configured with one or more default values. When no
value is selected in the Record Permissions field, the only
users who have access to the record are those who are
assigned the System Administrator access role, and those who
are assigned as owners of the application.
import.
User/Groups List Users are identified using following format: last_name, first_
name middle_name. Groups are identified by their name. If
there is more than one user or group with the same value
(name), the first one (based on the system ID) is used.
Multiple values are separated with the secondary delimiter
specified on the first page of the Data Import Wizard.
If you try to import a user or group that is not a valid
selection among the User/Groups List field values list, an
error is reported.
If you import an empty value into the User/Groups List field,
the field is empty in the new or updated record, even if the
field is configured with one or more default values.
Values List If you import a value into a Values List field that is not
included in the field's values list, the value is added to the
values list. If the values list is global, the imported value is
displayed in the global values list for all fields configured to
use it.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Note: You can also access the Data Import Wizard from the Navigation Menu of an
application, if your account has been granted appropriate privileges. If the
application contains levels or sub-forms, you are prompted to select the level or
sub-form before the Wizard starts.
Procedure
1. Navigate to the Manage Data Imports page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration.
A menu of Integration pages is displayed.
Next Steps
Select the Data File and Import Options
Procedure
1. Click Browse to select the source file for the data that you want to import. The
file that you select must be a flat, delimited-values file. Additionally, verify that
the source file is closed.
Note: If you make changes to the source file after you have uploaded it to the
Data Import Wizard, you must return to this step and upload the file again
before initiating the data validation and import process.
2. In the Format Options section, select the characters that your data file uses as
its Field and Values Delimiters. If your data file's field delimiter is something
other than a comma or a tab, enter the correct character in the Other field.
Likewise, if your Values Delimiter is something other than a semicolon or pipe
(|), enter the correct character in the Other field.
3. In the Locale field, select the locale of the input file.
4. If the first row of data in your file contains field names instead of actual record
data, select File Contains Header Row in the Header Row field. If the first
row of data in your file contains actual record data, select File Does Not
Contain Header Row in the Header Row field.
5. In the HTML Formatting field, indicate whether fields in your data file contain
HTML formatting.
6. In the Advanced Options section, make selection for the following fields:
l Are any field values quoted in your data file? If the answer is yes, select
the double or single quotes option.
l Should imported records be allowed to trigger notifications? If
notifications are enabled for the application into which you are importing
data, you can select to send notifications for your imported records.
Important: Consider this option carefully. If you are importing a large
number of records, triggering a notification email for each of these records
could produce a heavy load on the email accounts of users who are
subscribed to a notification template for the application.
Note: Be certain that you have selected the source file (see step 1) so that you
can advance to the next page of the Data Import Wizard.
Next Steps
Select Unique Record Identifiers
Note: The Tracking ID field can only be used as a unique identifier if configured as
System ID. If configured as Application ID, it is not available for use as a unique
identifier.
By establishing a unique identifier, the Data Import Wizard maps import data to
existing data in the application. If you are updating application records with your
data import, the unique identifier matches records in your import file with existing
records in the application. If you are importing data into a sub-form, the unique
identifier correctly matches your sub-form entries to their parent application
records.
The steps for selecting unique record identifiers vary depending on the type of data
import you are performing.
Procedure
1. On page 2 of the Data Import Wizard, in the General Information section,
select one of the following options:
l Import New Records. If you are importing new records, existing records in
your application remain unchanged. The new records are added to the
existing population of records in the application.
l Update Existing Records. If you are updating existing records, the system
examines your existing records and, when it finds a match between a record
in your application and a record in your external data file, the existing record
is updated with the imported record. If your external data file contains
records that do not match any records in your application (according to the
unique record identifier that you specify), those unmatched records are added
as new records in your application.
2. If you are updating existing records with your data import, do the following:
Next Steps
Map Import Data to Application Fields
Unique Identifiers
A unique identifier is a field, or a combination of fields, whose values in individual
records are different from all other records, thereby uniquely identifying the record.
By establishing a unique identifier, you instruct the Data Feed Manager on how to
update existing data in the application or questionnaire from the matching source
data. If no match is found, the Data Feed Manager creates a new target application
or questionnaire record. For example, you can select an IP Address field in a record
to be your unique identifier. If a data source record has a matching value for the
target application field, the source record data updates the target application record
data. If no match is found, the data feed creates a new application record.
Note: Matching logic includes text formatting when matching the key fields in the
data feed source to a record in the Platform database. When a data feed has two
records with the same text, but with different formatting tags, the records are
distinguished as separate records.
Fields that act as unique identifiers for your data feed do not have to be the same as
the key fields for your target applications or questionnaires. The following table
lists the field types from a target application or questionnaire that can be selected as
unique identifiers.
Note: The Tracking ID field can only be used as a key field if configured as System
ID. If configured as Application ID, it is not available for use as a key field.
Procedure
1. For each field in the Import Fields row, select the corresponding field in the
Application Fields row from the lists. This allows you to map data from your
import file to the appropriate fields in your application or sub-form. If you do not
want to import one or more columns of data from your import file, select Do Not
Import from the list in those columns.
Note: If you are updating existing records or importing sub-form entries, you
must map the field that you selected as a unique identifier to the appropriate
field in the field mapping grid. Otherwise, an error message is displayed. For
more information on unique identifiers, see Select Unique Record Identifiers.
Additionally, import values for a Cross-Reference field must be key field values
for the cross-referenced application. If the values are not key field values, the
importer cannot link the records.
2. If you have mapped a Date field in the import file to a Date field in the
application, specify the format for date and time values in the import file.
The format for these values in the import file must be consistent. The examples
to the right of the date and time drop-down lists update according to the
selections that you make, enabling you to verify your choices.
3. Click Next.
Next Steps
Review Data Import Wizard Settings
Procedure
1. On page 3 of the Data Import Wizard, review the data import settings.
2. To change any of the settings, click Previous to return to the appropriate Data
Import Wizard page.
For more information on a particular page, see the Help content for that page.
Next Steps
Initiate Data Validation and Import
Procedure
1. When you are satisfied with the Data Import Wizard settings, click Import to
initiate the validation and import of your data.
Once you click Import, the system begins a three-stage import process:
l Validating Records
l Building the Import File
l Importing/Updating Records
In the Validating Records stage, each record in your data file is examined for
errors. If you click Cancel during the Validating Records stage, your data
import is aborted. When the Validating Records stage completes, the Data
Import Wizard reports any errors that are found, up to the first 100 errors. If
errors are found, the import process terminates, and you must correct these
errors before attempting to import the records again.
2. If necessary, correct errors, and begin the import process again (starting on the
first page of the Data Import Wizard).
For more information on correcting errors, see Data Validation Errors.
If no errors are found in the Validating Records stage, the system continues
with the Building the Import File stage, where your import file is built record by
record. During this stage, you can abort the import by clicking Cancel.
Important: You must not close this window or log off from the system during
this stage of the import process. Doing so causes adverse results.
Note: Invalid HTML or XML characters in the external data file are stripped
from the data during the import process to prevent import errors.
The following table describes errors that can occur during the data validation
process and provides possible resolutions.
All unique identifiers must be If you are importing new sub-form records, you must
mapped for insert map the fields that you selected to serve as the applic-
ation's unique identifier to those fields in the field
mapping grid.
All unique identifiers must be If you are updating existing master or sub-form
mapped for update records, you must map the field that you selected to
serve as the application's unique identifier to that
field in the field mapping grid.
All unique identifiers must be If you are updating existing master or sub-form
mapped for update records, you must map the field that you selected to
serve as the application's unique identifier to that
field in the field mapping grid.
Column mismatch Your external data file contains a value that does not
match the data type of the field to which the value is
mapped. For example, the value might be a text string
while the field you are attempting to import the value
into only accepts date values. To resolve this
problem, change the value in your data file to match
the data type required by the field to which you are
mapping the value.
Could not locate group name This error can occur if your external data file contains
a group value that is not a group value established in
the system. To resolve this problem, either change the
group value in your data file so that it matches a
group in the system, or add the group from your data
file to the system from the Manage Groups page in
the Access Control feature.
Date does not match Your external data file contains a date that
expected format does not match the date format that you
specified for the import. To resolve this
problem, reformat the date value so that it
matches the format that you selected in the
Data Import Wizard.
Field is required Your external data file is missing one or more values
for a required field. You can resolve this problem by
entering the required values in your import file or by
changing the field in your application so it is no
longer a required field.
Imported subform record cannot This error can occur if you are importing sub-form
have multiple parents data, and the field from the parent record that you
selected as the unique identifier contains non-unique
data. To resolve this problem, select a unique field
value from the parent record to serve as the applic-
ation's unique record identifier.
Invalid key(s) for cross applic- This error can occur if you are updating records with
ation status field for application a Cross-Application Status Tracking (CAST) field and
do not specify valid, unique identifiers for the parent-
application and child-application records associated
with the CAST field. To resolve this problem, see the
Cross-Application Status Tracking (CAST) entry in
Field Types for Data Imports.
Invalid matrix format Your external data file contains a value for
a Matrix field that is not formatted correctly.
To resolve this problem, reformat the value
according to the guidelines in the Matrix
entry in Field Types for Data Imports.
Invalid number This error can occur if you are importing a value into
a Numeric field that contains alphabetic characters.
To resolve this problem, change the value in your
external data file so it contains only numeric char-
acters.
Multiple columns are mapped This error can occur if more than one field from your
to the same field data import file is mapped to the same application
field. If you are performing a sub-form data import, a
field from your data import file may be mapped to the
same field as the parent record. To resolve this prob-
lem, make sure that your application fields are
mapped to different fields and that the import data
fields are mapped to the sub-form fields.
Number is larger than This error can occur if you are importing a
maximum value value into a Numeric field that is above the
maximum value allowed for the field. To
correct this problem, examine the Numeric
field in your application to determine the
maximum value it allow and change the
value in your data file, so it falls at or
below that maximum value.
Number is smaller than min- This error can occur if you are importing a value into
imum value a Numeric field that is below the minimum value
allowed for the field. To correct this problem, exam-
ine the Numeric field in your application to determine
the minimum value it allows and change the value in
your data file, so it falls at or above that minimum
value.
Too many cross ref- This error can occur if a record in your external data
erences selected file contains more values for a Cross-Reference field
than the maximum number of value selections that
Unsupported import type This error can occur if you are importing new records
and attempt to import data into a Tracking ID field.
To resolve this problem, select Do Not Import from
the list for the Tracking ID field in the field mapping
grid.
Unsupported link type This error can occur if you are updating records with
your data import and you select a field type for the
key field that cannot serve as the key field for a
record. Examples of field types that cannot serve as
the key field for a record include:
l First Published Date
l Last Updated Date
l Record Status
l Related Records
Chapter 3: Reports
Procedure
1. Navigate to the Review Job Queues page:
a. Click the Administration workspace. a. From the menu strip in the top
frame, click Preferences.
b. In the Navigation Menu, click
Integration > Review Job Queues. b. From the User Preferences menu,
click View Your Data Import
History.
The Review Job Queues page is displayed, which lists current status of data
imports for the Platform.
2. Locate the data import that you want to view.
3. Click to display the Run Detail dialog box for that data import.
This page contains application-specific data regarding the last run of the data
feed.
Chapter 3: Reports 31
RSA Archer GRC Platform 5.4
Data Publications
June 2013
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm.
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and EMC are either registered trademarks or trademarks of EMC
Corporation ("EMC") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This
software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Data Publications
Contents
Preface 5
About this Guide 5
Data Publication Process 5
Supported Field Types 5
Product Documentation 6
Support and Service 7
Chapter 1: Data Publications 9
Create a New Data Publication 9
Manage the General Properties of a Data Publication 9
Define the Connection Parameters 10
Define a Schedule for the Data Publication 11
View Data Publication History 12
Clear Job History 13
3
RSA Archer GRC Platform Data Publications
Preface
Preface 5
RSA Archer GRC Platform Data Publications
l Record Status
l First Published Date
l Last Updated Date
l Cross-Reference/Related Records (Upon publication, reference field values
display a link to the table containing the sub-form data.)
l Sub-Form (Upon publication, sub-form field values display a link to the table
containing the sub-form data.)
l Record Permissions
l User/Groups List
Note: Calculated fields publish the current value of the field, not the calculation
formula.
You can perform the following tasks using the Data Publication Manager:
l Create a New Data Publication
l Manage the General Properties of a Data Publication
l Define the Connection Parameters
l Define a Schedule for the Data Publication
l View Data Publication History
l Clear Job History
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
6 Preface
RSA Archer GRC Platform Data Publications
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
Preface 7
RSA Archer GRC Platform Data Publications
8 Preface
RSA Archer GRC Platform Data Publications
Procedure
1. Navigate to the Manage Data Publications page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration.
A menu of Integration pages is displayed.
c. Click Manage Data Publications.
2. Click Add New.
3. Do one of the following:
l To use the settings of an existing data publications as a starting point, select
Copy an existing Data Publication and select the existing data publication
from the Existing Data Publications list.
l To select new settings for a data publication, select Create a new Data
Publication from scratch.
4. Click OK.
The Manage Data Publication page is displayed where you can specify the
properties of the data publication.
Next Steps
Manage the General Properties of a Data Publication
Procedure
1. Select the data publication that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration.
A menu of Integration pages is displayed.
c. Click Manage Data Publications.
2. In the Name column, click the data publication.
3. Complete the General Information section:
a. In the Name field, enter a name for the data publication.
b. From the Solution list, select the solution whose data is to be published to
the external database.
c. From the Status list, select whether your data publication is currently
Active or Inactive.
d. In the Description field, enter a description for the data publication.
4. Click Apply.
Next Steps
Define the Connection Parameters
Procedure
1. Select the data publication that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration.
A menu of Integration pages is displayed.
c. Click Manage Data Publications.
2. In the Name column, click the data publication.
6. In the Password field, enter the password that the system uses when accessing
the database.
The password to the target database can be entered in either the Password field
or the Connection String field as a token as shown in the previous step. When
using a token, the {Password} token in the connection string is replaced by the
password entered in this field when the connection string is submitted.
7. Click Apply.
8. To test the connection, click Test in the Test Connection field.
Next Steps
Define a Schedule for the Data Publication
Procedure
1. Select the data publication that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration.
Procedure
1. Navigate to the Manage Data Publications page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration.
A menu of Integration pages is displayed.
c. Click Manage Data Publications.
2. In the Actions column of the data publication that you want to view, click the
Execution History icon.
3. In the Status column, view the status to determine which job ran successfully or
failed.
4. In the Actions column of the job that you want to view, click the Run Details
icon.
The Run Detail dialog box opens. This dialog box has the Statistics and
Messages tabs. The Statistics tab shows the entity, rows processed, status, and
start date and time. The Messages tab shows the job activity, type, and date and
time of the activity.
5. When you are finished, close the Run Detail dialog box.
6. Close all other open dialog boxes and pages.
Procedure
1. Select the data publication that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration.
A menu of Integration pages is displayed.
c. Click Manage Data Publications.
2. In the Name column, click the data publication.
3. In the Actions column, click the Execution History icon.
4. Click Clear Job History.
5. Select the checkbox next to the Started column for the jobs that you want to
delete the history of. To clear all history for all jobs, select Clear All History
and go to step 7.
6. Click OK.
7. Close the Clear Job History dialog box.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Discussion Forums
Contents
Preface 5
About this Guide 5
Product Documentation 6
Support and Service 7
Chapter 1: About Discussion Forums 9
Discussion Forums Icon Legend 9
Discussion Forums Terminology 10
Display the Discussion Forums Feature 12
Chapter 2: Discussion Communities 15
Managing Discussion Communities 15
Create a Discussion Community 15
Assign Community Administrator and Forum Creators 16
Chapter 3: Discussion Forum Roles 19
Managing Discussion Forum Roles 19
Create a Discussion Forum Role 19
Update the General Properties of a Discussion Forum Role 20
Define Role Permissions for Discussion Forum Members 20
Chapter 4: Discussion Forums 23
Managing Discussion Forums 23
Configuring Discussion Forums 23
Create a Discussion Forum 24
Update the General Properties of a Discussion Forum 24
Enroll Discussion Forum Members 25
Configure Discussion Forum Options 26
Merge Topics within a Discussion Forum 28
Lock or Unlock a Discussion Forum 29
Archive a Discussion Forum 29
Chapter 5: Reports 31
Discussion Forum Reports 31
3
RSA Archer GRC Platform Discussion Forums
Preface
Preface 5
RSA Archer GRC Platform Discussion Forums
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
6 Preface
RSA Archer GRC Platform Discussion Forums
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 7
RSA Archer GRC Platform Discussion Forums
Icon Description
This discussion forum or topic is locked, and you have read all
posts in it.
Term Definition
Community A user who has been granted the rights to view, edit, and
Administrator delete all forums in a selected community, regardless of
whether the user has been enrolled as a member of those
forums. Discussion community administrators also can
add new forums in their assigned communities.
Term Definition
Locked Topic When a topic is locked, users are not permitted to reply
to it. The topic and its previous replies, however, remain
visible to users. Locked topics can be unlocked at any
time by users who have the proper rights.
Term Definition
Thread This term refers to a single topic and all of its related
replies. The topic-directed discussion that occurs in a
forum is thought of as "threaded" because you can trace
the path of information from the original topic down
through all of its reply postings.
Procedure
1. Select the solution that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Solutions.
c. In the Solution name column, click the solution.
2. In the Applications section, click Add New.
3. On the Applications tab, click Discussion Forums.
4. Click OK.
Discussion Forums is displayed in the list of applications, and is displayed with
the other applications in the solution.
5. Click Save.
Note: Users must have the rights to view the workspace where the solution displays
before they can access the Discussion Forums link.
Procedure
1. Navigate to the Manage Discussion Communities page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Discussion Forums.
c. Click Manage Discussion Communities.
2. Click Add New.
3. Do one of the following:
l To use the settings of an existing discussion forum community as a starting
point for your new community, select Copy an existing Discussion Forum
Community and select the existing community from the Discussion Forum
Communities list.
l To select new settings for a community, select Create a new Discussion
Forum Community from scratch.
4. Click OK.
The Manage Discussion Forum Community page is displayed.
Next Steps
Assign Community Administrators and Forum Creators
Procedure
1. Navigate to the Manage Discussion Communities page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Discussion Forums.
c. Click Manage Discussion Communities.
2. Click the community that you want to update.
The Manage Discussion Forum Community page is displayed for the selected
community.
4. In the Forum Creators field, click , assign the community to one or more
users or groups and click OK.
5. To remove a user or group from the role, click to the right of the desired
name in the Selected list.
6. Click Save.
Procedure
1. Click the Administration workspace.
2. In the Navigation Menu, click Discussion Forums.
3. Click Manage Discussion Forum Roles.
This page lists all existing discussion forum roles in the Platform. Several
system roles are included by default.
4. Click Add New.
The Add New Discussion Forum Role dialog box opens.
5. Do one of the following:
l To use the settings of an existing role as the starting point for the new role,
select Copy an existing Discussion Forum Role and select the existing role
from the Discussion Forum Roles list.
l To select new settings for the role, select Create a new Discussion Forum
Role from scratch.
6. Click OK.
The Manage Discussion Forum Role page is displayed for the new discussion
forum role.
Next Steps
Update the General Properties of a Discussion Forum Role
Define Role Permissions for Discussion Forum Members
Procedure
1. Click the Administration workspace.
2. In the Navigation Menu, click Discussion Forums.
3. Click Manage Discussion Forum Roles.
This page lists all existing discussion forum roles in the Platform. Several
system roles are included by default.
4. Click the discussion forum role that you want to update.
5. Complete the General Information section:
a. In the Name field, enter a name for the role.
b. In the Description field, enter a description for the role.
6. Click Apply.
Next Steps
Define Role Permissions for Discussion Forum Members
Procedure
1. Click the Administration workspace.
2. In the Navigation Menu, click Discussion Forums.
3. Click Manage Discussion Forum Roles.
This page lists all existing discussion forum roles in the Platform. Several
system roles are included by default.
4. Click the discussion forum role that you want to update.
5. In the Role Permissions section, select each access right that you want to
enable for the discussion forum role.
Read Posts Users can read posts in the selected forum, but cannot post
messages of their own.
Post New Topics Users can post new topics in the forum.
Delete My Posts Users can delete any message they have posted in the
forum. If other users have replied to the deleted post, those
replies also are deleted.
Edit Posts Users can edit any post in the forum, whether created by
them or by another user.
Delete All Posts Users can delete any post in the forum, whether created by
them or by another user. If other users have replied to the
deleted post, those replies also are deleted.
Add Forum Users Users can add users and/or groups to the list of forum
members.
Remove Forum Users Users can remove users and/or groups from the list of
forum members.
Merge Topics Users can merge topics to organize them in the forum.
6. Click Save.
Procedure
1. Navigate to the Manage Discussion Forums page:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Next Steps
Update the General Properties of a Discussion Forum
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Next Steps
Enroll Discussion Forum Members
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Next Steps
Configure Discussion Forum Options
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Procedure
1. Click a workspace containing a solution that includes the Discussion Forums
feature.
2. In the Navigation Menu, click Discussion Forums to expand the menu.
3. From the Discussion Forums menu, select Communities.
4. Click the community that you want to manage.
The Forums page is displayed for that community.
5. In the Actions column, click for a topic that you want to merge.
The merged topics are nested under the parent topic and display as replies to
that topic. Merged topics retain their original threading.
10. Click OK.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Chapter 5: Reports
Report Description
Discussion Forums Provides a list of each discussion forum, including the name,
Summary the community it resides in, the number of topics in the
forum, the total number of posts in each forum, and the date
and time of the last post to the forum.
My Discussion Forums Provides a list of discussion forums for which you are a
member. It shows the name of each forum, the community it
resides in, the topics included in it, the number of posts in
each forum that you have or have not read, the total number
of posts in each forum, and the date and time of your last
visit to each forum.
Chapter 5: Reports 31
RSA Archer GRC Platform 5.4
Globalization
June 2013
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm.
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and EMC are either registered trademarks or trademarks of EMC
Corporation ("EMC") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This
software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Globalization
Contents
Preface 5
About this Guide 5
Product Documentation 5
Support and Service 6
Chapter 1: Understanding Languages, Locales, and Trans-
lations 7
Languages 7
Languages Supported in the RSA Archer GRC Platform 7
Locales 8
Locales Available in the RSA Archer GRC Platform 8
Translations 8
Navigation Translations for the RSA Archer GRC Platform 9
Solution Translations for the RSA Archer GRC Platform 9
Chapter 2: Managing Languages 11
Activate a Language 11
Deactivate a Language 11
Set the Default Language for an Instance 11
Delete a Language from an Instance 12
Display Language Licenses 12
Add a Language License to an Instance 12
Create a New Language 12
Chapter 3: Managing Locales 15
Set the Locale for Users and Groups 15
Assign Locales to a Language 15
Remove Locales from a Language 15
Chapter 4: Managing Translations 17
Activate a Translation 17
Deactivate a Translation 17
Move a Solution Translation Between Instances 17
Delete a Translation 18
Chapter 5: Translating Solution Components 19
Translating Applications 19
Translate an Application 19
Check the Status of an Application Translation 20
See Untranslated Fields in an Application 20
See Untranslated Values Lists in an Application 20
Set the Design Language for an Application 21
Translating Questionnaires 21
Translate a Questionnaire 22
Check the Status of a Questionnaire Translation 22
See Untranslated Fields in a Questionnaire 23
See Untranslated Values Lists in a Questionnaire 23
3
RSA Archer GRC Platform Globalization
4
RSA Archer GRC Platform Globalization
Preface
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Preface 5
RSA Archer GRC Platform Globalization
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
6 Preface
RSA Archer GRC Platform Globalization
Languages
A language in the Platform, like a language in everyday life, refers to a natural
language that people read, write, and speak. Various language translations of
Platform navigation and solution content are available for licensing from RSA.
These translations allow users to see Platform content in their native languages.
A language must be licensed and activated in an instance to make its Platform
navigation translations available. At least one language license is included with the
original product license and is set during installation as the default Platform
language. You can purchase and add language licenses to provide different Platform
navigation translations to your users.
Administrators associate locales with a language to let users see content such as
dates and currency in formats used in their countries and cultures. A separate time
zone setting completes the localization of Platform navigation and content displays.
The Platform navigation is displayed to users in the language associated with their
locale. If the language associated with their locale is not active, the default
Platform language is displayed instead.
Administrators cannot delete a language that meets any of these criteria:
l The language is the default language for the instance.
l The language is defined as the design language for an Archer component.
l The language has associated locales that include users.
l The language is defined by users as their override language in user preferences.
l Italian
l Japanese
l Portuguese
l Russian
l Spanish
Locales
A locale defines the display formats used for dates and currency and also affects
Platform functions such as calculations, time-based filtering, and reporting. A major
function of a locale is to let users see Platform content as they are accustomed to
seeing information in their native countries and cultures.
An administrator associates one or more locales with a language to let users see
Platform navigation and licensed solutions in their native languages. A locale can
be associated with only one language. Any number of locales can be associated
with the same language. A locale cannot be removed from a language if the locale
has associated users.
An administrator can set a default locale for individual users and user groups.
However, the locale assignment is associated only with individual users and not
with groups. The assignment of a user group to a locale assigns the locale to the
current set of users in the group. Future user additions to the group do not get the
locale assignment, and future user removals from the group do not remove the user
locale setting.
Users with update permissions for their accounts can set their locale to a non-
default locale.
Translations
A translation refers to a natural-language translation of Platform navigation or
solution content. Translations of Platform navigation and core solution components
are available for licensing from RSA.
The language used to create an application, questionnaire, sub-form, or global
values list is called its design language. The design language is defined by default
in components produced by RSA, is set automatically when you select the target
language for a new translation, and can be changed manually when necessary to
specify the actual design language of a component.
The initial product installation installs all Platform navigation translations and
activates at least one licensed language to enable navigation in that language. When
users need to see Platform navigation in more languages, your organization can
purchase additional language licenses to enable navigation translations in those
languages.
l Chinese
l English
l French
l German
l Italian
l Japanese
l Portuguese
l Russian
l Spanish
English translations for labels and contents of core solutions are part of the default
Platform installation. The initial installation includes at least one licensed solution
language. When users need to see solutions in more languages, your organization
can purchase additional language licenses for the solutions it owns.
Localized core solutions in languages other than English are available as package
downloads from the RSA Archer Exchange at
https://community.emc.com/community/connect/grc_ecosystem/rsa_archer_
exchange.
Activate a Language
You can active licensed languages and custom languages that you create.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language you want to activate.
3. In the Options section, set the status to Active.
4. Click Apply.
Deactivate a Language
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language you want to deactivate.
3. In the Options section, set the status to Inactive.
4. Click Apply.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click Add New.
Procedure
1. Click Administration tab > Globalization > Manage Locales.
2. Click for the locale to which you want to assign users.
3. In the Options section, select the groups and users to assign to the locale.
4. Click Apply.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language to which you want to assign locales.
3. In the Options section, select the locales to assign to the language.
4. Click Apply.
Activate a Translation
An administrator activates a translation by activating the licensed or custom
language that includes the translation. Users with a locale set to the language or
with the language set as their override language will see user interface components
in the translation for the active language instead of the design language.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language that includes the translation that you want to activate.
3. In the Options section, set the status to Active.
4. Click Apply.
Deactivate a Translation
An administrator deactivates a translation by deactivating the language that includes
the translation. Users with a locale set to the language or with the language set as
their override language will see user interface components in the design language
instead of the deactivated language translation.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language that includes the translation that you want to
deactivate.
3. In the Options section, set the status to Inactive.
4. Click Apply.
For the steps to perform this task, see "Move a Solution Translation Between
Instances" in the RSA Archer GRC Platform Help Center.
Delete a Translation
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language that includes the translation you want to delete.
3. Click the Applications, Questionnaires, Sub-Forms, or Global Values Lists
tab that includes the translation.
4. If the translation is in a level, in Translate Levels, click for the level that
includes the translation.
5. Click in the row for the application, questionnaire, sub-form, or global values
list that includes the translation.
6. Click OK.
Translating Applications
l Translate an Application
l Check the Status of an Application Translation
l See Untranslated Fields in an Application
l See Untranslated Values Lists in an Application
l Set the Design Language for an Application
Translate an Application
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Create a Language only if the language to which you want to translate the
application is not available in the list of languages.
3. Click Translate for the language to which you want to translate the
application.
4. In Translate Applications, click for the application you want to translate.
5. If the application has levels, in Translate Levels, click for the application
level to translate.
6. Translate fields in the application:
a. In Translate Fields, click the topmost to start translating attributes for
application fields.
b. Translate attributes for the first field.
c. Click Next to translate the next set of field attributes.
d. To pause or stop translating, click OK and then Apply.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which the application is being translated.
3. In Translate Applications, hover over the icon before the name of the
application. A tooltip explains the amount of translation completed.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which application fields are being translated.
3. In Translate Applications, click for the application being translated.
4. If the application has levels, in Translate Levels, click for the application
level being translated.
5. In Translate Fields, text boxes with no content in the Translate To column
indicate untranslated fields.
6. To see only the untranslated fields, filter the Translate To column using Equals
<blank>.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which application values lists are being
translated.
3. In Translate Applications, click for the application being translated.
4. If the application has levels, in Translate Levels, click for the application
level being translated.
5. Click Values Lists.
6. In Translate Values Lists, hover over the icon before a values list name. A
tooltip explains if the values list is translated and the amount complete of the
translation.
7. To see the untranslated values in one of the values lists:
a. In Translate Values Lists, click for the values list.
b. In Translate Values List Values, text boxes with no content in the
Translate To column indicate untranslated values.
c. To see only the untranslated values, filter the Translate To column using
Equals <blank>.
Procedure
1. Click Administration > Application Builder > Manage Applications.
2. Select an application.
3. In the General tab > Options section, select the design language in the
Language field.
4. Click Apply.
Translating Questionnaires
l Translate a Questionnaire
l Check the Status of a Questionnaire Translation
l See Untranslated Fields in a Questionnaire
l See Untranslated Values Lists in a Questionnaire
l Set the Design Language for a Questionnaire
Translate a Questionnaire
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Create a Language only if the language to which you want to translate the
questionnaire is not available in the list of languages.
3. Click Translate for the language to which you want to translate the
questionnaire.
4. Click Questionnaires.
5. In Translate Questionnaires, click for the questionnaire you want to
translate.
6. If the questionnaire has levels, in Translate Levels, click for the
questionnaire level to translate.
7. Translate fields in the questionnaire:
a. In Translate Fields, click the topmost to start translating attributes for
questionnaire fields.
b. Translate attributes for the first field.
c. Click Next to translate the next set of field attributes.
d. To pause or stop translating, click OK and then Apply.
8. Translate values lists in the questionnaire:
a. Click the Values Lists tab.
b. In Translate Values Lists, click the name of the values list to translate.
c. In Translate Values List Values, click the topmost to start translating
values list text.
d. Translate attributes for the first values list item.
e. Click Next to translate the next values list item.
f. To pause or stop translating, click OK and then Apply.
9. If you pause the translation, note the language, questionnaire, level, and
component you were translating so you know where to resume.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which the questionnaire is being translated.
3. Click Questionnaires.
4. In Translate Questionnaire, hover over the icon before the name of the
questionnaire. A tooltip explains the amount of translation completed.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which questionnaire fields are being translated.
3. Click Questionnaire:
4. In Translate Questionnaire, click the name of the questionnaire being
translated.
5. If the questionnaire has levels, in Translate Levels, click for the level being
translated.
6. In Translate Fields, text boxes with no content in the Translate To column
indicate untranslated fields.
7. To see only the untranslated fields, filter the Translate To column using Equals
<blank>.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which values lists for questionnaires are being
translated.
3. Click Questionnaires.
4. In Translate Questionnaires, click for the questionnaire being translated.
5. If the questionnaire has levels, in Translate Levels, click for the level being
translated.
6. Click Values Lists.
7. In Translate Values Lists, hover over the icon before the values list name. A
tooltip explains if the values list is translated and the amount complete of the
translation.
8. To see the untranslated values in one of the values lists:
a. In Translate Values Lists, click for the values list.
b. In Translate Values List Values, text boxes with no content in the
Translate To column indicate untranslated values.
c. To see only the untranslated values, filter the Translate To column using
Equals <blank>.
Procedure
1. Click Administration > Application Builder > Manage Questionnaires.
2. Select a questionnaire.
3. In the General tab > Options section, select the design language in the
Language field.
4. Click Apply.
Translating Sub-Forms
l Translate a Sub-Form
l Check the Status of a Sub-Form Translation
l See Untranslated Fields in a Sub-Form
l See Untranslated Values Lists in a Sub-Form
l Set the Design Language for a Sub-Form
Translate a Sub-Form
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Create a Language only if the language to which you want to translate the sub-
form is not available in the list of languages.
3. Click Translate for the language to which you want to translate the sub-
form.
4. Click Sub-Forms.
5. In Translate Sub-Forms, click for the sub-form you want to translate.
6. If the sub-form includes levels, in Translate Levels, click for the sub-form
level to translate.
7. Translate fields in the sub-form:
a. In Translate Fields, click the topmost to start translating attributes for
sub-form fields.
b. Translate attributes for the first field.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which the sub-form is being translated.
3. Click Sub-Forms.
4. In Translate Sub-Form, hover over the icon before the name of the sub-form.
A tooltip explains the amount of translation completed.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which questionnaire fields are being translated.
3. In Translate Questionnaire, click the name of the sub-form being translated.
4. If the sub-form has levels, in Translate Levels, click for the level being
translated.
5. In Translate Fields, text boxes with no content in the Translate To column
indicate untranslated fields.
6. To see only the untranslated fields, filter the Translate To column using Equals
<blank>.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which values lists for sub-forms are being
translated.
3. Click Sub-Form.
4. In Translate Sub-Form, click for the sub-form being translated.
5. If the sub-form has levels, in Translate Levels, click for the level being
translated.
6. Click Values Lists.
7. In Translate Values Lists, hover over the icon before the name of the values
list. A tooltip explains if the values list is translated and the amount complete of
the translation.
8. To see the untranslated values in one of the values lists:
a. In Translate Values Lists, click for the values list.
b. In Translate Values List Values, text boxes with no content in the
Translate To column indicate untranslated values.
c. To see only the untranslated values, filter the Translate To column using
Equals <blank>.
Procedure
1. Click Administration > Application Builder > Manage Sub-Forms.
2. Select a sub-form.
3. In the General tab > Options section, select the design language in the
Language field.
4. Click Apply.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Create a Language only if the language to which you want to translate the
global values list is not available in the list of languages.
3. Click Translate for the language to which you want to translate the global
values list.
4. Click Global Values Lists.
5. In Translate Global Values Lists, click for the global values list you want
to translate.
6. Translate values in the global values list:
a. In Translate Fields, click the topmost to start translating attributes for
global values list items.
b. Translate attributes for the first field.
c. Click Next to translate the next set of field attributes.
d. To pause or stop translating, click OK and then Apply.
7. If you pause the translation, note the language and global values list you were
translating so you know where to resume.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which the global values list is being translated.
3. Click Global Values Lists.
4. In Translate Global Values List, hover over the icon before the name of the
global values list. A tooltip explains the amount of translation completed.
Procedure
1. Click Administration > Globalization > Manage Languages.
2. Click for the language into which global values list fields are being
translated.
3. Click Global Values Lists.
4. In Translate Global Values Lists, hover over the icon before a values list
name. A tooltip explains if the global values list is translated and the amount
complete of the translation.
5. To see the untranslated values in one of the global values lists:
a. In Translate Global Values Lists, click for the values list.
b. In Translate Values List Values, text boxes with no content in the
Translate To column indicate untranslated values.
c. To see only the untranslated values, filter the Translate To column using
Equals <blank>.
Procedure
1. Click Administration > Application Builder > Manage Global Values Lists.
2. Select a global values list.
3. In General Information, select the design language in the Language field.
4. Click Apply.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Management Reporting
Contents
Preface 5
About this Guide 5
Product Documentation 5
Support and Service 6
Chapter 1: Master Report Listing 9
Managing the Master Report Listing 9
View Personal and Global Reports 9
Add a Report 10
Update a Report 10
Delete a Report 12
Print a List of Reports 12
Chapter 2: Global Print and Export Settings 13
Managing the Printing and Exporting of Records 13
Add a Template for Record Exports 13
Configure the Header and Footer of HTML and Print Templates 14
Delete a Template for Record Exports 14
Chapter 3: Mail Merge Templates 15
Managing Mail Merge Templates 15
Process for Adding a Mail Merge Template 15
Mail Merge Terminology 16
Alias and Merge Regions 16
Field Types 17
Alias Names 17
Alias Syntax 18
Syntax Formatting 18
Merge Regions Syntax 20
Designing Word Documents and Templates for Export Templates 20
Compatible Word Document File Types 20
Add a Mail Merge Template 21
Define the General Properties of a Mail Merge Template 21
Upload a Word Document or Template to the Export Template 22
Select the Options for a Mail Merge Template 23
Define Access Privileges for a Mail Merge Template 23
Delete a Mail Merge Template 24
Update the General Properties of a Mail Merge Template 24
3
RSA Archer GRC Platform Management Reporting
Preface
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Preface 5
RSA Archer GRC Platform Management Reporting
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
6 Preface
RSA Archer GRC Platform Management Reporting
Preface 7
RSA Archer GRC Platform Management Reporting
Procedure
1. In the top frame of the user interface, click Reports.
The Master Report Listing page is displayed.
2. Using the Grouping and Filter toolbars, filter and sort the list as needed to
locate the report that you want to view.
3. Click the report to execute that report and view it.
Add a Report
Complete this task to create new personal reports. If you have global report
administration rights for an application, you can also create global reports.
Procedure
1. In the top frame of the user interface, click Reports.
The Master Report Listing page is displayed.
2. Click Add New to open the Add New Report dialog box.
3. Select the application that you want to run the report against and click OK.
The Advanced Search page is displayed, enabling you to specify criteria for the
report.
4. Enter your search criteria on the Advanced Search page and click Search.
Your report is displayed.
5. Click Save.
The Save Report page is displayed for the new report. This page enables you to
specify the properties of the report.
Next Steps
Update a Report
Update a Report
Complete this task to edit your personal reports. If you have global report
administration rights for an application, you also can edit global reports.
Procedure
1. In the top frame of the user interface, click Reports.
The Master Report Listing page is displayed.
2. Click the report that you want to modify.
3. Click Modify in the record toolbar.
The Advanced Search page is displayed.
4. Enter updated search criteria on the Advanced Search page and click Search.
Your modified report is displayed.
5. Do one of the following:
l Click Save.
l Select Save as New Report from the list displayed to save a separate report
with your changes.
l Select Save Report Changes from the list displayed to save the changes to
the existing report.
6. Complete the Report Information section:
a. In the Name field, enter a name for the report.
b. In the Description field, describe the report.
This description is displayed on the Master Report Listing page.
7. In the Report Type section, select whether the report is a personal report or a
global report:
l Personal Report. Accessible only to the person who created it.
l Global Report. Accessible to all users in an application or to selected users
and user groups.
8. If you selected Global Report, access is granted to all users with access rights
to the current application by default. Assign access rights for the report
according to the following options:
l Current User. In the Available list, expand the Current User node and
select the user who you want to have access to the report.
l Groups. In the Available list, expand the Groups node and select the
groups whose members you want to have access to the report.
l Users. In the Available list, expand the Users node and select the users
who you want to have access to the report.
To revoke access rights for a user or group, click in the Selected list.
9. In the iView Caching section, define the caching behavior and duration for the
report. If caching is enabled, the refresh rate is disabled.
l Enabled iView Caching. Select to enable or unselect to disable iView
caching for the report. Caching requires configuration of a caching provider
before it can be enabled.
l Cache Duration. If you enable caching, set the amount of time to display
cached results instead of running a new search to update iView content. You
can set the duration to a minimum of 2 minutes up to a maximum of 30 days.
l Reset to default. Click to change iView caching settings to the global
defaults defined by the instance administrator.
10. From the Refresh Rate list, select how often you want the report to refresh. If
a refresh rate is set, iView caching is disabled.
11. Click Apply.
12. If you changed the cache duration from one time range to another, open and
refresh the Report iView to complete the change.
Delete a Report
Complete this task to delete your personal reports. If you have global report
administration rights for an application, you also can delete global reports.
Procedure
1. In the top frame of the user interface, click Reports.
The Master Report Listing page is displayed.
Procedure
1. Navigate to Management Reporting > Master Report Listing.
2. Click Print.
The list of reports is displayed on a new tab, grouped by application.
3. Click Print to print the list of reports.
Related Topics
Managing the Master Report Listing
Procedure
1. Navigate to the Manage Global Print and Export Settings page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Management Reporting.
c. Click Manage Global Print and Export Settings.
2. To add a Word template:
a. In the Word Configuration section, click Add New.
b. In the File Upload dialog box, click Add New.
c. Browse to and select the file and click OK.
The file is displayed in the Word Configuration section.
d. To specify the template as the default, select the Default option.
3. To add an Excel template:
a. In the Excel Configuration section, click Add New.
b. In the File Upload dialog box, click Add New.
Procedure
1. Navigate to the Manage Global Print and Export Settings page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Management Reporting.
c. Click Manage Global Print and Export Settings.
2. In the HTML Configuration section, enter the text in the Header and Footer
fields. Use the Rich Text Editor toolbar to format the text, if necessary.
3. Click Save.
Procedure
1. Navigate to the Manage Global Print and Export Settings page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Management Reporting.
c. Click Manage Global Print and Export Settings.
Term Definition
Exported File The final output produced from a Export template with data
merged from a Platform application.
Export Template The Word document that is uploaded to the Mail Merge template.
Mail Merge A feature of Microsoft Word that the Platform leverages to create
the reports.
Mail Merge A Platform entity that contains the necessary settings, including
Template the Word document that serves as the report template to create the
report. Mail Merge templates are configured using the Manage
Mail Merge Templates function under Management Reporting.
Field Types
You can use aliases to any of these field types in your report template:
Note: ".Data" represents the field data of an attachment, which is how the data is
retrieved.
Once you understand the alias syntax, you can Design a Document to Use as a
Report Template.
Alias Names
Numerous operations in the Platform require references to objects—everything
from solutions, applications, and fields to individual values list values—to specify
the target for a particular activity. One example is mail merge, in which you must
create templates with unambiguous references to individual fields in an application.
Another example is the process of mapping external data to fields in the Data Feed
Manager. To provide a constant name that is also human readable, all Platform
objects, such as workspaces, applications, fields, and notification templates, support
an alias.
An alias is a short name for a unique object in the system that is human readable,
but also can be used in code or as a reference in configuration processes. All alias
names must contain only alphanumeric characters, beginning with a letter and
containing no spaces. The maximum length is 40 characters.
An alias name must be unique in the entity type. The following are additional points
of consideration:
l Field aliases must be unique in the level.
l Values List Value aliases must be unique in a Values List.
l Level, Data Driven Event, Report, and Workflow Stage aliases must be unique
in an application.
You can edit the alias name for non-system provided entities. Alias name for
system-provided entities are read only.
CAUTION: Alias name are used in configuration processes, system processes, and
web service API integrations. Modification of the alias name can cause these
functions to fail.
Alias Syntax
To reference a field that is in the primary level, insert the alias of that field into the
export template. The following list provides the syntax for the Date, External Link,
and IP Address fields:
l Date: «Drp_Dwn_DateTime», «Drp_Dwn_Date_Only», «Txt_Box_DateTime»,
or «Txt_Box_Date_Only»
l External Link: «List_ExternalLink»
l IP Address: «IPAddress» or «List:IPField»
Syntax Formatting
You can reveal the syntax codes by pressing [Alt]+[F9] keys.
The following table provides the syntax formatting for the various field types.
IP Address <<IP Address>>
LastUpdated.Date <<Last_Published>>
LastUpdated.UserName <<Last_Published>>
LastUpdated.DisplayName <<Last_Published>>
Numeric <<Numeric>>
Text <<Text>>
Tracking Id <<TrackingID>>
Voting <<Voting>>
The mail merge template must be formatted with the proper formatting syntax. For
more information, see Syntax Formatting.
Procedure
1. Navigate to the Manage Mail Merge Templates page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Management Reporting.
c. Click Manage Mail Merge Templates.
2. Click Add New.
The Add Mail Merge Template window is displayed.
3. Do one of the following:
l To use an existing mail merge template as a starting point for your new
template, select Copy Existing and select the template that you want to copy
from the Mail Merge Templates list.
l To create a new mail merge template, select Create Original.
4. Click OK.
Next Steps
Define the General Properties of a Mail Merge Template
Note: You can only upload Microsoft Word 2010 or 2007, or Word 2003 files
(.docx, .dotx, .doc, and .dot).
Procedure
1. Open the General tab on the Mail Merge Template dialog box:
a. Click the Administration workspace.
b. In the Navigation Menu, click Management Reporting.
c. Click Manage Mail Merge Templates.
d. Click Add New.
2. On the General tab, complete the General Information section:
a. In the Name field, enter a name for the template.
b. In the Description field, describe the template.
3. Click Apply.
Next Steps
Select the Options for a Mail Merge Template
Upload a Word Document or Template to the Export Template
Define Access Privileges for a Mail Merge Template
Note: You can only upload Microsoft Word 2010 or 2007, or Word 2003 files
(.docx, .dotx, .doc, and .dot).
Procedure
1. Navigate to the Manage Mail Merge Templates page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Management Reporting.
c. Click Manage Mail Merge Templates.
2. In the Report Template section, click Add New.
The File Upload dialog box opens.
3. In the File Upload dialog box, click Add New, browse to and select the correct
file and click OK.
The file is displayed in the Files to Upload list.
4. Click OK.
5. Click Apply.
Next Steps
Define Access Privileges for a Mail Merge Template
Procedure
1. Select the Mail Merge template that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Management Reporting.
c. Click Manage Mail Merge Templates.
d. Click the Mail Merge template.
2. On the General tab, in the Options section, select the application for the
template from the Application list.
3. If the Level field is displayed, select the correct level from the Level list.
4. To prevent anyone from using this notification template, select Inactive in the
Status field. Otherwise, select Active.
5. Click Apply.
Next Steps
Define Access Privileges for a Mail Merge Template
Procedure
1. Select the Mail Merge template that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Management Reporting.
c. Click Manage Mail Merge Templates.
d. Click the Mail Merge template.
2. Click the Access tab.
3. Do one of the following:
l To enable any user to have access to the template, select the Public option.
l To restrict access to only designated users and groups, select the Private
option. In the Available section, select the users and groups that you want to
have access to the template. Verify that the correct users and groups are
displayed in the Selected box and click Apply.
4. Click Save.
Procedure
1. Navigate to the Manage Mail Merge Templates page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Management Reporting.
c. Click Manage Mail Merge Templates.
2. Click in the row of the mail merge template that you want to delete.
A warning dialog box opens.
3. Click OK.
Procedure
1. Select the Mail Merge template that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Management Reporting.
c. Click Manage Mail Merge Templates.
d. Click the Mail Merge template.
2. On the General tab, complete the General Information section:
a. In the Name field, enter a name for the template.
b. In the Description field, describe the template.
3. Click Apply.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Notifications
Contents
Preface 5
About this Guide 5
Product Documentation 7
Support and Service 7
Chapter 1: Letterheads 9
Notification Blueprint Overview 9
Layout Template Design 10
Letterhead 10
Body Layout 11
Content 12
Delivery Methods 12
Subscription Rules 14
Recipient Rules 15
Filter Criteria 15
Chapter 2: Global Notification Settings 17
Record-Based Notifications Overview 17
Subscription Notifications 19
On-Demand Notifications 20
XML Notifications 21
DDE Generate Notification Action 22
Workflow Notifications 23
Report-Based Notifications Overview 24
Scheduled Report Distributions 25
Notifications from Other Data Sources Overview 27
Training and Awareness 27
Discussion Forums 28
Chapter 3: Subscription Notifications 29
Managing Letterheads 29
Create a Letterhead 29
Update the General Properties of a Letterhead 30
Define the Layout of a Letterhead 30
Delete a Letterhead 31
Chapter 4: Scheduled Report Distributions 33
Configuring Notifications 33
Configuring Notifications for the Instance 33
Configuring Notifications in the Platform 34
Managing Global Notification Settings 37
Configure Default Notification Settings 37
Define Read Receipt Properties 38
Chapter 5: On Demand Notification Templates 41
Managing Subscription Notifications 41
Create a Subscription Notification 42
3
RSA Archer GRC Platform Notifications
4
RSA Archer GRC Platform Notifications
Preface
Preface 5
RSA Archer GRC Platform Notifications
Notification
Description
Type
Record- Contains dynamic and static content of specified fields from a record.
Based The following notifications are record based:
l Subscription
l On-Demand
l XML
l DDE Generate Notification Action
l Workflow
Report- Contains attached reports or links to reports. Contents are based on the
Based permissions of the user who creates the report. Report-based notifications
are sent on a required schedule. The report-based notification is called
Scheduled Report Distributions.
Other Data Contains data from other data sources. These notifications are generated
Source from Training & Awareness campaigns: presentation, acceptance, and
quizzes. Notifications from Discussion Forums are sent to subscribers.
The Notifications feature also provides several time-saving features that enable
administrators to reuse settings across multiple notifications. Letterhead templates
define header, footer, body, and page properties that can be used by multiple
notifications. Global Notification Settings are general properties that define default
values for all notifications, as well as read-receipt functionality.
Users select the notifications that they want to receive from the User Preferences
menu. Users can receive notification emails using any email-based device. If filter
edit rights are enabled for a notification template, end users can filter the
information that they receive by selecting specific field values, such as
technologies, versions, or categories. For example, a user may choose to receive
vulnerability alerts only for HP-UX version 11i.
6 Preface
RSA Archer GRC Platform Notifications
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
Preface 7
RSA Archer GRC Platform Notifications
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
8 Preface
RSA Archer GRC Platform Notifications
Chapter 1: Letterheads
The name of the notification blueprint must be unique for each instance. The From
Address and at least one recipient are required for each notification blueprint.
The elements of a notification blueprint include the following:
l Name l Recipients
l Layout l Scheduling (frequency and delivery schedule)
l Letterhead l Subscription
l Email template (Subject line and l Record filtering
Body)
9 Chapter 1: Letterheads
RSA Archer GRC Platform Notifications
Letterhead
Letterhead templates define the page, header, body, and footer properties used in a
notification. A letterhead is not a required element of a notification blueprint, and
does not apply to notifications sent in XML format. A default letterhead is specified
in Global Notification Settings, but the selection can be overridden in the individual
notification blueprint.
The following table describes the properties of the letterheads.
Property Description
Name Specifies the name of the letterhead. The name of each letterhead must
be unique across the instance.
Chapter 1: Letterheads 10
RSA Archer GRC Platform Notifications
Property Description
Page Specifies the entire page background color and border settings,
including the line height.
Header Specifies the header background color and border settings, including
the line height.
Body Specifies the body background color and border settings, including the
line height.
Footer Specifies the footer background color and border settings, including
the line height.
Body Layout
The body layout defines the format of the layout in the notification body, including
how the content is arranged. There are two types of body layout structured and free
form. The structured format presents content in a two-column table. The left column
contains the field name, and the right column contains the field value. The free-
form body layouts allow the content to be arranged anywhere in the body of the
notification.
The following table describes the available body layouts.
Two Column 50-50 Arranges the content in two equally spaced columns.
Two Column 30-70 Arranges the content in two columns. The right column is 30
percent of the body and the left column is 70 percent.
Table Arranges the field names on the left column and the field
values on the right column. Table is a structured body layout,
and the arrangement of the content cannot be changed.
11 Chapter 1: Letterheads
RSA Archer GRC Platform Notifications
Content
The content of a notification includes user-defined static content and dynamic
content placeholders in the Subject line and Body. Static content is text that remains
the same for every notification, while dynamic content changes based on data from
specified fields.
The following content placeholders are available.
Type Description
Field Dynamic content placeholder for data from the fields of the records used for
publishing the notification.
Report Dynamic content placeholder for links to global and personal reports that
are available from a module.
Link Dynamic content placeholder for links to user pages, administrative pages,
and records.
Subject
The Subject line for all notification types can be configured using static and
dynamic text and data from fields. A Cross-Reference field is displayed as a Key
Field reference.
The following field types cannot be used to create dynamic content in the Subject
line:
l Attachment l Sub-Form
l Cross-Application Status Tracking l Questionnaire Reference
l Image l Access History
l Record Permissions l History Log
l Risk Assessment
Body
The Body is composed of user-defined static content and dynamic content
placeholders. The dynamic content placeholders can be used for fields, reports, and
links. Static content is manually entered text that remains the same for every
notification, while dynamic content changes based on data from fields.
Delivery Methods
Notifications are delivered based on the delivery methods that are configured in the
notification blueprint.
Chapter 1: Letterheads 12
RSA Archer GRC Platform Notifications
Note: Notifications are only sent when a record is saved. For Instantly and Digest
delivery methods, notifications are not sent when Save or Apply updates a
calculated field when there are no other changes to the record.
13 Chapter 1: Letterheads
RSA Archer GRC Platform Notifications
Type Description
Instantly Notifications are published as soon as possible when a trigger occurs for
record-based notifications. An example of a trigger is saving a record.
Digest Notifications are aggregated and published in a digest. The data used for
publishing the notification are captured each time a record is added or
updated. Notification publishing uses the most recent version of a record
that passed the filter criteria of the notification blueprint. If the
notification blueprint filters are modified within a specified period, the
already captured record is still used for notification publishing at the end
of the period.
The frequencies include the following:
l Daily. Notifications are published once per day based on the
notification blueprint.
l Weekly. Notifications are published once per week based on the
notification blueprint.
l Monthly. Notifications are published once per month based on the
notification blueprint.
l Quarterly. Notifications are published once per quarter based on the
notification blueprint.
Reminder Notifications are published once per day, and typically use date filters
that compare a date-based field in each record to the date that the
notification is being run. The record collection is search-based, and does
not require a save to occur for the notifications to be published. All
records for a module can potentially be returned for a record-based
notification.
Subscription Rules
Notification subscriptions enable recipients to receive notifications when records
are added or updated in specified modules. Administrators specify the default
settings for notifications in the notification blueprints. Platform users can subscribe
or unsubscribe to notifications from the User Preferences menu > Manage Your
Email Subscriptions.
All recipients are automatically subscribed to receive notifications. If the
administrator does not want recipients to unsubscribe to a notification, use DDE
Generated Notification action. Recipients can subscribe and unsubscribe from most
notifications, but cannot unsubscribe from a DDE Generate Notification action.
Chapter 1: Letterheads 14
RSA Archer GRC Platform Notifications
Recipient Rules
Recipients can be a listing of users, groups, or manually entered email addresses.
Recipients who are non-Platform users receive all content regardless of
permissions.
The following table describes the types of recipients.
Type Description
Users A specific Platform user receives the notification. The primary email address
for the user listed in the user account is used to send the notification.
If the user is subscribed to a notification and selects a different address in the
Manage Your Email Subscription page from the Preferences menu, the
specified email address is used.
Groups A specific group receives the notification. Each user in the group is treated
individually at the time the notification is sent. The user email address
follows the same rules defined for the Users type.
Fields The fields that contain email addresses at the time of publication receive the
notification. The following types of fields can contain email addresses:
l Record Permissions. Recipients are specified at the record level.
l Text. Recipients are specified as users in the field.
l User/Groups List. Recipients are specified in a list of users and groups in
the Platform.
l Values List. Recipients are specified in a list of predetermined values
l Workflow. Recipients are specified in the Workflow Stage Properties.
User/Group Lists are not record-based. All other field types are record-based
Text fields. Values Lists do not use record permissions.
Static The email address that is entered manually in the notification blueprint that
receives the notification.
Filter Criteria
Filters are based on fields, operators, and values. Filters criteria determines the
records that are published in a notification. Only records that meet the specified
filter criteria are included in the notifications.
For notifications generated from the DDE Generate Notification action, DDE rules
determine the records that are included.
15 Chapter 1: Letterheads
RSA Archer GRC Platform Notifications
Chapter 1: Letterheads 16
RSA Archer GRC Platform Notifications
Notification Description
Subscription Notifications
Subscription notifications enable recipients to receive notifications on a set
schedule or instantly when records are added or updated in a module.
Administrators can create notification blueprints for any module for which they are
assigned ownership rights. The Subscription Notification blueprint specifies the
properties used to generate a subscription notification.
Platform users can subscribe or unsubscribe to notifications from the User
Preferences menu > Manage Your Email Subscriptions.
Notifications generated from the DDE Generate Notification action are filtered by
DDE rules. If the administrator does not want recipients to unsubscribe to a
notification, use DDE Generated Notification action.
Example
Scenario A team needs to be alerted each time an urgent issue is added or updated
in a custom module.
Result A user adds a new issue in the module and selects "Urgent" in the
Priority field and clicks Save. A notification is sent to everyone on the
team.
On-Demand Notifications
On-Demand notifications are pre-configured notifications that Platform users can
send to anyone with an active email address. Administrators configure the
properties of a notification in an On-Demand notification blueprint.
When Platform users click in the page toolbar on a record, they can make a
selection from a list of available On-Demand notification blueprints.
Access The access right for an On-Demand notification is specified in the On-
Demand notification blueprint. The following options are available:
l Public. All module users will automatically be granted unrestricted
access to use the notification blueprint.
l Private. Only specified users and groups can access the notification
blueprint.
Example
Scenario Members of the executive team would like to receive the status of
remediation plans periodically. Some of the members have access to the
RSA Archer GRC Suite, but some members do not.
Result A user adds new information to a remediation plan that affects other plans.
XML Notifications
XML notifications are used to transmit information from the Platform to an external
system or integration in XML format. Administrators configure the properties of an
XML notification in an XML notification blueprint.
Element Description
Content Only fields are included within the Subject line and Body of the
notifications.
Recipient The email addresses of the recipients are entered manually. Multiple
email addresses are separated by a semicolon. The email addresses
specified as recipients receive all notifications generated by the
notification blueprint.
Example
For more information, see the Help Center topics under Administrator Help >
Application Builder > Managing Applications > Managing Data Driven Events >
Managing Actions.
Example
Scenario A team needs to be alerted each time an urgent issue is added or updated
in a custom module.
Action A user with administrative rights to the custom module creates a Generate
Notification action, specifying that a notification is sent to all members of
the team each time a new issue is reported. The filter criteria in the DDE
rule are defined so that notifications are sent only when the value
"Urgent" is selected in the Priority field, thereby limiting the number of
notifications that are triggered by the notification blueprint.
Result A user adds a new issue in the module and selects "Urgent" in the Priority
field and then clicks Save. A notification is sent to everyone on the team.
Workflow Notifications
Workflow Notification blueprints enable administrators to configure the workflow
process to automatically send notifications to users and groups that are assigned to a
workflow task. A Workflow Notification blueprint is defined and enabled for each
stage of the workflow in the Workflow tab > Stage Properties of a module. The
notifications are sent when a record:
l Is enrolled or moved to a new stage (except the End stage)
l Is manually reassigned by the Application Owner
Recipient Any users or groups determined by the Assignment Model for a stage.
Delivery Configured for entrance to any stage in the workflow process, and sent
at the end of that stage.
For more information, see the Help Center topics under Administrator Help >
Application Builder > Managing Applications > Managing Workflow > Managing
Workflow Notifications.
Example
Action A user with administrative rights creates a custom module with three
Stages and enables Workflow. A Workflow Notification blueprint was
created and enabled for Stage 2.
The attached report contains records based on the permissions of the Platform user
who creates the report. The report is not generated based on the Record
Permissions of the recipients.
If you do not want everyone to view the entire report, send a link to the report
instead of an attached report. A link to the report requires the recipient to have an
active Platform user account, and recipients can only view records for which they
have record permissions.
Related Topics
Scheduled Report Distributions
Layout Table body layout is not available. All free-form body layouts can be
used for report-based notifications.
Content Only links and attached reports are available. Information in the
attached report is based on the record permissions of the Platform user
who creates the report. If the report creator has permission to private
fields, all reports sent through the distribution will include the data of
the private fields, even if the recipient does not have access to the
fields.
Scenario A Platform user wants to send a weekly report to managers for feedback.
Scenario A Platform user wants to send a weekly report to colleagues for feedback.
Result Once a week, a notification with a link to the report is sent to the group of
colleagues. A recipient clicks on the link to view the report that contains
information based on the record permissions of the recipient.
The following elements are specific to notifications generated from Training and
Awareness Campaigns.
Content Custom text or specified pre-built content from any module to which a
user has ownership rights. The notification content of a Training and
Awareness Campaign event includes a static text introduction, dynamic
content placeholders for a trigger, and a static text closing.
Delivery Acceptance and Quiz events have reminders. Presentation events are sent
only once.
Discussion Forums
The notifications from Discussion Forums are subscription-based notifications.
Platform users can subscribe to receive notifications when messages are posted to a
forum, posted to a topic, or posted to a message.
The following elements are specific to notifications generated from Discussion
Forums.
Recipient Only Platform users can receive notifications from Discussion Forums.
Managing Letterheads
Letterheads define the page, header, body, and footer properties used by a
notification template. Once you create a letterhead, you can use it in multiple
notification templates.
You can perform the following letterhead tasks:
l Create a Letterhead
l Update the General Properties of a Letterhead
l Define the Layout of a Letterhead
l Delete a Letterhead
Create a Letterhead
Complete this to add a new letterhead by creating a new, original letterhead or
copying an existing letterhead, then naming and describing the letterhead. You then
define the layout for the letterhead, which includes specifying the background
design properties and content to be included in the header and footer.
Procedure
1. Navigate to the Manage Letterheads page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Letterheads.
The Manage Letterheads page is displayed. This page lists all existing
letterheads in the Platform.
2. Click Add New.
Note: This link is displayed only if your user account has create rights for this
page.
4. Click OK.
The Manage Letterhead page is displayed for the new letterhead. This page
enables you to specify the properties of the letterhead.
Next Steps
Update the General Properties of a Letterhead
Procedure
1. Select the letterhead that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Letterheads.
The Manage Letterheads page is displayed. This page lists all existing
letterheads in the Platform.
d. Click the letterhead.
2. On the General tab, complete the General Information section:
a. In the Name field, enter a name for the letterhead.
b. To prevent anyone from using this notification, select Inactive in the Status
field. Otherwise, select Active.
c. In the Description field, enter a description of the letterhead
3. Review the information in the remaining fields in this section.
4. Click Apply.
Next Steps
Define the Layout of a Letterhead
Procedure
1. Select the letterhead that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Letterheads.
The Manage Letterheads page is displayed. This page lists all existing
letterheads in the Platform.
d. Click the letterhead.
2. Click the Layout tab and define the layout for the letterhead.
3. Using the options in the Toolbar field, specify properties for the letterhead.
Click Page Properties, Header Properties, Body Properties, and Footer
Properties. For each of these dialog boxes, complete the following steps:
a. Under Fill Properties, in the Background Fill field, select No Fill or Solid
Fill.
b. If you selected Solid Fill, in the Background Color field, use the color
picker to select the desired background color.
c. Under Border Settings, in the Line Color field, use the color picker to
select the desired border color.
d. In the Line Height field, enter the desired line height in pixels. For no
border, enter a height of 0.
e. Click OK.
Note: The settings in the Header Properties, Body Properties and Footer
properties dialog boxes override the settings in the Page Properties dialog box.
4. In the Header field and in the Footer field, enter or paste the text that you want
to appear in the header and footer.
You can use the options in the rich text editor toolbar to modify the appearance
of the text.
5. Click Save.
Delete a Letterhead
Complete this task to delete a letterhead that is no longer needed.
Procedure
1. Navigate to the Manage Letterheads page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Letterheads.
The Manage Letterheads page is displayed. This page lists all existing
letterheads in the Platform.
2. Click the row and view the description of the letterhead that you want to delete.
Configuring Notifications
The Notification settings for an instance must be specified in the RSA Archer
Control Panel before the notifications can be sent in the Platform.
In the Platform, the Notifications functionality must be enabled in Application
Builder for all modules with records used to generate notifications. When a defined
trigger occurs in a module, the Platform uses the notification blueprint to generate
and send notifications to selected recipients.
The Notifications feature enables administrators to define default values for all
notification blueprints and the read-receipt functionality. The global notification
settings determine the default options and values used across all notification
blueprints of an instance.
The Read Receipt properties enable administrators to activate the read receipt
functionality. An email account is designated to track the receipt of notifications
triggered by a notification blueprint.
Recipients can receive notifications using any email-based device. Platform users
can select the notifications that they want to receive from the User Preferences
menu.
The following options are defined in the General tab for the Notifications feature.
Option Description
Server Address Specifies the IP address to the mail server. By default, this
address is blank.
Email Link Format Specifies the format of notifications. Select the applicable
value. The valid values include the following:
l Default. The designated default value.
l Truncated. Reduces the amount of text automatically
inserted into the notification. If you experience errors
using the Default option, select this option.
l Lotus Notes. Generates notifications through Lotus Notes.
Number of Retries Designates the number of times the notification job attempts
to send the notification through the mail server when there
are failures, for example, a bad email address. By default, this
option is set to zero (0).
Retry Timeout (sec) Designates the number of seconds between retry attempts. By
default, this option is set to zero (0).
Default From Address Specifies the email address of the sender as a failback
measure in case the From Address is not entered. By default,
this option is blank. An email address must be entered for
this option to create an instance.
The following settings are default values, but can be overridden in the individual
notification blueprints.
Settings Description
Letterhead Specifies the default letterhead that is used. The right column
displays a preview of the selected letterhead.
XML Notifications do not contain letterheads.
Body Layout Specifies the default layout of the body, including how the data
is arranged. The Table body layout arranges the content in a
structured format. All other body layouts are free-form layouts,
and content can be arranged anywhere in the body.
From Address Specifies the default email address from which notifications are
sent. The Default From Address established for the instance is
used if this one is not provided.
From Alias Specifies the default email alias for the From Address.
Attachment Type Specifies the default attachment type. The following types are
available:
Property Description
Email Address Specifies the email address that receives the return receipts.
Server Name Specifies the server name or IP address of the mail server on
which the return-receipt email account is created.
The Server Name is the same server name or IP address that was
used when configuring the Notifications for the instance.
User Name Specifies the name of the user who has access to the return-
receipt email account.
Test Connection Verifies that the credentials and connection information entered
are correct.
If the test reports an error, correct the error and click Test again.
Continue this process until a confirmation message indicating
success is displayed.
Note: The default settings are overridden by the settings of the individual
notifications.
You can perform the following tasks from the Manage Global Notification Settings
page:
l Configure Default Settings
l Define Read Receipt Properties
Procedure
1. Navigate to the Manage Global Notification Settings page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Global Notification Settings.
2. In the Default Notification Settings section, from the Letterhead list, select
the default letterhead that you want to use.
For more information on configuring letterheads, see Managing Letterheads.
3. In the Body Layout field, click Select.
4. Preview and select the desired layout and click OK.
5. In the From Address field, enter a default email address.
6. In the From Alias field, enter a default email alias.
7. From the Attachment Type list, select one of the default attachment types:
l Adobe PDF
l CSV
l HTML File
l Microsoft Excel
l Microsoft Word
l XML File
8. Click Apply.
Important: After the application pulls read-receipt information from the email
account that you define on this page, all emails are deleted from that account to
prevent the account from exceeding its storage limit.
Procedure
1. Navigate to the Manage Global Notification Settings page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Global Notification Settings.
2. Complete the Read Receipt Properties section:
a. In the Status field, select whether the read-receipt functionality is Active or
Inactive.
If you select Active, Notification administrators can configure any template
to request read-receipts when emails are sent to template subscribers.
b. In the Email Address field, enter the email address that should receive the
messages.
For best results, set up an account on your organization's email server for
this purpose.
c. In the Server Name field, enter the server name or IP address of the mail
server on which you created the return-receipt email account.
This most likely is the same server name or IP address used when
configuring notifications during the installation process.
d. From the Protocol list, select the protocol used to retrieve emails from your
organization's email server.
e. In the Port field, enter the appropriate port for the selected protocol.
f. In the User Name field, enter the user name that has access to the return-
receipt email account.
g. In the Password field, enter the password that is required to log on to the
return-receipt email account.
h. In the Test Connection field, click Test to verify that the credentials and
connection information you have entered are correct.
If the test reports an error, correct the error and click Test again. Continue
this process until you receive a confirmation message indicating success.
3. Click Save.
Procedure
1. Navigate to the Manage Subscriptions Notifications page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Subscription Notifications.
The Manage Subscription Notifications page is displayed. This page lists all
existing subscription notifications in the Platform.
2. Click Add New.
Note: This link is displayed only if your user account has create rights for this
page.
Next Steps
Update the General Properties of a Subscription Notification
Procedure
1. Select the subscription notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Subscription Notifications.
The Manage Subscription Notifications page is displayed. This page lists all
existing subscription notifications in the Platform.
d. Click the subscription notification.
2. On the General tab, complete the General Information section:
a. In the Name field, enter a name for the notification.
b. To prevent anyone from using this notification, select Inactive from the
Status list. Otherwise, select Active.
c. In the Description field, describe the notification.
3. From the Folder list, select the folder in which to store the notification.
To create a new folder, on the Manage Folders page, click Edit and then click
Add New. After naming the new folder, click OK to return to the previous
page.
4. Review the information in the remaining fields in this section.
5. Click Apply.
Next Steps
Define the Layout of a Subscription Notification
Procedure
1. Select the subscription notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Subscription Notifications.
The Manage Subscription Notifications page is displayed. This page lists all
Next Steps
Select the Content to Display in a Subscription Notification
Procedure
1. Select the subscription notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Subscription Notifications.
The Manage Subscription Notifications page is displayed. This page lists all
existing subscription notifications in the Platform.
d. Click the subscription notification.
2. Click the Content tab.
The Template Design section is displayed.
3. In the Subject field, enter the text that you want to appear in the email subject
line.
You also can include fields (but not reports or links) in the subject line as
dynamic information. To enter a field, place your cursor in the desired location
of the Subject field and select the appropriate field from the Toolbar list.
Note: You cannot include the following fields in the subject line: Attachment,
Cross-Application Status Tracking, Image, Record Permissions, Risk
Assessment, Sub-Form, Questionnaire Reference, Access History, and History
Log.
4. In the Body fields, enter the text that you want to display in the body of the
message.
You can use the options in the rich text editor toolbar to modify the appearance
of the text.
5. (Optional) To include fields, reports, and links in the body, place your cursor in
the desired location of a Body field and select the desired information to insert
from the Select a Field, Select a Report, or Select a Link lists.
Important: In version 5.0.2, you cannot display a statistical chart in a
notification.
6. (Optional) To change the layout of the boxes that make up the Body fields, click
the General tab and select a layout from the Body Layout list in the Template
Design section.
7. Click Apply.
Next Steps
Define the Email Properties of a Subscription Notification
Procedure
1. Select the subscription notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Subscription Notifications.
The Manage Subscription Notifications page is displayed. This page lists all
existing subscription notifications in the Platform.
d. Click the subscription notification.
Next Steps
Configure the Delivery Schedule for a Subscription Notification
Procedure
1. Select the subscription notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Subscription Notifications.
The Manage Subscription Notifications page is displayed. This page lists all
existing subscription notifications in the Platform.
d. Click the subscription notification.
2. Click the Delivery tab.
3. In the Delivery Schedule section, from the Frequency list, select the
frequency.
Depending on your selection, additional fields may be displayed in this section.
Use these fields to set the specific time to send the notification.
4. Complete any additional fields in the Delivery Schedule section.
5. Click Apply.
Next Steps
Select the Subscription Options for a Subscription Notification
Procedure
1. Select the subscription notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Subscription Notifications.
The Manage Subscription Notifications page is displayed. This page lists all
existing subscription notifications in the Platform.
d. Click the subscription notification.
2. Click the Delivery tab.
3. In the Subscriptions section, select one of the following options:
l None. Users are not subscribed by default. Users can subscribe to the
notification at any time and, if they choose, cancel their subscription.
l New Users. New users receive notifications by default, but they can cancel
the subscription at any time.
l All Users. New and existing users receive notifications by default, but they
can cancel the subscription at any time.
4. Click Apply.
Next Steps
Select the Recipients of a Subscription Notification
Procedure
1. Select the subscription notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Subscription Notifications.
The Manage Subscription Notifications page is displayed. This page lists all
existing subscription notifications in the Platform.
d. Click the subscription notification.
2. Click the Delivery tab.
3. In the Recipients section, select the users and groups to receive the
notifications:
a. In the Available section, use the Find box to find users and groups to send
the notification.
b. Click the user or group to display it in the Selected section.
You also can find and select groups to determine the recipients dynamically.
4. Verify that the users, groups, and fields that are displayed in the Selected
section are your intended recipients.
5. Click Apply.
Next Steps
Establish Filter Criteria for a Subscription Notification
Procedure
1. Navigate to the Manage Subscriptions Notifications page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Subscription Notifications.
The Manage Subscription Notifications page is displayed. This page lists all
existing subscription notifications in the Platform.
2. Click the subscription notification that you want to edit.
3. Click the Filter Criteria tab.
Each row on this page represents one set of filter criteria.
4. To set filter criteria for the subscription, complete the following steps:
a. In the Field To Evaluate column, select the field to evaluate for one or
more specific values.
Procedure
1. Navigate to the Manage Subscriptions Notifications page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Subscription Notifications.
The Manage Subscription Notifications page is displayed. This page lists all
existing subscription notifications in the Platform.
2. Click the row of the notification that you want to delete.
The row expands to display a description of the notification.
Procedure
1. Navigate to the Manage Scheduled Report Distributions page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Scheduled Report Distributions.
The Manage Scheduled Report Distributions page is displayed. This page lists
all report distributions in the Platform.
Note: This link is displayed only if your user account has create rights for this
page.
Next Steps
Update the General Properties of a Scheduled Report Distribution
Procedure
1. Select the report distribution that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Scheduled Report Distributions.
The Manage Scheduled Report Distributions page is displayed. This page
lists all report distributions in the Platform.
d. Click the report distribution.
Next Steps
Define the Layout of a Scheduled Report Distribution
Procedure
1. Select the report distribution that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Scheduled Report Distributions.
The Manage Scheduled Report Distributions page is displayed. This page
lists all report distributions in the Platform.
d. Click the report distribution.
2. On the General tab, scroll down to the Template Design section.
3. From the Letterhead list, select the desired letterhead.
4. In the Body Layout field, click Select to open the Body Layouts dialog box.
5. Select a layout and click OK.
The preview displayed in the Preview field is updated based on your selection.
6. Verify that the preview displayed in the Preview field meets your needs.
7. Click Apply.
Next Steps
Select the Content to Display in a Scheduled Report Distribution
Procedure
1. Select the report distribution that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Scheduled Report Distributions.
The Manage Scheduled Report Distributions page is displayed. This page
lists all report distributions in the Platform.
d. Click the report distribution.
2. Click the Content tab.
The Report Attachments and Template Design sections are displayed.
3. In the Report Attachments section, click Select in the Reports field and
select the report or reports that you want to embed in the email distribution, and
click OK.
4. From the Attachment Type list, select the format of the report or reports.
Note: Use caution when sending reports with restricted data. The records and
fields that are displayed in the report are based on the access restrictions of the
user setting up this notification. As such, it is possible that the recipient, who
may be otherwise restricted from certain data, could receive and view that data
in the report.
5. In the Template Design section, in the Subject field, enter the text that you
want displayed in the email subject line.
To include fields (but not reports or links) in the subject line as dynamic
information, place your cursor in the body location and click the Select a Field
list, and select the field from the list.
Note: You cannot include the following fields in the subject line: Attachment,
Cross-Application Status Tracking, Image, Record Permissions, Risk
Assessment, Sub-Form, Questionnaire Reference, Access History, and History
Log.
6. In the Body fields, enter the text that you want displayed in the body of the
message.
You can use the options in the rich text editor toolbar to modify the appearance
of the text.
7. (Optional) To enter dynamic information, such as reports and links in the body,
place your cursor in the location and click the Select a Report drop-down list or
the Select a Link icon. Select the information to insert it into the body.
8. (Optional) To define how the boxes that make up the Body fields are arranged
in the message, on the General tab, select a layout from the Body Layout list in
the Template Design section.
9. Click Apply.
Next Steps
Define the Email Properties of a Scheduled Report Distribution
Procedure
1. Select the report distribution that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Scheduled Report Distributions.
The Manage Scheduled Report Distributions page is displayed. This page
lists all report distributions in the Platform.
d. Click the report distribution.
2. Click the Delivery tab.
3. In the Email Properties section, do the following:
a. In the From Address field, enter the "From" address.
b. In the From Alias field, enter the appropriate alias.
c. From the Importance list, select the appropriate importance level.
d. From the Read Receipt list, select either to enable or disable return
receipts.
Note: This option is available only if you have enabled Read Receipt
functionality in Global Notification Settings. For more information on
enabling this functionality, see Define Read Receipt Properties.
4. Click Apply.
Next Steps
Configure the Delivery Schedule of a Scheduled Report Distribution
Procedure
1. Select the report distribution that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Scheduled Report Distributions.
The Manage Scheduled Report Distributions page is displayed. This page
lists all report distributions in the Platform.
d. Click the report distribution.
2. Click the Delivery tab.
3. In the Delivery Schedule section, from the Frequency list, select the
frequency.
Depending on your selection, additional fields may be displayed in this section.
Use these fields to set the specific time to send the notification.
4. Complete any additional fields in the Delivery Schedule section.
5. Click Apply.
Next Steps
Select the Recipients of a Scheduled Report Distribution
Procedure
1. Select the report distribution that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Scheduled Report Distributions.
The Manage Scheduled Report Distributions page is displayed. This page
lists all report distributions in the Platform.
d. Click the report distribution.
2. Click the Delivery tab.
3. In the Recipients section, select the users and groups to receive the
notifications:
a. In the Available section, use the Find box to find users and groups to send
the distribution to.
b. Double-click the group or user to display it in the Selected area.
You also can find and select groups to dynamically determine the recipients.
4. Verify that the users and groups that are displayed in the Selected section are
your intended recipients.
5. Click Save.
Procedure
1. Navigate to the Manage Scheduled Report Distributions page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage Scheduled Report Distributions.
The Manage Scheduled Report Distributions page is displayed. This page lists
all report distributions in the Platform.
Chapter 7: Reports
Procedure
1. Navigate to the Manage On Demand Notification Templates page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage On Demand Notification Templates.
The Manage On Demand Notification Templates page is displayed. This
page lists all existing On Demand notification templates in the Platform.
2. Click Add New.
Note: This link is displayed only if your user account has create rights for this
page.
Chapter 7: Reports 59
RSA Archer GRC Platform Notifications
Next Steps
Procedure
1. Select the On Demand notification template that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage On Demand Notification Templates.
The Manage On Demand Notification Templates page is displayed. This
page lists all existing On Demand notification templates in the Platform.
d. Click the On Demand notification template.
The Manage On Demand Notification Templates page is displayed. On this
page, you can specify the properties for that On Demand notification
template.
2. On the General tab, complete the General Information section:
a. In the Name field, enter a name for the notification.
b. To prevent anyone from using this notification, select Inactive from the
Status list; otherwise, select Active.
c. In the Description field, describe the notification.
60 Chapter 7: Reports
RSA Archer GRC Platform Notifications
3. From the Folder list, select the folder in which to store the notification. To
create a new folder, click Edit and click Add New on the Manage Folders
page. After naming the new folder, click OK to return to the previous page.
4. Review the information in the remaining fields in this section.
5. Click Apply.
Next Steps
Define the Layout of an On Demand Notification Template
Procedure
1. Navigate to the Manage On Demand Notification Templates page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage On Demand Notification Templates.
The Manage On Demand Notification Templates page is displayed. This
page lists all existing On Demand notification templates in the Platform.
2. On the General tab, scroll down to the Template Design section.
3. From the Letterhead list, select the desired letterhead.
4. In the Body Layout field, click Select to open the Body Layouts dialog box.
Select a layout and click OK.
The preview displayed in the Preview field is updated based on your selection.
5. Verify that the preview displayed in the Preview field meets your needs.
6. Click Apply.
Next Steps
Select the Content to Display in an On Demand Notification Template
Chapter 7: Reports 61
RSA Archer GRC Platform Notifications
Procedure
1. Select the On Demand notification template that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage On Demand Notification Templates.
The Manage On Demand Notification Templates page is displayed. This
page lists all existing On Demand notification templates in the Platform.
d. Click the On Demand notification template.
The Manage On Demand Notification Templates page is displayed. On this
page, you can specify the properties for that On Demand notification
template.
2. Click the Content tab.
The Template Design section is displayed.
3. In the Subject field, enter the text that you want to display in the email subject
line.
You also can include fields (but not reports or links) in the subject line as
dynamic information. To enter a field, place your cursor in the desired location
of the Subject field and select the appropriate field from the Toolbar list.
Note: You cannot include the following fields in the subject line: Attachment,
Cross-Application Status Tracking, Image, Record Permissions, Risk
Assessment, Sub-Form, Questionnaire Reference, Access History, and History
Log.
4. In the Body fields, enter the text that you want to display in the body of the
message.
You can use the options in the rich text editor toolbar to modify the appearance
of the text.
5. (Optional) To enter dynamic information in the body, such as fields, reports, and
links, place your cursor in the desired location of a Body field and select the
desired information to insert from the Select a Field, Select a Report, or Select
a Link lists.
62 Chapter 7: Reports
RSA Archer GRC Platform Notifications
6. (Optional) To define how the boxes that make up the Body fields are arranged
in the message, click the General tab and select a layout from the Body Layout
list in the Template Design section.
7. Click Apply.
Next Steps
Select the Recipients of an On Demand Notification Template
Procedure
1. Select the On Demand notification template that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage On Demand Notification Templates.
The Manage On Demand Notification Templates page is displayed. This
page lists all existing On Demand notification templates in the Platform.
d. Click the On Demand notification template.
The Manage On Demand Notification Templates page is displayed. On this
page, you can specify the properties for that On Demand notification
template.
2. Click the Delivery tab.
3. In the Recipients section, use the To, CC, and BCC fields to select the
recipients of the notification. You can enter dynamic or static email addresses:
l To enter dynamic email addresses, click Select in the appropriate Dynamic
field to open the selection box. In the Available section, select the groups,
users, and fields to receive notifications generated by this template. Click a
group, user, or field to display it in the Selected section and click OK.
Chapter 7: Reports 63
RSA Archer GRC Platform Notifications
Note: To search for a specific user or group, expand the User or Group node
and click the value. Your selection is displayed in the Selected column.
l To enter static email addresses, enter the email address in the appropriate
Static field. Use a semicolon to separate multiple addresses.
4. Click Apply.
Next Steps
Determine the Access Rights for an On Demand Notification Template
Procedure
1. Select the On Demand notification template that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage On Demand Notification Templates.
The Manage On Demand Notification Templates page is displayed. This
page lists all existing On Demand notification templates in the Platform.
d. Click the On Demand notification template.
The Manage On Demand Notification Templates page is displayed. On this
page, you can specify the properties for that On Demand notification
template.
2. Click the Access tab.
This tab is displayed only for On Demand notifications.
3. Do one of the following:
l To enable all application users to have access to this template, select Public.
l To grant specific rights to selected users and groups, select Private. In the
Available section, select the groups and users to assign to this access role.
The selected groups and users are displayed in the Selected section.
64 Chapter 7: Reports
RSA Archer GRC Platform Notifications
Note: To search for a specific user or group, expand the User or Group node
and click the value. Your selection is displayed in the Selected column.
4. Click Save.
Procedure
1. Navigate to the Manage On Demand Notification Templates page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage On Demand Notification Templates.
The Manage On Demand Notification Templates page is displayed. This
page lists all existing On Demand notification templates in the Platform.
4. Click the row of the notification that you want to delete.
The row expands to display a description of the notification.
Chapter 7: Reports 65
RSA Archer GRC Platform Notifications
Procedure
1. Navigate to the Manage XML Notifications page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage XML Notifications.
The Manage XML Notifications page is displayed. This page lists all
existing XML notifications in the Platform.
2. Click Add New.
Note: This link is displayed only if your user account has create rights for this
page.
Next Steps
Update the General Properties of an XML Notification
Procedure
1. Select the XML notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage XML Notifications.
The Manage XML Notifications page is displayed. This page lists all
existing XML notifications in the Platform.
d. Click the XML notification.
2. On the General tab, complete the General Information section:
a. In the Name field, enter a name for the notification.
b. To prevent anyone from using this notification, select Inactive from the
Status list; otherwise, select Active.
c. In the Description field, enter a description of the notification.
3. From the Folder list, select the folder in which to store the notification.
To create a new folder, click Edit and click Add New on the Manage Folders
page. After naming the new folder, click OK to return to the previous page.
4. Review the information in the remaining fields in this section.
5. Click Apply.
Next Steps
Select the Content to Display in an XML Notification
Procedure
1. Select the XML notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage XML Notifications.
The Manage XML Notifications page is displayed. This page lists all
existing XML notifications in the Platform.
d. Click the XML notification.
2. Click the Content tab.
The Template Design section is displayed.
3. In the Subject field, enter the text that you want to be displayed in the email
subject line.
You also can include fields in the subject line as dynamic information. To enter
a field, place your cursor in the desired location in the Subject field and from
the Toolbar list, select the field.
Note: You cannot include the following fields in the subject line: Attachment,
Cross-Application Status Tracking, Image, Record Permissions, Risk
Assessment, Sub-Form, Questionnaire Reference, Access History, and History
Log.
4. In the Body field, select the fields that are to be included in the notification in
the Available section.
The fields that are included in the notification are displayed in the Selected
section.
5. Click Apply.
Next Steps
Define the Email Properties of an XML Notification
Procedure
1. Select the XML notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage XML Notifications.
The Manage XML Notifications page is displayed. This page lists all
existing XML notifications in the Platform.
d. Click the XML notification.
2. Click the Delivery tab.
3. In the Email Properties section, do the following:
a. In the From Address field, enter the "From" address.
b. In the From Alias field, enter the appropriate alias .
c. From the Importance list, select the appropriate importance level .
d. From the Read Receipt list, select to enable or disable return receipts.
Note: This option is available only if you have enabled Read Receipt
functionality in Global Notification Settings. For more information on
enabling this functionality, see Define Read Receipt Properties.
4. Click Apply.
Next Steps
Configure the Delivery Schedule of an XML Notification
Procedure
1. Select the XML notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage XML Notifications.
The Manage XML Notifications page is displayed. This page lists all
existing XML notifications in the Platform.
d. Click the XML notification.
2. Click the Delivery tab.
3. In the Delivery Schedule section, from the Frequency list, select the
frequency.
Depending on your selection, additional fields may be displayed in this section.
Use these fields to set the specific time to send the notification.
4. Complete any additional fields in the Delivery Schedule section.
5. Click Apply.
Next Steps
Select the Recipients of an XML Notification
Procedure
1. Select the XML notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage XML Notifications.
The Manage XML Notifications page is displayed. This page lists all
existing XML notifications in the Platform.
d. Click the XML notification.
2. Click the Delivery tab.
3. In the Recipients section, enter the email address or addresses to send the
Next Steps
Establish Filter Criteria for an XML Notification
Procedure
1. Select the XML notification that you want to edit:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage XML Notifications.
The Manage XML Notifications page is displayed. This page lists all
existing XML notifications in the Platform.
d. Click the XML notification.
2. Click the Filter Criteria tab.
Each row on this page represents one set of filter criteria.
3. Complete the following steps:
a. In the Field To Evaluate column, select the field to evaluate for one or
more specific values.
Procedure
1. Navigate to the Manage XML Notifications page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Notifications.
c. Click Manage XML Notifications.
The Manage XML Notifications page is displayed. This page lists all
existing XML notifications in the Platform.
2. Click the row of the notification that you want to delete.
The row expands to display a description of the notification.
Chapter 9: Reports
Notification Reports
The following table describes the system reports in the Notifications application.
You can find these reports by clicking Navigation Menu > Administration >
Notifications > View Notification Reports.
Report Description
Notification Engine Provides the number of successful and failed notification email
Recent Activity - Last deliveries within the last 24 hours.
24 Hours
Notifications Failed Provides a list of notification emails that delivery failed. It lists
Email Attempts the users whose mailbox the email attempted to reach, the
email address of the recipient, the date and time of the last
email attempt, and the total number of delivery failures.
Notifications Sent Provides a list of all notification emails that have been sent. It
lists the email ID, the user who received the email, the email
address of the recipient, and the From address for the email. The
report also shows the notification template that triggered each
email, the subject line of each email, and the date and time
each email was sent.
Chapter 9: Reports 75
RSA Archer GRC Platform Notifications
Cause Solution
The job engine is not running Start the Job Engine in the Windows Services.
in the Windows Services.
Cause Solution
The wrong type of Ensure you are using the correct type of notification
notification blueprint is used blueprints for the data that is being triggered.
for the triggering data.
Subscription notifications are triggered when a record is
updated. Records can be updated manually or through a
data feed.
Reminder notifications are based on specific criteria. All
criteria must be met to trigger a notification.
The record in the data feed Ensure the data feed is configured for sending
does not trigger the notifications. Select Send Notifications in the
notifications. Additional Properties of the data feed.
DDE Generate Notification action and On-Demand
notifications are not triggered from data feed.
Use Subscription Notifications in a data feed so that
data is access on the schedule of the notifications.
Reminder notifications are based on specific criteria. All
criteria must be met to trigger a notification.
The notification jobs are not Set the job priority in the Job Engine Manager. For
prioritized properly. more information, see "Set Filters" in the RSA Archer
Control Panel Help.
There are many jobs ahead of Change the priority of the SendNotificationJob or
the notification job types. SendMessagesJob notification job types.
Cause Solution
The user does not have Check the Access Roles of the user to ensure that
permissions to view the record. the user has access rights to the module of that
record.
Ensure that the user has access rights to view that
record, including Cross-Reference fields and related
records.
l XML notification
l DDE Generate Notification action
Scenario 2. Notification is evaluated and sent every day for all records where
"Date Field 1" is less than 999 days before the current date.
Scenario 3. Notification is evaluated and sent only once for all records where
"Date Field 1" is 1 day before the current date. The Occurrence is defined as Once
because the Target date cannot be continually equal to the number of days before
the current date.
Scenario 4. Notification is evaluated and sent only once for all records where
"Date Field 1" is 999 days before the current date. The Occurrence is defined as
Once because the Target date cannot be continually equal to the number of days
before the current date.
Scenario 6. Notification is evaluated and sent every day for all records where
"Date Field 1" is less than 999 days after the current date.
Scenario 7. Notification is evaluated and sent only once for all records where
"Date Field 1" is equal to 1 day after the current date. The Occurrence is defined
as Once because the Target date cannot be continually equal to a number of days
after the current date.
Scenario 8. Notification is evaluated and sent only once for all records where
"Date Field 1" is equal to 999 days after the current date. The Occurrence is
defined as Once because the Target date cannot be continually equal to a number of
days after the current date.
Notification Reports
Notification reports provide the success and failure status of notifications.
Notifications still in the queue are not reported. To access these reports, click
Navigation Menu > Administration > Notifications > View Notification Reports.
The following table provides information to help troubleshoot issues using the
Notification Engine Recent Activity - Last 24 Hours Report.
Message
Problem Solution
Status
Successful The notifications are Check the Junk E-Mail folder or other email
sent successfully, but folders of the recipient.
the recipient does not
If the notification is not in another folder,
receive it.
generate the Notifications Sent report to view
that the Recipient Email Address is correct.
The recipient only sees Recipients do not have permission to view the
part of the content. record. If this is happening:
1. Check the modules record permission
fields to be sure the recipient is allowed to
see the records.
2. Check the rights of the roles assigned to
the groups that the recipient belongs.
3. Check the rights of the roles assigned to
the recipient.
4. Modify the rights and permissions
appropriately and resend the notifications.
Failed The notifications failed Ensure that the Server Address is correct in the
to be sent. RSA Archer Control Panel > General Settings
of the instance.
Ensure the user account of the recipient has an
email address. See "Managing Users" in the
Help Center.
N/A If the report does not Check the notification rules to be sure that
show any notifications, they are valid and will trigger. If that is the
the notifications did issue, modify the rules and send again.
not trigger.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Packaging
Contents
Preface 5
About this Guide 5
Mapping Process Rules 6
Supported Objects 7
Unsupported Objects 7
Product Documentation 8
Support and Service 8
Chapter 1: Packages 11
Packaging Processes 11
Manage Packages Process 11
Map Objects Process 12
Install Packages Process 12
Packaging Rules 14
Audit Fields 14
Calculations 14
Data Driven Events 14
Default Value 15
Documentation Attachments 15
Fields 15
Filter Criteria 16
Key Fields 16
Levels in Applications 16
Personal Reports 16
Record Permissions 16
Status Field 17
Trending Charts 17
Users and Groups 21
Values Lists 22
Workflow 22
Packaging Considerations 22
Authoritative Source and Control Standard References 23
Database Back Up and Recovery 23
How Packaging Jobs Are Executed 23
Installing Packages from Previous Versions 23
Licensing Issues 24
Recommended Development Environment 24
Packaging Terminology 24
System Performance 25
Package File Size 25
Virtual Memory Size 25
Chapter 2: Package Management 27
Manage Packages: Administrative Overview 27
Create a Package 28
Update the General Information of a Package 29
3
RSA Archer GRC Platform Packaging
4
RSA Archer GRC Platform Packaging
Preface
A package can contain one or more objects. Multiple objects can be copied at the
same time. Elements in existing objects can be added or updated as well. The
instance from which objects are being copied is called the Source instance. The
instance to which objects are being copied is called the target instance.
Normally, objects or references are not deleted in the target instance. An exception
is with data driven event (DDE) notifications. Recipients in source instance replace
the recipients in the target instance. For all other objects, data from the source
instance is merged with the target instance.
Root objects can stand alone. A Level 1 object cannot exist without a root object.
Level 2 objects cannot exist without a Level 1 object. Some Level 1 objects have
child objects, for example, a Values List is a child of the custom Values List field.
The Values List includes individual Values List values. All objects and elements
are transferred within a package.
Preface 5
RSA Archer GRC Platform Packaging
Root objects, Level 1 objects, and Level 2 objects are listed in the following figure.
Packaging includes the Advanced Package Mapping feature for mapping objects
from the source instance to the target instance. By default, this feature is activated
during the Platform installation. If you are not using Advanced Package Mapping,
you can deactivate this feature in the General Settings of the RSA Archer Control
Panel.
When installing a package with a core module in to a target instance in which it
does not exist currently, that core module must be licensed prior to the package
installation in the target instance.
6 Preface
RSA Archer GRC Platform Packaging
Supported Objects
The following objects are supported in Packaging:
l Applications l Folders
l Dashboards l Solutions
l iViews l Workspaces
Note: Folders are used to organize certain user-created objects, such as iViews and
Mail Merge templates. iViews must exist in the package from the source instance.
Values List values is a child object of Global Values Lists.
Unsupported Objects
Packaging does not support all objects in an instance. The objects not supported
include, but are not limited to, the following:
l Personal dashboards
Preface 7
RSA Archer GRC Platform Packaging
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
8 Preface
RSA Archer GRC Platform Packaging
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 9
RSA Archer GRC Platform Packaging
Chapter 1: Packages
Packaging Processes
The instance from which objects are being copied is called the source instance. The
instance to which objects are being copied is called the target instance. Multiple
objects can be copied at the same time. Elements in existing objects can be added
or updated as well. Normally, objects or references are not deleted in the target
instance. An exception is with data driven event (DDE) notifications. Recipients in
the source instance replace the recipients in the target instance. For all other
objects, data from the source instance is merged with the target instance.
The Packaging processes are:
1. Manage Packages
2. Map Objects
3. Install Packages
Chapter 1: Packages 11
RSA Archer GRC Platform Packaging
12 Chapter 1: Packages
RSA Archer GRC Platform Packaging
Chapter 1: Packages 13
RSA Archer GRC Platform Packaging
Packaging Rules
The Packaging process requires a large amount of rules and logic to determine how
the individual elements in applications and questionnaires are migrated from one
instance of the Platform to another. In general, Packaging does not delete objects or
permission settings. It only adds new or updates existing objects and permission
settings. Exceptions include layout and workflow, in which packaging replaces the
existing settings.
See the following topics for additional rules and logic:
Audit Fields
Packaging rules related to audit fields include:
l The Created By and Last Updated values for all elements created during the
package installation are attributed to the user who installed the package.
l The Last Updated value for all elements that are updated during the package
installation are attributed to the user who installed the package.
Calculations
Packaging does not update the ordering of calculations. New calculations are added
to the bottom of the order.
14 Chapter 1: Packages
RSA Archer GRC Platform Packaging
layout is applied, the package installation removes the settings for the layout
objects that are no longer applicable.
Default Value
Packaging rules for Default Values abide by the following if a new field is created
with a default value, or if a default value is added to an existing field, the existing
content in the target instance is not updated with the default value.
Documentation Attachments
Packaging rules related to documentation attachments include:
l Packaging includes attachment files for objects that include a documentation
attachment attribute in the configuration. These include:
o Solutions documentation
o Applications documentation
o Questionnaires documentation
o Workspaces documentation
o Dashboards documentation
o iViews documentation (for all iView types)
o Mail Merge templates report template
l The user who installed the package is listed as the Creator for the attachments.
l Existing file attachments are not deleted during the installation process.
l Attachments in the package are not matched but added to the target instance. If
the attachment already exists in the target instance, a duplicate attachment is
created.
Fields
Packaging rules related to fields include:
l All attributes of fields can be updated by the package installation, with the
following exceptions:
o Type
o Created By
o Key Field Designation
o Related Module
o Associated Values List
l An existing private field is not changed to a public field.
Chapter 1: Packages 15
RSA Archer GRC Platform Packaging
Filter Criteria
Packaging rules for Filter Criteria include the following attributes that are updated
during installation:
l Values. If the system cannot map a Values List Value in the target instance, that
item is removed from the Values field for the condition.
l Field to Evaluate. If the system cannot map the field in the target instance, the
condition is migrated as a null condition.
l Condition Order Number
l Operator
l Relationship
l Advanced Operator Logic
Key Fields
Packaging rules for Key Fields abide by the condition if the Key Field in the
package is different from the Key Field in the target instance, the target instance
retains the same Key Field attribute as before the installation.
Levels in Applications
Packaging rules related to levels in applications include:
l Existing levels are not deleted by the package installation.
l The package installation cannot change a leveled application to a flat
application.
l If the levels in the target instance are arranged in a different hierarchy than the
levels in the package, the installation fails.
Personal Reports
Packaging rules for Personal Reports do no install personal reports in the package
installation. To include personal reports, promote the report to a global report before
creating the package in the source instance.
Record Permissions
Packaging rules related to record permissions include:
l User/Groups field population may be added to Record Permissions fields, but
existing ones are not removed by the package installation.
l New inherited fields may be added, but existing ones are not removed by the
package installation.
l If a User/Groups field in the target instance is configured as a Record
Permissions field in the package, the package installation changes the field to the
Record Permissions type.
16 Chapter 1: Packages
RSA Archer GRC Platform Packaging
Status Field
Packaging rules related to status fields include:
l If an existing application or questionnaire is updated, the current status in the
target instance is not changed by the package installation.
l If the package creates a new application or questionnaire and there are not
enough licenses, the new application or questionnaire is set to the Development
status and a warning is logged.
Trending Charts
You can add trending objects (fields and charts) to packages for migrating them to a
target instance. Certain rules apply when packaging trending objects. The main rule
is if the trended field is not added to the package, the layout object cannot be added
to the package.
Trending Rules for System ID-Matched Objects
The Platform uses the following rules when mapping trending objects, which are
explained in the following topics:
l Trending Rules - Trending Enabled
l Trending Rules - Duration Period
l Trending Rules - Referenced Field
l Trending Rules - Trending Chart Objects
Chapter 1: Packages 17
RSA Archer GRC Platform Packaging
Install Target
Source Target Layout
Method Result
Shorter than Longer than Create New Any Retains the duration period
Target Source and Update specified in the Target.
Longer than Shorter than Create New Any Retains the duration period
Target Source and Update specified in the Source.
Install Target
Source Target Layout
Method Result
Trending Field Create New Do Not Field exists in both places. The chart
enabled different Only Override object is updated to reference the field
than the Layout in the Source instance.
field from
the Source
instance.
Trending Field dif- Create New Do Not Field does not exist in the Target
enabled ferent than Only Override instance. The field from the Source
the field Layout instance is created in the Target
from the instance, and then referenced by the
Source trending chart object in the Target
instance instance.
18 Chapter 1: Packages
RSA Archer GRC Platform Packaging
Install Target
Source Target Layout
Method Result
Trending Trending Create New Do Not Target instance is updated with any
enabled enabled and Update Override trending chart properties that exist in
Layout the Source instance. The layout is not
affected.
Trending Trending Create New Override Target instance is updated with any
enabled enabled and Update Field trending chart properties that exist in
the source. The position of the
trending chart object on the
application layout and the span
properties are affected.
Trending Trending Create New Override Trending chart object and referenced
enabled disabled and Update Layout field are created in the Target instance.
Application layout matches the Source
instance.
Field in the Target instance is now
trending-enabled, and the associated
trending chart is created in the Target
instance.
Trending Field Create New Do Not Trending chart object and referenced
enabled deleted Only Override field are created in the Target instance.
Layout Application layout is not overridden.
Trending Field Create New Do Not Trending chart object and referenced
Chapter 1: Packages 19
RSA Archer GRC Platform Packaging
Install Target
Source Target Layout
Method Result
enabled deleted and Update Override field are created in the target.
Layout Application layout is not overridden.
Install Target
Source Target Layout
Method Result
Trending Trending Create New Do Not Referenced field exists in both places
object object on Only Override and maps. The trending object is
on layout Layout updated to reference the field in the
layout Source instance.
Trending Trending Create New Do Not Referenced field does not exist in the
object object on Only Override Target instance. The field from the
on lay- layout Layout Source instance is created in the Target
out instance, and then referenced by the
trending object in the Target instance.
Trending Trending Create New Do Not Target instance is updated with any
object object on and Update Override trending chart properties that exist in
on layout Layout the Source instance. The application
layout layout is not changed.
Trending Trending Create New Override Target instance is updated with any
object object on and Update Layout trending chart properties that exist in
on layout the Source instance. The position of the
layout trending object on the application
layout and the span properties are
updated to match the Source instance.
20 Chapter 1: Packages
RSA Archer GRC Platform Packaging
Install Target
Source Target Layout
Method Result
Trending Placeholder Create New Override Trending object and referenced field are
object on layout and Update Layout created in the Target instance.
on Application layout matches the Source
layout instance.
Field in the Target instance is now
trending-enabled, and the associated
trending chart is created in the Target
instance.
Trending Placeholder Create New Do Not Trending object and referenced field are
object on layout Only Override created in the Target instance.
on Layout Application layout is not overridden.
layout
Trending Placeholder Create New Do Not Trending object and referenced field are
object on layout and Update Override created in the target. Application layout
on Layout is not overridden.
layout
Chapter 1: Packages 21
RSA Archer GRC Platform Packaging
l The package installation process attempts to match all groups in the package by
system ID. If no matches are found, the process then attempts to match groups
by group name and domain. The process ignores any groups that do not match.
Values Lists
Packaging rules related to values lists, which may include Global Values Lists,
Questionnaire Values Lists, or Custom Values Lists, include:
l If a Global Values List in the package file matches a Custom Values List in the
target instance, the Custom Values List is promoted to a Global Values List
during installation. However, the opposite is not true. A Global Values List in
the target instance is not demoted to a Custom Values list during installation.
l The following Values List Values attributes are not updated if settings already
exist in the target instance:
o Height
o Default text
l In Custom Ordered Values Lists, new values are added to the end of the list.
Workflow
Packaging rules related to workflow include:
l If a package includes workflow settings, all workflow settings from the package
are installed on the target instance and the prior workflow settings are
overwritten. However, if you select the Create New Only option when installing
a package and at least one stage already exists in the target instance, the
package installation does not make any changes to the existing workflow
settings. If no workflow stages have been defined in the target instance, and you
select the Create New Only option, the package installation updates all
workflow settings as specified in the package.
l If the package does not include any workflow settings, the package installation
does not delete or modify any existing workflow settings in the target instance.
l Any records in a workflow stage that is deleted by the package installation are
routed to the start point of the workflow process.
Packaging Considerations
The following items describe conditions other than packaging rules that can affect
packaging.
l Authoritative Source and Control Standard References
l Database Back Up and Recovery
l How Packaging Jobs Are Executed
22 Chapter 1: Packages
RSA Archer GRC Platform Packaging
The Generate Package File process runs as an Archer Service Account. The Install
Package process impersonates the user who runs the install, so any objects modified
or created during the package installation will be associated with that user.
Chapter 1: Packages 23
RSA Archer GRC Platform Packaging
Licensing Issues
The package installation verifies that core solutions and applications are licensed on
the target instance. If the target instance does not have the proper licenses, the
objects are not installed and errors are logged to the Package Log file. In some
cases, the package installation generates errors when installing packages that
contain core applications that are properly licensed but have not yet been installed
on the target instance.
The resolution is to reapply the license key after the package installation and then
install the package again.
Packaging Terminology
The following terms are exclusive to the packaging process.
Term Definition
24 Chapter 1: Packages
RSA Archer GRC Platform Packaging
Term Definition
System Performance
System performance may vary based on the size of package files. A large number
of cross-reference fields and questionnaires can affect system performance.
Advanced Package Mapping requires a considerable amount of memory, which can
result in loss of data input and IE errors when working with large applications. To
optimize your system for packaging, RSA Archer recommends upgrading to
Silverlight 5 for those users who will be mapping objects. For more information, see
Advanced Package Mapping.
Chapter 1: Packages 25
RSA Archer GRC Platform Packaging
When you select Automatically manage paging file size for all drives, the
operating system automatically takes steps during resource-intensive activities to
protect itself from running out of memory.
If the server in your organization is configured with a fixed size for the paging file,
you can still help prevent out-of-memory errors by configuring the system to
manage paging file sizes on other drives. Otherwise, if the page file is fixed, the
system can incur out-of-memory errors during resource-intensive activities.
26 Chapter 1: Packages
RSA Archer GRC Platform Packaging
This process creates the package and the package description, generates the
package file, and downloads the package file to a location accessible by the target
instance.
By default, the package file is stored in the file repository. When the download is
executed, a different location can be specified.
The following steps describe the Manage Packages process:
1. On the source instance of the Platform, the administrator creates a package.
The package defines which objects to include. The package contains only the
settings. It does not include information about the objects.
2. The administrator generates a package file, which saves the information about
the objects that are specified in the package. The administrator then selects a
network folder to save the package file.
3. On the destination instance of the Platform, the administrator imports and
installs the package file using the Install Packages feature.
Icon Description
Edits the package definition. The definition can be edited before the
package file is generated. After generation, the package file cannot be
edited.
Generates the package file in the file repository. The package file
contains a snapshot of the most current information from the source
instance. After generated, it cannot be updated. If subsequent changes are
made to the source instance, another package file must be generated to
include the changes.
Downloads the package file from the file repository to the desired
location. The package file can be downloaded in the source instance or
to the target instance.
Create a Package
Complete this task to create a package as the first step of the Manage Package
process. A package is a collection of settings that define the components that you
want to migrate. Once the package is defined, it can be generated into a package
file.
Procedure
1. Navigate to the Manage Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Packages.
2. Click Add New.
3. Do one of the following:
l To use the settings of an existing package as a starting point for your new
package, select Copy an existing Package and select the existing package
from the list.
l To select new settings for the package, select Create a new Package from
scratch.
4. Click OK.
The Manage Packages page appears. This page enables you to specify the
properties of the package.
Next Steps
Update the General Information of a Package
Procedure
1. Select the package that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Packages.
c. Click the package.
2. Complete the General Information section:
a. In the Name field, enter a name for the package. This name does not have
to be unique.
b. In the Prepared By field, enter a name for the department or entity that
created the package.
This field is visible to the user after it is imported on the target instance of
the Platform.
c. In the Description field, enter a description for the package.
This description is for internal use only and is not visible to the end user.
3. Click Apply.
Next Steps
Add Components to a Package
Procedure
1. Select the package that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Packages.
c. Click the package.
2. In the Components section, review the list of applications, questionnaires,
dashboards, workspaces, or access roles currently included in the package.
3. To add a new component, click Lookup.
The Add Components dialog box opens.
4. On the Applications tab, select the applications that you want to include in the
package.
5. On the Questionnaires tab, select the questionnaires that you want to include in
the package.
6. On the Workspaces tab, select the workspaces that you want to include in the
package.
7. On the Dashboards tab, select the dashboards that you want to include in the
package.
8. On the Access Roles tab, select the access roles that you want to include in the
package.
9. Click OK.
Note: The components that you selected for the package are displayed in the
Components section.
Next Steps
Generate a Package
Generate a Package
Complete this task to create a package by generating a package file. When you
generate a package, the Platform creates a package file using the most current
information in the instance of the Platform. Once a package file is created, you can
save it to a network folder so that it is available for another instance of the Platform
to import and install.
All packages saved on this instance of the Platform are displayed on the Manage
Packages page. The Packages list includes important information for each package.
Be sure to review the dates listed in the Last Updated column and the Last
Generated column. The Last Updated column indicates when the package was
last modified. Any changes that were made to the source instance of the Platform
after this date are not reflected in the package. The date in the Last Generated
column indicates when the package file was generated. If the field is blank, the
package has not been generated and a package file has not been created. If a date is
listed, but does not match the date in the Last Updated column, the package file
may be out of date. You may need to generate the package again to ensure that any
recent changes to the package are reflected in the package file.
Procedure
1. Navigate to the Manage Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Packages.
2. Locate the package in the list that you want to generate and review the date
listed in the Last Updated column.
3. Review the date listed in the Last Generated column.
4. To generate the package and a new package file, click Generate for the
package that you want to generate.
Next Steps
Download a Package
Delete a Package
Complete this task to delete a package that is no longer needed. However, any
package files that were generated from the package may still be available. In
addition, deleting a package does not delete any log files that were generated during
package installation.
Procedure
1. Navigate to the Manage Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Packages.
All objects in the package or only the ones selected during the package installation
can be installed on the target instance. The elements of the objects being installed
can be created only, or created and updated on the target instance. Additionally,
existing layout settings can be overridden in the target instance.
Log messages are displayed in the Object Details section of the Package
Installation Log tab. To ensure that objects are successfully installed, review this
log, which is generated after the installation is completed.
Installation Rules
To ensure a successful installation, consider the following guidelines when
installing a package:
l Always back up the Platform database before installing a package.
l The package installation cannot be reversed. The only way to reverse a package
installation is to restore the Platform database backup.
l If installing a package that contains Record Permissions fields, verify that users
and groups already exist in the target instance. If they do not, these fields may
not install properly. If necessary, create the users and groups in the target
instance before installing the package.
l The package installation does not delete fields or permissions. It only adds or
updates fields, and it only adds new permission settings without removing any
existing permission settings.
l Access Roles of a custom iView are not updated during the package installation.
The user access should be updated manually after the package is installed.
Download a Package
Complete this task to download a package after it is generated and the package file
is created to a network folder. At that point, the package file can be imported and
installed on another instance of the Platform using the Install Packages feature.
For more information, see Install Packages: Administrative Overview.
You can also download a package using the Install Packages feature to retrieve a
package file that was imported on a target instance.
Procedure
1. Navigate to the Manage Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Packages.
2. In the Packages list, locate the package that you want to download and review
the date listed in the Last Updated column.
3. Review the date listed in the Last Generated column.
4. Click Download and select a folder in which to save the package file.
Note: Be sure to save the file in a location that is accessible to the administrator
of the instance of the Platform who plans to import the package file.
Import a Package
Complete this task to import a package into the destination instance.
Before you can install a package file, you must import it to your instance of the
Platform. You create the package file on the source instance of the Platform using
the Manage Packages feature.
Procedure
1. Navigate to the Install Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder.
c. Click Install Packages.
2. In the Available Packages section, click Import.
3. Click Add New and locate and select the package file that you want to import.
4. Click OK.
The package file is displayed in the Available Packages section and is ready
for installation.
Note: Only the package file has been imported; you must install the package file
to migrate the components to your instance of the Platform.
Next Steps
Install a Package
Install a Package
Complete this task to install a package after you have imported the package file.
You can queue multiple packages, however the Platform only installs one package
at a time.
When installing a package with a core module in to a target instance in which it
does not exist currently, that core module must be licensed prior to the package
installation in the target instance.
Important: When installing a package that updates a sub-form, the updates affect
all applications, questionnaires, workspaces, and dashboards that use the sub-form.
Procedure
1. Navigate to the Install Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder.
c. Click Install Packages.
2. In the Available Packages section, locate the package file that you want to
install, and click Install.
The Configure Package Installation page displays with information about the
package file.
3. Under Configuration, select the components of the package that you want to
install.
4. Under Install Method, select an option for each selected component:
l Create New Only. Only creates new fields and other elements in the
applications, questionnaires, workspaces, and dashboards specified in the
package file. This option does not modify any existing elements on your
instance of the Platform. This is useful when you want to add functionality to
an existing application, questionnaire, workspace, dashboard, or access role,
but you do not want to risk making any unwanted changes to the existing
elements of the applications, questionnaires, workspaces, or dashboards.
iViews that are not currently on the dashboards that are selected for the
package install are created.
l Create New and Update. Updates all elements in the applications,
questionnaires, workspaces, and dashboards as specified in the package file.
This includes adding new elements and updating existing elements. Existing
iViews on the dashboards that are selected for the package install are
updated, and iViews that are not currently on the dashboards that are
selected for the package install are created.
5. Under Layout, select an option for each selected component:
l Do not Override Layout. Installs the component, but does not change the
existing layout. This is useful if you have a lot of custom fields and
formatting in your layout that you do not want to risk losing.
Note: You may have to modify the layout after installing the package to use
the changes made by the package.
Failure Messages
Package installation failure messages are classified as Catastrophic or Minor. The
following table describes the failure messages that may be in the Package
Installation Log.
Catastrophic Failure Package installation failed. Critical object failed to save due to
validation. The error Log Reference ID is: <log ID>.
Catastrophic Failure Package installation failed. Critical object failed to save due to
an exception. The error Log Reference ID is: <log ID>.
Minor Failure The level for Field Filter Property <field filter property name>
was not found. The property was not installed.
Minor Failure The module for Field Filter Property <field filter property
name> was not found. The property was not installed.
Minor Failure Unable to update <values list name>. Cannot change a Global
Values List to a Custom Values List.
Minor Failure The level for Questionnaire Rule <questionnaire rule name>
was not found. The rule was not installed.
Warning Messages
The following table describes the warning messages that may be in the Package
Installation Log.
Warning The following access role referenced on the Access tab could
not be resolved: <access role name>.
Warning Cannot change Values List Type of <values list type name>
from Questionnaire.
Warning Attempted to change system field type for field <field name>.
Field install was skipped.
Warning Content <content ID> was not found and removed from a
collection.
name>.
Warning Field Filter Property Value <field filter property name> was not
found and removed from a collection.
Warning Field <field name> was not found and removed from a
collection.
Warning Level <level name> was not found and removed from a
collection.
Warning <report name> report could not be created. There are no display
fields for this report.
Warning Numeric Range Value <numeric range value> was not found
and removed from a collection.
Warning <object name> Alias was changed from <old alias name> to
<new alias name>.
Warning Object was not saved due to an exception. The error Log
Reference ID is: <log ID>.
Warning Object was not saved due to failing validation. The error Log
Reference ID is: <log ID>.
Warning Values List Value <values list value name> was not found and
removed from a collection.
Procedure
1. Navigate to the Install Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder.
c. Click Install Packages.
2. Click Package Installation Log.
3. Click the package that you want to view.
The Package Installation Log page is displayed.
4. In the Object Details section, click View All Warnings.
The types of warnings are:
l Catastrophic failure. A global failure that stopped the installation and
rolled back all updates.
l Minor failure. A particular object failed to install.
l Warning. An attribute of an object could not be updated or otherwise needs
to be reviewed.
5. Click Close.
Important: Advanced Package Mapping does not update data feeds and Web APIs.
Modifying the system ID of an object used by a data feed or Web API will break
the relationship with the object. The data feed or Web Service API will no longer
function properly. The resolution is to update the data feeds and Web Service APIs
to reference the new system IDs of those objects.
The following figure shows the process for using Advanced Package Mapping.
Root Objects can stand alone. A level 1 object cannot exist without a root object.
Level 2 objects cannot exist without a Level 1 object. Some Level 2 objects have
child elements, for example, a Values List is a child of the custom Values List
field. The Values List includes individual Values List values. All elements of a root
object are copied in a package. Map the child elements before mapping the parent
object.
l Workflow
l Users
Workflow objects use system IDs, but Packaging does not match Workflow objects.
Instead, Packaging overwrites the workflow configuration.
Procedure
1. Navigate to the Advanced Package Mapping page:
a. Click the Administration workspace.
b. From the Navigation Menu, click Application Builder > Install Packages.
c. In the Available Packages section, locate the package that you want to map.
d. In the Actions column, click for that package.
e. Map the objects as needed. For more information, see Map Objects.
Next Steps
Import Mapping Settings
The Export function saves the current mappings to a .csv file. When exporting and
naming this file, it is important to use a detailed, logical filename. This .csv file is
exported to a designated location.
The Import function imports the saved mapping file so that the mappings can be
completed. When the file is imported, the Import Options are as follows.
Option Description
Override All Specifies that the mapping in the import file will be
applied and all current mappings will be overridden.
Procedure
1. Navigate to the Advanced Package Mapping page.
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Install
Packages.
c. In the Available Packages section, locate the package that you want to map.
d. In the Actions column, click for that package.
Option Description
Add New Retains the current settings and adds only the new
settings from the file.
Add New/Override Existing Adds new settings, retains current settings, and
overrides any current settings with the settings in
the file.
4. Click OK.
The Open dialog box opens.
5. Select the file to import, and click Open.
The mapping settings are imported and displayed on the Advanced Package
Mapping page.
Next Steps
Map Objects
Object Mapping
Applications, Questionnaires, and Sub-forms are root objects that can include level
1 and level 2 objects. Sub-forms are always included in a package that includes
their parent root object. Because sub-forms can have level 1 and level 2 objects,
they are handled like other root objects.
When an object includes level 1 and level 2 objects, it is vital that the object is
mapped to its lowest level. For example, some fields include child elements. These
elements must also be mapped.
To ensure that objects are mapped appropriately, review the Package Mapping Log.
This log is generated after mapping is executed in Advanced Package mapping.
See the following topics for information on mapping root objects:
l Application Objects
l Sub-Forms Objects
l Questionnaire Objects
l Standalone Root Objects
Application Objects
An application has Level 1 objects of Level and Reports and Level 2 objects of
Fields, Layout, Event Rules, Event Actions, Notifications, and Mail Merge
Templates. Some fields have dependencies and child objects. These fields include
Cross-Reference fields, Related Record fields, Global Values List field, Sub-form
fields, Matrix fields, and CAST fields. Map the child elements before mapping the
parent object. Always map objects to their lowest level.
The following figure shows the object elements for an application.
Sub-Form Objects
A sub-form has a Level 1 object of Level and Level 2 objects of Fields and Layout.
Some fields have dependencies and child objects. These fields include Cross-
Reference, Related Record, Global Values List, and custom Values List. Map the
child elements before mapping the parent object. Always map objects to their
lowest level.
The following figure shows the object elements for a sub-form.
Questionnaire Objects
A questionnaire has Level 1 objects of Level, Reports, and Questionnaire Values
List and Level 2 objects of Fields, Layout, Event Rules, Event Actions,
Questionnaire Campaigns, Questionnaire Rules, Field Filter Properties, and
Notifications. Some fields have dependencies and child objects. These fields
include Cross-Reference, Related Record, Global Values List, Values List, Sub-
form, Matrix, and CAST. Map the child elements before mapping the parent object.
Always map objects to their lowest level.
Mapping Objects
Mapping objects is extremely important to ensure that duplicate objects are not
created in the target instance and must done before installing the package. This
process consists of mapping objects from the source instance to the objects in the
target instance with the same names but different unique system IDs. See Map
Objects.
Applications, Questionnaires, and Sub-forms are root objects that can include level
1 and level 2 objects. Sub-forms are always included in a package that includes
their parent root object. Because sub-forms can have level 1 and level 2 objects,
they are handled like other root objects.
When an object includes level 1 and level 2 objects, it is vital that the object is
mapped to its lowest level. For example, some fields include child elements. These
elements must also be mapped. These fields include Cross-Reference, Related
Record, Global Values List, Values List, Sub-form, Matrix, and CAST. Map the
child elements before mapping the parent object.
To ensure that objects are successfully mapped, review the Packaging Mapping
Log. This log is generated after mapping is executed in Advanced Package
mapping. See Package Mapping Log Messages.
The following figure shows the process of mapping objects.
l Only maps to objects of the same type. For example, you cannot map a Text field
to a Date field or a custom Values List to a Global Values List.
l You cannot map to different types of Values List components. For example, you
cannot map a Custom Values List to a Global Values List. In the rare instance in
which you may want to map to a different type, RSA Archer recommends that
you update the object in either the source or target instance so that the objects
match. After making the updates, regenerate the package.
Map Objects
Complete this task to map objects to ensure that duplicate objects are not created in
the target instance. Objects must be mapped before installing the package. This
process consists of mapping objects from the source instance to the objects in the
target instance with the same names but different unique system IDs.
For more information, see Mapping Objects.
Procedure
1. Navigate to the Import and Install Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, click Application Builder > Install Packages.
2. In the Available Packages section, locate the package that you want to map.
3. In the Actions column, click for that package.
The analyzer runs and examines the information in the package. This process
can take several minutes or more, especially if the package is large. The
analyzer automatically matches the system IDs of the objects in the package
with the objects in the target instances. When completed, the Advanced
Mapping Page is displayed.
This page lists the objects in the package file and corresponding objects in the
target instance. The objects are divided into tabs, depending on whether they are
found within Applications, Solutions, Access Roles, Groups, Sub-forms, or
Questionnaires.
Important: During the mapping process, you may discover discrepancies in the
data, such as unwanted objects in the source or target instance. Before installing
the package, RSA Archer recommends fixing any discrepancies in the source or
target instances, then re-creating the package. Otherwise, any data
discrepancies will be retained after the package installation.
In addition, prior to executing any mapping changes, be sure to manually
remediate objects with parent/child relationships. See Remediation.
4. On each tab of the Advanced Mapping Page, review the icons that are displayed
next to each object name.
Icon Description
Indicates that the system could not automatically match the object or
children of the object to a corresponding object in the target instance.
New objects should not be mapped. This icon should remain visible.
The mapping process can proceed without mapping all the objects.
Objects marked with this symbol must be mapped manually through
the mapping process.
Indicates that the object and all child objects are mapped to an object
in the target instance. Nothing more needs to be done with these
objects in Advanced Package Mapping.
Indicates that the object does not exist in the target instance or the
object was not mapped through the Do Not Map option. These objects
will not be mapped through Advanced Package Mapping, and must be
remediated manually.
Note: You can execute the mapping process without mapping all the objects.
Icon Description
Indicates that the object and all child objects are mapped to an object in
the target instance. Nothing more needs to be done with these objects in
Advanced Package Mapping.
Indicates that the system could not automatically match the object or
children of the object to a corresponding object in the target instance.
New objects should not be mapped. This icon should remain visible. The
mapping process can proceed without mapping all the objects.
Objects marked with this symbol must be mapped manually through the
mapping process.
6. To automatically map objects with different system IDs but with the same
object name, click Auto Map.
The Map Criteria dialog box opens.
7. Select the appropriate options for mapping objects by name.
Option Description
Ignore case Select this option to match objects with similar names
regardless of the case of the characters in the object names.
Ignore spaces Select this option to match objects with similar names
regardless of whether spaces exist in the object names.
8. Click OK.
The Confirmation dialog box opens with the total number of mappings
performed. These mappings have not been committed to the database yet and
can be modified in the Advanced Package Mapping page.
9. Click OK.
The Advanced Package Mapping page is displayed.
10. Map the remaining objects that have the icon next to the object name. In
the Target column, select the object in the target instance to which you want to
map the source object. If an object is new or if you do not want to map an
object, select Do Not Map from the drop-down list.
The icon is displayed next to the object to indicate that the object will not
be mapped.
When all objects are mapped, the icon is displayed in the tab title.
Note: You can quickly set all objects displayed on the page to Do Not Map by
clicking Do Not Map.
11. To undo the mapping settings for an object, click in the Actions column.
12. To save your mapping settings so that you can resume working later, see Export
Mapping Settings.
13. Click .
The Warning dialog box opens.
14. Select I understand the implications of performing this operation and click
OK.
The Advanced Package Mapping process updates the system IDs of the objects
in the target instance as defined on the Advanced Package Mapping page. When
the mapping is complete, the Import and Install Packages page is displayed.
Important: Advanced Package Mapping modifies the system IDs in the target
instance. Any Data Feeds and Web Service APIs that use these objects will
need to be updated with the new system IDs.
Next Steps
Review the Package Mapping Log
Mismatches may also become apparent after upgrading to version 5.2 of the
Platform from a previous 5.x version. Version 5.2 adds support for additional
objects such as workspaces, iViews, notifications, and others. These objects may
not have matching system IDs across instances. Because Packaging now supports
these objects, the system IDs must match to install packages that include these
objects.
Because system ID mismatches occur when the same object is manually created in
multiple instances, the simplest way to avoid system ID mismatches is to use
Packaging to copy all changes from one instance to another.
Cross-Reference Mismatches
A common mistake when manually recreating Cross-Reference fields in multiple
instances is to accidentally switch the location of the Cross-Reference and Related
Records fields. For example, the following figure shows a Cross-Reference field
that was created in Application A and a Related Record field in Application B in
the source (Development) instance. In the target (Test) instance, the Cross-
Reference field was inadvertently created in Application B and the Related Record
field in Application A.
If you create a package in the source instance and install it in the target instance,
the package installation creates new Cross-Reference and Related Record fields in
the target instance. The existing Cross-Reference and Related Records fields are
not modified or deleted. The following figure shows duplicate fields created
because the original fields were switched in the target instance.
To prevent this situation, before creating and installing the package, manually
update the source instance (recommended) or the target instance so that both
instances match.
Mapping Analyzer
Immediately after the import process, the Mapping Analyzer examines the
information in the package. This process can take several minutes or more,
especially if the package is large, and may time out after 60 minutes. This time-out
setting temporarily overrides any IIS time-out settings set to less than 60 minutes.
The analyzer identifies objects from the package that are successfully mapped to
objects in the target instance, objects that are new or exist but are not mapped, and
objects that do not exist (the object is in the target but not in the source).
When the analyzer completes its examination, the results are displayed in the
Advanced Package Mapping dialog box, as shown in the following figure.
Root objects are represented in tabs for each root object in the package. One of the
following icons is displayed on each tab next to each object.
Icon Description
Indicates that the system could not automatically match the object
or children of the object to a corresponding object in the target
instance.
New objects should not be mapped. This icon should remain
visible. The mapping process can proceed without mapping all the
objects.
Objects marked with this symbol must be mapped manually
through the mapping process.
Indicates that the object and all child objects are mapped to an
object in the target instance. Nothing more needs to be done with
these objects in Advanced Package Mapping.
Indicates that the object does not exist in the target instance or the
object was not mapped through the Do Not Map option. These
objects will not be mapped through Advanced Package Mapping,
and must be remediated manually.
Never map new objects. These objects should remain unmapped, so that the
package installation can create the new object.
The Do Not Map feature flags the object so that it is not mapped and installed
during the package installation.
The Auto Map feature maps every object with the same name but different system
IDs. To help eliminate duplication, the case and spaces in names can be ignored by
using one of the following options:
l Ignore Case. Matches objects with similar names regardless of the case of the
characters in the object names.
l Ignore Spaces. Matches objects with similar names regardless of whether
spaces exist in the object names.
The update failed due to a The mapping process attempted to change a system ID to
unique constraint violation. one that is already in use by another object. Two objects
of the same type cannot have the same system ID.
The target object was The object mapped from the source instance to the target
updated successfully. instance was successfully updated in the target instance.
The object you attempted to The object no longer exists. It may have been
update does not exist. inadvertently deleted in the time between mapping the
object and executing the mapping changes.
Remediation
Before executing changes to system IDs, manually remediate as many objects as
possible in the source instance. These objects are identified during the analysis.
It is vital to manually remediate objects with parent/child relationships. These
objects can have complex relationships in the instance. Always map objects to their
lowest level. Child elements must be mapped before parent objects.
Any mistakes in the package installation can be difficult to remediate later. For
more information, see Install Packages: Administrative Overview.
Manually remediate the following field types with parent/child relationships.
Global Values Lists Verify that the Global Values Lists (GVLs) match across
the source and target instances. If the package changes or
removes existing values in a GVL, verify that these
changes do not adversely impact other objects or features
that use the same GVL. Note that this is not a concern
when values are added to a GVL.
Cross-Reference Verify that the relationships match between the source and
target instances for Cross-Reference fields. It is possible to
map a Cross-Reference field to a different module, thus
creating error situations after package install. For more
information on how mismatches can occur, see Cross-
Reference Mismatches.
Sub-form Verify that the sub-form fields map to the same sub-form in
both the source and target instances.
Matrix Verify that the values lists referenced by the matrix field
match in both the source and target instances.
CAST Verify that the child objects match in both the source and
target instances. This mapping includes the associated
application, application level, and values list fields.
Object Remediation
When objects have child or related objects, a drill-down link is provided on the
parent object. For each parent object, the child or related objects must also be
mapped. See Mapping Objects.
The following icons identify whether these objects are mapped.
Icon Description
Indicates that the related or child objects are mapped to the same
objects.
Indicates that a related or child object does not match. For example, a
source and target Values List field may be pointing to different Global
Values lists, which if mapped would create errors in the package
installation.
The resolution is to map the object, unless the object is new. The package
installation creates a new object in the target instance if the object is not mapped.
The resolution is to review the mapping and to select the correct Global Values
List.
Procedure
1. Navigate to the Import and Install Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Install
Packages.
2. In the Package Mapping Log section, click the package that you want to view.
Important: This option only affects system IDs. It does not undo a package
installation. To undo a package installation, restore the backup of your database.
Procedure
1. Navigate to the Install Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder.
c. Click Install Packages.
2. Click the Package Mapping Log tab.
3. Click the package that contains the changes that you want to undo.
4. On the Package Mapping Log page, click Undo Mapping Changes.
5. Select the objects that you want to undo. To select all mappings, click Undo All
Mappings.
6. Click OK.
7. In the warning dialog, click OK.
When the mapping is complete, the Import and Install Packages page is
displayed. A new entry is displayed in the Package Mapping Log section with
Undo in the Type column.
Advanced Package Mapping includes an Undo feature for rolling back the mapping
of objects. This option is available from the Package Mapping Log. The Undo
Mapping Changes feature only reverts the mapping of the object. It does not undo
the package installation.
Undoing mapping changes creates a new Package Mapping Log, showing the last
state of the mapped object.
Procedure
1. Navigate to the Install Packages page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder.
c. Click Install Packages.
The Import and Install Packages page lists the package files that have been
imported and the installation logs that were created when packages were
installed.
2. On the Available Packages tab, select the package that contains the mapped
objects.
3. On the main toolbar, click to undo all object mappings. The Undo Mapping
Changes dialog box opens.
4. Do one of the following:
l Select All to undo changes for all mapped objects in the package.
l Select Current to undo changes for all mapped objects on the currently
selected tab.
5. Click OK.
Note: Objects used by data feeds and web services APIs use system IDs to retrieve
and update data. If the system IDs of these objects are changed, the objects do not
behave as intended in the target instance. For more information on mapping objects,
see Map Objects.
A log file is created that shows the status of the mapped object update. Errors are
reported as failures or warnings. Failures stop the package installation. Warnings
allow the process to complete. For a complete list of log messages, see Package
Mapping Log Messages.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Questionnaires
Contents
Preface 5
About This Guide 5
Questionnaire Assessment Process 7
1. Create and Configure Your Questions 8
2. Design Your Questionnaire 8
3. Assess Your Target 8
4. Evaluate Your Findings 8
5. Resolve Issues of Non-Compliance 9
Questionnaire Terminology 9
Product Documentation 12
Support and Service 12
Chapter 1: Question Library 15
Managing the Question Library 15
Add a Question to the Question Library 15
Add Answer Values to a Values List 19
Preparation for Importing Questions 20
Import Questions into the Question Library 21
Chapter 2: Questionnaires 23
Managing Questionnaires 23
Campaigns 24
Owners and Report Administrators 24
Create a Questionnaire 25
Configuring Questionnaires 27
Update the General Properties of a Questionnaire 27
Update the Options of a Questionnaire 28
Attach Documentation to a Questionnaire 30
Managing Fields in Questionnaires 30
System-Generated Questionnaire Fields 31
Add a Field to a Questionnaire 34
Changing the Layout of a Questionnaire 35
Configure the Navigation Menu Settings of a Questionnaire 36
Configuring Data Driven Events for a Questionnaire 38
System-Generated Questionnaire Events 38
Work with Questionnaire Values Lists 39
Questionnaire Display Rules 41
Configure Show and Hide Rules for Questionnaires 42
Create a Campaign to Launch a Questionnaire 44
Assign Questionnaire Owners and Report Administrators 47
Import Data into a Questionnaire 48
Modify a Questionnaire During an Assessment Cycle 48
Delete Content from a Questionnaire 49
Deleting a Question from a Questionnaire 50
Chapter 3: Questions 51
Managing Questions 51
3
RSA Archer GRC Platform Questionnaires
4
RSA Archer GRC Platform Questionnaires
Preface
The Questionnaire feature enables you to build and deliver targeted assessment
campaigns for any type of organizational object, such as your assets, business
processes, or vendors. A part of the Application Builder, the Questionnaire feature
allows you to:
l Create a library of questions linked to authoritative sources and control
standards.
l Build questionnaires by selecting questions from the Question Library for
inclusion and assigning the questionnaire to a target application, such as
Applications or Facilities.
l Define question display rules that dynamically show or hide questions to end
users based on attributes of the target they are assessing.
l Launch questionnaires online through assessment campaigns.
l Automatically score questionnaire records and generate findings for each
incorrect answer.
l Monitor and report on inherent and residual risk, and measure compliance.
Preface 5
RSA Archer GRC Platform Questionnaires
After you build your questions in the Question Library, you can generate
questionnaires in Application Builder. Select the application that contains the
targets you want to assess, and then select the questions from the Question Library
that you want to include in the questionnaire. From the Manage Questionnaires page
in the Application Builder, you have complete control over the layout of your
questionnaire, just as you do with any application. You can also tailor questions that
you imported from the Question Library to suit the purposes of your questionnaire,
and you can create new, questionnaire-specific questions.
The Questionnaire feature enables you to define question display rules to show or
hide questions to end users based on attributes of the target they are assessing. For
example, if a user is filling out a questionnaire to assess a payment processing
application, the rules you define could automatically customize the questionnaire
record to show questions related to the Payment Card Industry (PCI) Data Security
Standard.
By default, questionnaires include two User/Groups List fields: Submitter and
Reviewer. These fields facilitate a two-stage workflow process. You can define the
users and groups available for selection in these fields, and you can promote the
fields to Record Permissions fields if you want to use them to control access to
questionnaire records. In addition, you can add User/Groups List or Record
Permissions fields to expand the content review process according to your
organization's risk management methodologies.
The final step in the questionnaire creation process is to launch the questionnaire to
end users. Through an assessment campaign, you can automatically generate
questionnaire records for specific assessment targets. For example, if you are
managing a questionnaire that targets your Vendor Profiles application, you can
launch a campaign that creates questionnaire records for all vendors who provide
payment processing services for your organization. If you have defined question
display rules, the questionnaire records for each specific vendor contain only those
questions that are applicable to that vendor based on its attributes, such as criticality
to your business or risk rating.
As end users complete their assigned questionnaire records, those records
automatically are scored to determine the inherent risk of the assessment target. If
you have configured the questionnaire to auto-generate findings, the system creates
a record in the Findings application for every question that is incorrectly answered
within individual questionnaire records. Using the Task Management feature, you
then can assign tasks to resolve those findings.
As findings are addressed, the questionnaire automatically calculates the residual
risk score, which shows the risk that remains as the target of the assessment moves
closer and closer to compliance. The residual score is displayed in the Quantitative
Summary in a questionnaire record. This quantitative summary enables you to
monitor changes to the score over time as findings are closed.
6 Preface
RSA Archer GRC Platform Questionnaires
The Platform provides various system reports for each questionnaire that you
create. These reports provide results and details at the question, questionnaire,
authoritative source, and category levels. End users also can create ad hoc reports
for questionnaires from the Advanced Search page, just as they do for applications.
Important: When a data driven event includes a rule with a Set Date action and is
used in a questionnaire, the Review Date and Submit Date must be included in the
General section of the questionnaire. By default, these fields are included in this
section.
For more information on the Question Library, see Managing the Question Library.
You can perform the following questionnaire-related tasks:
l Create a Questionnaire
l Update the General Properties of a Questionnaire
l Update the Options of a Questionnaire
l Attach Design Documentation to a Questionnaire
l Add a Standard Field to a Questionnaire
l Change the Layout of a Questionnaire
l Configure the Navigation Menu Settings of a Questionnaire
l Configure Data Driven Events for a Questionnaire
l Auto-Generate Findings for Questionnaires
l Work with Questionnaire Values Lists
l Configure Show and Hide Rules for a Questionnaire
l Create a Campaign to Launch a Questionnaire
l Assign Questionnaire Owners and Report Administrators
l Delete Content from a Questionnaire
l Delete a Question from a Questionnaire
l Import Data into a Questionnaire
l Modify a Questionnaire During an Assessment Cycle
Preface 7
RSA Archer GRC Platform Questionnaires
8 Preface
RSA Archer GRC Platform Questionnaires
Questionnaire Terminology
The following table defines terms related to the Questionnaires feature.
Term Definition
Inherent The inherent score is the sum of all question scores for a questionnaire
Score record. This score represents the natural risk associated with the target in
absence of any remediation activities or changes in the environment.
Preface 9
RSA Archer GRC Platform Questionnaires
Term Definition
Question Administrators can assign properties to questions that they cannot assign
Properties to standard fields. Questions include a name (such as "Encryption
Question 1") and question text (such as "Is all sensitive data
encrypted?"). In addition, questions can be grouped into specific
categories, and administrators can define filter properties that determine
whether a question is displayed in a questionnaire record for a specific
target. Values List questions include additional properties that allow
administrators to determine correct and incorrect answers and to assign a
numeric score to each answer and a numeric weight to the question.
Question A question score is a calculated value determined for each Values List
Score question. The value is determined by the following formula:
[question weight] * [numeric value assigned to selected answer] =
question score
or (for multi-select Values List questions):
[question weight] * SUM ([numeric value assigned to selected answer1],
[numeric value assigned to selected answer2]) = question score
Question scores are rolled up to determine a questionnaire score.
10 Preface
RSA Archer GRC Platform Questionnaires
Term Definition
Residual The residual score represents the risk that remains in a target after
Score findings are remediated. This score is calculated as Inherent Risk –
Remediation Changes = Residual Risk. While inherent risk is calculated
only once, residual risk changes over time as findings are remediated.
Target Questionnaires are used to assess a specific set of items, such as servers,
vendors, or business processes. The target is the application that contains
those items. For example, a Data Security questionnaire might have the
Devices application as its target. The questionnaire records within the
Data Security questionnaire would pertain to individual records in the
Devices application, such as a specific database server.
Tasks Tasks are action items that have been assigned to a user in relation to a
finding. All tasks are created and managed through the Task
Management application, which can be used to document the
remediation activities associated with items identified in the Findings
application.
Preface 11
RSA Archer GRC Platform Questionnaires
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
12 Preface
RSA Archer GRC Platform Questionnaires
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 13
RSA Archer GRC Platform Questionnaires
Procedure
1. Locate a workspace that includes the Question Library application within the
Navigation Menu.
2. Expand the Question Library application in the Navigation Menu and click Add
New.
3. In the Status field, select a status.
A question set to Inactive is not available to copy into a questionnaire.
4. In the Question Name field, enter a name for the question.
This name labels and identifies the question. It also is the key field for the
Question Library record.
5. From the Category list, select a category.
This field determines the section in which the question is displayed. It also
determines whether a question is displayed to an end user when Question
Display Rules have been established for the questionnaire. If your user account
has edit privileges, you can click Edit and add additional categories to the list.
6. In the Question Text field, enter the question.
This is the text that is displayed to the user.
7. From the Question Type list, select a question type.
This value cannot be changed after you have created and saved the question.
For more information, see Question Types.
8. In the Display Format field, select how the question is displayed.
You can provide the answer text horizontal to the question text or you can
provide the answer text under, or vertical to, the question text. This value cannot
be changed after you have created and saved the question.
9. In the Help Text field, enter any supporting information that helps the user
understand the question.
10. In the Help Text Display - View Page field, select a display option.
11. In the Help Text Display - Edit Page field, select a display option.
12. If you selected Values List in the Question Type field, complete the fields in
the Values List Question Type section.
Field Action
Display Type Specify how you want users to select answers for the
question. Options include Drop-down lists, Radio buttons,
Check Boxes, Listbox, and Values Popup.
Display Order Specify the display order for the answer values associated
with this question. If you select Custom, the Question Library
record references the value contained in the Order field in the
Answer Values section.
Question Weight Specify the weight of the question for scoring purposes. Enter
a numeric value.
Column Layout Specify the number of columns to use for the layout of a
Values List question that uses radio buttons or checkboxes.
Select a value from between 1 and 6.
Minimum Selection Specify the minimum number of answer values that can be
selected for the question.
Maximum Selection Specify the maximum number of answer values that can be
selected for the question. This field is set to 1 for drop-down
list and radio button questions.
Control Standards Specify the content records linked to the question that are
identified as Control Standards. The records available for
selection are determined by the records available within your
Control Standards application. This option is not available if
you have not licensed the Policy Management solution.
13. If you selected Values List in the Question Type field, complete the fields in
the Answer Inheritance Type section.
Field Action
Inherit Answers Enables you to reference the answer values for another
From Another question.
Question?
Related Question(s) If you select to inherit answers, use this field to select the
specific record from which to inherit answers.
Answer Values If you select not to inherit answers, use this field to add
answer values. Click Add New to add new answer values. For
more information, see Add Answer Values to a Values List.
14. If you selected Text in the Question Type field, in the Text Field Height field
in the Text Question Type section, specify the height of the text field displayed
to the user.
15. If you selected Numeric in the Question Type field, complete the fields in the
Numeric Question Type section.
Field Action
Minimum Value Specify the minimum numeric value that can be entered for
the answer.
Maximum Value Specify the maximum numeric value that can be entered for
the answer.
Decimal Places Specify the number of decimal places that can be entered for
the answer.
Numeric Format Specify whether the answer includes commas to separate units
of numbers, for example, 1,000,000.
16. If you selected Date in the Question Type field, in the Time Information field
in the Date Question Type section, specify whether to include time information
in the answer.
17. If you selected Attachment in the Question Type field, complete the fields in
the Attachment Question Type section.
Field Action
Maximum File Size Specify the maximum file size of the attachments.
18. If you are creating a Values List question, be sure to add answer values. See
Add Answer Values to a Values List.
19. Click Save.
Procedure
1. Open the question record in the Question Library application.
2. In the Answer Inheritance Type section, in the Answer Values sub-form
field, click Add New.
Note: If you selected to inherit answers from another question, you can edit
those answers using the Answer Values sub-form. Changes to the answers do
not affect the Question Library record from which you are inheriting answers.
3. In the Sort Order field, select the display order for the answer value.
For example, the value of 2 in this field would display this answer as the second
option in the question. This field only is available if you selected Custom in the
Display Order field.
4. In the Answer field, enter the text of the answer.
5. In the Description field, enter a description, such as the logic and reasoning
behind the answer.
6. From the Correct list, select whether to designate the answer as correct. You
can designate one or more answers to be correct.
7. Select whether to set the answer as the default selection for the question. Only
one answer can be the default.
8. From the Other list, select whether users can enter an explanation for the
answer. Only one answer can be designated as Other.
9. If you selected Yes in the Other list, from the Other Height list, select the
display height for the text box that will display next to the answer value.
10. If you selected Yes in the Other field, in the Other Text field, enter the default
text that you want displayed in the text box. For example, enter, "Please explain
your selection".
11. Select the numeric value to associate with this answer.
Using the Calculations feature, you can reference these numeric values in
calculated fields for custom questionnaire scoring.
12. Click Save.
cannot import the Answer Values information at the same time as the initial data
import.
Important: Your import data file for the Answer Values sub-form must contain
the unique identifier from the parent Question Library record. For example, if
you are importing answer values for the question, "Does this application contain
customer data?" you need to include the unique identifier for this question. This
practice ensures that your answer values are associated with the correct
question. You can use values from either the Question ID or the Question Name
field as unique identifiers for a Question Library record.
Procedure
1. To import the data file that contains the questions, use the Data Import Wizard.
2. If your data import includes Values List questions, you need to import the
associated Answer Values sub-form on a subsequent data import.
Note: You cannot import the Answer Values information at the same time as
the initial data import.
Chapter 2: Questionnaires
Managing Questionnaires
The Questionnaire feature enables you to build and deliver targeted assessment
campaigns for your assets, business processes, vendors, or other organizational
object.
Questionnaires include elements that determine certain behaviors as described in
the following topics:
l Campaigns
l Owners and Report Administrators
l Mobile Ready Questionnaires
Chapter 2: Questionnaires 23
RSA Archer GRC Platform Questionnaires
Campaigns
You can create any number of campaigns for a questionnaire, enabling you to reuse
the questionnaire many times. When you create a campaign, the only property that
you must define is the campaign name. You can configure the campaign to populate
questionnaire records with certain values, for example, year, quarter, due date,
submitter, and reviewer. In addition, you can create rules that determine which
specific records in the target application require the creation of a questionnaire
record. For example, you can define a rule that generates questionnaire records only
for vendors with an active status. If you do not define any target generation rules,
the campaign creates questionnaire records for every record in the target
application.
You can create campaigns that are generated automatically or manually.
l Automatic campaigns can be recurring or scheduled. A recurring campaign
creates a campaign that is evaluated when the specified target record is saved. A
scheduled campaign creates a campaign that is executed on a schedule.
l Manual campaigns are initiated by a user, which triggers the creation of
questionnaire records.
Prior to launching a campaign, you can make any necessary changes to the
campaign, including adding or editing target generation rules. After a manual
campaign is launched, you cannot make further changes. If you need to modify a
manual campaign after it is launched, you must create a new campaign.
24 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
If you have been assigned as a questionnaire owner for one or more questionnaires,
you can open those questionnaires for editing from the Manage Questionnaires
page. When you access this page, you can view all questionnaires that have been
created, but you can only edit the questionnaires for which you have been assigned
ownership rights. You must have Read and Update access to Manage
Questionnaires in Application Builder. If no users are assigned ownership for a
questionnaire, only users who have the System Administrator access role can edit
the questionnaire.
You can also assign permissions to users and groups for creating and editing global
reports in a specific questionnaire. Global reports can be shared with any user in
the questionnaire, but only users with access to the questionnaire can see the
contents of the report. Users who do not have global report creation rights only can
create personal reports, which cannot be shared with other users.
Note: When you create a new questionnaire, you are automatically granted
ownership and report administration rights to it. However, your rights can be
revoked by any other user who is subsequently granted ownership of the
questionnaire.
Create a Questionnaire
You can create a new questionnaire by naming and describing the questionnaire,
and assigning the questionnaire to an existing solution. For example, if you are
assessing technical assets for PCI compliance, you would group the questionnaire
into the Enterprise Management solution. You also select the target application that
houses the objects of your assessment, such as applications, business processes,
vendors, and so on.
For an overview of the steps involved in the configuration process, see Configuring
Questionnaires.
Another key step in the creation process is to determine whether you want to copy
questions from the Question Library into your questionnaire or create new questions
from scratch. If you select to copy questions, you can select any number of
questions from the Question Library, and those questions automatically are
displayed in the layout of your questionnaire and grouped into sections by category.
See Copy Questions from the Question Library.
Chapter 2: Questionnaires 25
RSA Archer GRC Platform Questionnaires
Procedure
1. Navigate to the Manage Questionnaires page:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
2. Click Add New.
3. Do one of the following:
l To use the settings of an existing questionnaire as a starting point for your
new questionnaire, select Copy an existing Questionnaire and select the
existing questionnaire from the Questionnaires list.
l To select new settings for the questionnaire, select Create a new
Questionnaire from scratch.
4. Click OK.
The New Questionnaire dialog box opens.
5. Complete the General Information section:
a. In the Name field, enter a name for the questionnaire.
Next Steps
Update the General Properties of a Questionnaire
26 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
Configuring Questionnaires
Create and configure a questionnaire by performing the following steps:
l Create a Questionnaire.
l Update the General Properties of a Questionnaire.
l Update the Options of a Questionnaire.
l Attach Design Documentation to a Questionnaire.
l Add a Standard Field to a Questionnaire.
l Change the Layout of a Questionnaire.
l Configure the Navigation Menu Settings of a Questionnaire.
l Configure Data Driven Events for a Questionnaire.
l Auto-Generate Findings for Questionnaires.
l Work with Questionnaire Values Lists.
l Configure Show and Hide Rules for a Questionnaire.
l Create a Campaign to Launch a Questionnaire.
l Assign Questionnaire Owners and Report Administrators.
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Chapter 2: Questionnaires 27
RSA Archer GRC Platform Questionnaires
c. In the Solutions field, click , add or remove solutions and click OK.
d. To change the status, in the Status field, select the appropriate status.
Status
Description
Option
Archive When you archive a questionnaire, end users can continue to search
d and view questionnaire content, but that content is read-only. You
cannot launch archived questionnaires to end users through
assessment campaigns. The Edit and Data Import options are disabled
for archived questionnaires, and calculated fields and record
permissions are not recalculated.
Retired Retired questionnaires are not available to end users. You cannot
launch retired questionnaires through assessment campaigns, nor can
end users view existing questionnaire content. If you retire a
questionnaire that is displayed in a Questionnaire Reference field
within a target record (such as an Asset or Vendor record), the
questionnaire is removed. Although retired questionnaires are hidden
from end users, administrators can continue to modify retired
questionnaires from the Manage Questionnaires page.
3. Click Apply.
Next Steps
Update the Options of a Questionnaire
28 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
2. To enable task management, select the option in the Task Management field.
3. To enable notifications, select the option in the Notifications field.
When notifications are enabled, the system can automatically notify end users
about new assessment campaigns or changes to a questionnaire's responses.
Note: You also need to create a notification template using the Notifications
feature. When you create a notification blueprint for a questionnaire, end users
can subscribe to that notification and thereafter receive email alerts.
4. To enable spell check, select the option in the Spell Check field.
5. To allow users to click a record in Search Results to open the record for editing,
select Direct to Edit.
6. To change the default format for search results, select the option in the Search
Results field.
Search results are generated from the Display All link in the Navigation Menu
and from the Advanced Search page.
7. To set the design language for the questionnaire, select the language in the
Language field.
8. To provide the name of the question field next to the question text, select
Visible in the Question Name Display section. To provide only the question
text, select Hidden.
9. From the Question Format Style Override list, select Horizontal or Vertical to
override the formatting of questions in the questionnaire.
The horizontal style places the question text and available answers on a single
row. The vertical style places the question text above the available answers. If
you select None, you can mix horizontal and vertical questions in a
questionnaire.
10. Click Apply.
See Also:
Attach Documentation to a Questionnaire
Chapter 2: Questionnaires 29
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Next Steps
Add a Standard Field to a Questionnaire
30 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
For additional information on the standard fields that you can add to a questionnaire,
see:
l System-Generated Questionnaire Fields
l Add a Standard Field to a Questionnaire
Field Configurat
Name Description
Type ion
% Correct Calculated Field access The percent of Values List questions that were
Numeric only answered correctly rounded to the nearest whole
number.
Campaign Values Field access The name of the campaign to which the
Name List only questionnaire record belongs.
Correct Calculated Field access The number of Values List questions that were
Numeric only answered correctly.
Created User/Grou Fully The user who created the questionnaire record.
By ps List configurable
Created First Fully The date the questionnaire record was created.
Date Published configurable
Due Date Date Fully The date by which the questionnaire record
configurable should be completed and submitted.
Chapter 2: Questionnaires 31
RSA Archer GRC Platform Questionnaires
Field Configurat
Name Description
Type ion
History History Fully A history log that tracks the following fields:
Log Log configurable Due Date, Year, Quarter, Submitter, Submission
Status, Submit Date, Reviewer Review Status,
and Review Date.
Incorrect Calculated Field access The number of Values List questions that were
Numeric only answered incorrectly.
Inherent Calculated Field access The sum of all Values List question weighted
Score Numeric only scores.
Last Last Fully The date the questionnaire record was last
Updated Updated configurable updated.
Date
Maximum Calculated Field access The maximum potential score for the
Score Numeric only questionnaire, calculated by summing the
question scores for every Values List question
displayed in the questionnaire record.
Progress Calculated Field access The number of questions that have been
Text only answered and the total number of questions in
the questionnaire record, for example, "13 of
30."
32 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
Field Configurat
Name Description
Type ion
Questions Calculated Field access The number of Values List questions in the
Scored Numeric only questionnaire record.
Remediati Calculated Field access The maximum potential score for all findings
on Score Numeric only that are closed, calculated by subtracting the
score for each incorrectly answered question
from the maximum possible score for each of
those questions, and then adding the resulting
values together. For example, suppose you have
a question that was incorrectly answered,
resulting in a score of 1. If the question were
answered correctly, the score would have been
5. The difference is 4. If you have five questions
that follow this same pattern, and the finding for
each of these questions is closed, your
remediation score would be 20.
Residual Calculated Field access The remaining inherent risk after the closure of
Score Numeric only some or all of the findings associated with the
questionnaire record.
Chapter 2: Questionnaires 33
RSA Archer GRC Platform Questionnaires
Field Configurat
Name Description
Type ion
Reviewer User/Grou Fully The user who is responsible for reviewing the
ps List configurable questionnaire record once it is submitted.
Submitter User/Grou Fully The user who is responsible for answering the
ps List configurable questions in the questionnaire record.
Option 1 Option 2
1. Add the field, but do not make it 1. Go to the questionnaire to which you
required. are adding the field, and clear the
Mobile Ready option.
2. Move the field onto the layout.
2. Add the required field.
3. Make the field required.
3. Move the required field onto the layout.
4. Change the questionnaire to Mobile
Ready.
34 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Next Steps
Change the Layout of a Questionnaire
Chapter 2: Questionnaires 35
RSA Archer GRC Platform Questionnaires
When adding questions, try to group your questions into sections, especially if you
have a large number of questions. Sections help to visually organize a questionnaire
for the benefit of the users.
You can create rules that show or hide questions within a questionnaire record
based on the specific target of the assessment. For more information on question
display rules, see Configure Show and Hide Rules for a Questionnaire.
You also can use data driven events to dynamically display sections of questions
based on the selection of one or more items in another field. Creating a Section
Display event for a questionnaire is the same as creating this event type for an
application, except that you work from the Manage Questionnaires page rather than
the Manage Applications page. For more information, see Configuring Data Driven
Events for a Questionnaire.
To configure how the questionnaire is displayed in the Navigation Menu, see
Configure the Navigation Menu Settings of a Questionnaire.
The By [field name] link is a quick filter for questionnaire records that include a
specific field value. For example, you could expand the "Submission Status" quick
filter in the Navigation Menu and click the value "Submitted" to search for
questionnaire records that contain this field value.
The following field types support quick filtering from the Navigation Menu:
l Cross-Reference
l Matrix
l Record Permissions
l Record Status
l User/Groups List
l Values List
36 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
In addition to configuring links, you can define default settings for searches
executed from the Navigation Menu, including the fields that are displayed and the
sort order of those fields.
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Chapter 2: Questionnaires 37
RSA Archer GRC Platform Questionnaires
Next Steps
Configure Data Driven Events for a Questionnaire
38 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
Hide Apply This action hides the Findings section when no findings
Findings Conditional have been associated with the questionnaire record.
Grid Layout
Set Review Set Date This action sets the Review Date field within a
Date questionnaire record to the current date when the value in
the Review Status field changes to Approved or Rejected.
Set Review Set Values This action sets the Review Status field to Awaiting
Status List Selections Review when the value in the Submission Status field
Upon Re- changes to Re-Submitted.
Submission
Set Set Date This action sets the Submission Date field within a
Submission questionnaire record to the current date when the value in
Date the Submission Status field changes to Submitted or Re-
Submitted.
Set Set Values These actions limit the values available for selection in
Submission List Selection the Submission Status field to In Process and Re-
Status List Submitted when the value of the Review Status field
Filter Values
Values changes to Rejected.
List Items
Chapter 2: Questionnaires 39
RSA Archer GRC Platform Questionnaires
Questionnaire values lists are different from global values lists in that you cannot
share them between questionnaires. The questionnaire values lists are restricted to
individual questionnaires but can be shared among questions in that questionnaire.
You can export a list from one questionnaire to another. Keep in mind that if you
export a questionnaire values list to another questionnaire, the two values lists are
not connected in any way. If you make a change to one list, that change is not
reflected in the other.
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Next Steps
Configure Show and Hide Rules for a Questionnaire
40 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
Question display rules are evaluated only one time for each questionnaire record.
Each show rule and hide rule is evaluated individually at the time of record creation
to determine the appropriate questions to display in the questionnaire. The system
first evaluates the show rules and generates a list of questions to show based on
attributes of the assessment target. Then the system evaluates the hide rules,
generates a list of questions to hide, and removes those questions from the show
list. Finally, a questionnaire record is created that includes only those questions that
are applicable to the assessment target.
Chapter 2: Questionnaires 41
RSA Archer GRC Platform Questionnaires
If the assessment target changes after the questionnaire record for that target has
been created, the display rules are not re-evaluated for the questionnaire. For
example, if the target is an application that is changed from Development to
Production status, the questionnaire record is not updated to include questions
related to production environments. To include these questions in a questionnaire for
the application, you would need to create a new questionnaire record for the
application.
For information on defining question properties that you can use in question display
events, see:
l Categorize a Question
l Update Question Filter Properties
l Link a Values List Question to Authoritative Sources
l Link a Values List Question to Control Standards
For instructions on configuring show and hide rules, see Configure Show and Hide
Rules for Questionnaires.
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
42 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
Chapter 2: Questionnaires 43
RSA Archer GRC Platform Questionnaires
specify the filter "Confidentiality: High" and a question includes the filters
"Confidentiality: High" and "Confidentiality: Medium," that question is not
displayed or hidden because it is not an exact match.
l Does not Equal. If the question is not configured with the exact filter
property and value, the question is shown or hidden. The question may have
the filter property and value you specify, but if it also has other values in the
same property, it is not an exact match. For example, if you specify the filter
"Confidentiality: High" and a question includes the filters "Confidentiality:
High" and "Confidentiality: Medium," that question is shown or hidden.
10. In the Value(s) column, select the specific filter values that should trigger a
question to be shown or hidden.
For example, if you selected the Criticality property in the Filter Property
column, you could select the value "High" in the Value(s) column. All questions
created with this specific filter value are shown or hidden, depending on the
type of display rule that you are creating.
11. Add more conditions, if needed, to the Question Display Actions section.
12. Click Save.
The rule is displayed on the Rules tab.
13. Click Apply on the Manage Questionnaire page.
Next Steps
Create a Campaign to Launch a Questionnaire
Note: Launching a campaign is not the only way to create questionnaire records.
44 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Option Description
l To create a manual campaign that must be launched by the user, click Add
New in the Manual Campaigns section.
The Manage Questionnaire Campaign page is displayed.
5. Complete the General Information section:
a. In the Name field, enter a name for the campaign.
b. To activate the campaign, select Active from the Status list.
c. In the Description field, enter a description to be displayed for internal use
only.
6. In the Optional Campaign Attributes section, you can select default values
that are populated in the corresponding fields of the questionnaire records. To
set these options, select from the following lists:
l From the Year list, select the year that you want populated in the Year field
of the questionnaire.
l From the Quarter list, select the quarter that you want populated in the
Quarter field of the questionnaire.
Chapter 2: Questionnaires 45
RSA Archer GRC Platform Questionnaires
l From the Due Date list, select the date that you want populated in the Due
Date field of the questionnaire. You can generate an email reminder to send
automatic reminder email messages to appropriate personnel as this date
approaches.
l From the Submitter list, select the user that you want assigned as the
submitter for the questionnaire record triggered by the campaign. The target
application must contain a User/Groups List or Record Permissions field to
assign the submitter for each questionnaire record triggered by the campaign.
When the campaign triggers the creation of a questionnaire record for a
specific asset, such as a database server, the owner of that asset
automatically is assigned as the submitter for the questionnaire record.
l From the Reviewer list, select the user that you want assigned as the
reviewer for the questionnaire record triggered by the campaign. The target
application must contain a User/Groups List or Record Permissions field to
assign the reviewer for each questionnaire record triggered by the campaign.
You can automatically assign reviewers for questionnaire records just as you
assigned submitters.
7. Create a target generation rule to filter the list of specific targets that need to be
assessed, thereby reducing the number of questionnaire records generated by the
campaign. In the Target Generation Conditions section, complete the
following steps:
a. In the Field To Evaluate column, select the field to evaluate for one or
more specific values.
To create additional conditions, click Add New.
b. In the Operator column, select the filter operator.
c. In the Value(s) column, select the values for the condition.
d. If you have created more than one condition, you can apply advanced logic
to your search criteria.
8. If you are creating a Scheduled campaign, in the Schedule Properties section,
select values from the Frequency, Time, and Time Zone lists.
An additional field for you to complete may be displayed depending on the value
that you select from the Frequency list.
9. Click Save on the Manage Questionnaire Campaign page.
Note: After a campaign has run, you can view the Campaign Execution History
report by clicking the Report icon for that campaign.
Next Steps
Assign Questionnaire Owners and Report Administrators
46 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Chapter 2: Questionnaires 47
RSA Archer GRC Platform Questionnaires
Procedure
Perform the steps detailed in Importing Data Into Leveled Applications.
Note: You can review changes made to the configuration of a question by viewing
the History Log.
The following changes do not impact content records created prior to the change:
l Adding a new question
l Changing question filter properties
48 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
l Inactivating an answer
l Creating a new campaign
l Changing the findings options
Procedure
1. Add a filter property for the Retired question and select the property as True.
See Update Question Filter Properties.
2. Add a rule to hide questions with the Retired filter property. See Configure
Show and Hide Rules for Questionnaires.
Because hide rules take precedence over show rules, the question is hidden
regardless of any other question filter properties or question display rules.
3. Add a new question to the questionnaire with the desired changes. See Create a
New Question in a Questionnaire.
Important: Use extreme caution when deleting content from a questionnaire. Once
the content is deleted, it cannot be recovered. RSA Archer highly recommends that
you create a backup of your data before deleting questionnaire content.
Do not import data into a questionnaire until the content delete process is complete.
If the questionnaire contains a large number of records, this process could take
several minutes. To determine whether all content has been deleted from the
questionnaire, reactivate the questionnaire and run a search to display all records.
When your search returns zero records, you can initiate a data import.
Chapter 2: Questionnaires 49
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
2. On the General tab, select Retired from the Status field and click Apply.
3. Click the Administration tab.
4. In the Delete Questionnaire Content section, click Delete Content.
Note: If this button is unavailable, the questionnaire is not retired. See step 2.
Note: You cannot import data into the questionnaire until the content delete process
has finished.
50 Chapter 2: Questionnaires
RSA Archer GRC Platform Questionnaires
Chapter 3: Questions
Managing Questions
A question is a special field type available only within questionnaires. Questions
enable users to evaluate the specific item being assessed, such as an asset, business
process, vendor, facility, and so on. Each question has a configurable set of
properties that govern how the question is displayed in the questionnaire and how
(or whether) the user is to interact with it. In addition to the properties associated
with standard fields, questions can be filtered through specific question display
rules, linked to authoritative sources, included in assessment scoring, and utilized in
automated findings generation.
You can create questions with predefined answers that users can select from, or
you can allow users to enter free-form text, dates, or numeric entries. You can also
allow users to attach documents, pictures, diagrams, and other types of files to a
questionnaire to provide supporting information or evidence. For a description of
each question type available in a questionnaire, see Question Types.
To configure and arrange questions within a questionnaire, use the Layout tab on
the Manage Questionnaires page. This tab provides point-and-click, drag-and-drop
tools for adding, editing, configuring, and arranging questions within a
questionnaire. For instructions on arranging the layout of questions in a
questionnaire, see Change the Layout of a Questionnaire.
In addition, you can use the Question Library application to build a centralized
library of questions that you can rference and copy into a questionnaire. For more
information on the Question Library, see Managing the Question Library.
You can perform the following question-related tasks:
l Copy Questions from the Question Library
l Create a New Question in a Questionnaire
l Update the General Properties of a Question
l Update Question Options
l Categorize a Question
Chapter 3: Questions 51
RSA Archer GRC Platform Questionnaires
Cross-Reference l Required
l Minimum Selections
l Maximum Selections
Date l Required
l Unique
l System Minimum Value
Numeric l Required
l Unique
l Minimum Value
l Maximum Value
l Maximum Precision
l System Maximum Value
l System Minimum Value
Text l Required
l Unique
l Maximum Characters
l Email Format
52 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
When validating the three new rules for the related record, the system only
validates records that were added to or removed from the reference field of the
original relationship. For example, a user in Application A creates a Cross-
Reference field, and then removes related record B1 in Application B. The only
record that is validated is B1, because it changed.
Chapter 3: Questions 53
RSA Archer GRC Platform Questionnaires
Scenario A
Scenario The user enrolls Record A2 into a workflow and
creates Copy A2C.
Scenario B
Scenario The user removes Record B1 from the Cross-
Reference field A2C.
The user enrolls Record A3 into a workflow and
creates Copy A3C.
The user edits Copy A3C and adds Record B1 to
the Cross-Reference field.
Scenario C
Scenario The user edits Copy A2C again and adds Record
B1 to the Cross-Reference field.
Question Types
You can add the following types of questions to a questionnaire:
l Attachment Question
l Cross-Reference Question
54 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
l Date Question
l Numeric Question
l Text Question
l Values List Question
Attachment Question
The Attachment question type enables users to upload documents, pictures,
diagrams, and other types of files to a questionnaire record to provide supporting
information or evidence. When configuring an Attachment question, you can specify
the total number of files that can be uploaded (attached), as well as the size
(between 1 and 100 MB) permitted for each file. You also can enable end users to
keyword search into attached documents. The following file types are supported for
document searching:
l Microsoft Word
l Microsoft Excel
l PDF
l Text
Cross-Reference Question
The Cross-Reference question type enables users to associate records from other
applications or questionnaires with a questionnaire record. For example, users could
answer the question "Who is responsible for monitoring the security of the server
room?" by selecting a user from your related Contacts application.
When you create a Cross-Reference question, a Related Records field
automatically is added to the related application or questionnaire. The Related
Records field provides a mirror image of the Cross-Reference question, meaning
that within an individual record in the related application or questionnaire, you can
see all records that have been cross-referenced to that record.
For example, if you have a Cross-Reference question within an vendor
questionnaire that is related to an Vendor Managers application, users can select
vendor managers for individual questionnaire records through the Cross-Reference
question. Then, if users access a record in the Vendor Managers application, they
can view all vendor questionnaire records that have been cross-referenced to that
particular vendor manager in the Related Records field.
Date Question
The Date question type accepts only a valid date entry and is displayed to users
with a calendar icon. Users can either enter dates directly or click to select a
date from the Date Range dialog box. When configuring the properties of a Date
question, you can enable users to enter a time of day to associate with the date, as
shown below.
Chapter 3: Questions 55
RSA Archer GRC Platform Questionnaires
In addition to the basic question configuration options, the Date question type also
supports a default date value. The default date value is set when a questionnaire
record is created. When configuring the default value, you can select to display the
date of questionnaire record creation, a date that is a specific number of days after
the date of record creation, or a static, specific date. You also can select to display
no default value.
Numeric Question
The Numeric question type allows only numeric-value entries. Numeric questions
can accept both positive and negative values and, by default, accept values of any
size. However, when configuring a Numeric question, you can choose to apply
minimum and maximum value constraints. You can also specify the number of
decimal places permitted for the value.
In addition to these basic question configuration options, the Numeric question type
also supports the following specialized options:
l Numeric Ranging. If you enable this option, you can define a set of numeric
ranges and apply a descriptive name to each range. For example, a range named
"High" might be mapped to the numeric range "8 - 10." The range name you
define for the question is then displayed in the Filter by Value section of the
Advanced Search page for the questionnaire. This allows users to search across
a range of values for your Numeric question by selecting the range name as part
of their filter criteria.
For example, suppose you have a Numeric question asking "What is the distance
to the CO-LO facility?" and you define the numeric ranges "0 - 5 Miles," "5-15
Miles" and "More than 15 miles." A user could execute a search in the
questionnaire and select the range "5-15 Miles" as a search filter to search for
only those records that contain a value in the Numeric question that is between 5
and 15.
l Format. By selecting this option, commas are used to separate units of numbers.
For example, if you enter the value "10000" in the Edit mode of the record, the
value would be displayed as "10,000" in the View mode of the record.
l Prefixes and Suffixes. By selecting one or both of these options, you can insert
text (up to 10 characters, including special characters) before or after the value
in a Numeric question to provide context for end users. For example, you can
enter a dollar sign as a prefix or a distance unit as suffix.
Prefixes and suffixes display in the View and Edit modes of the record as well
as in search results.
Text Question
The Text question type accepts both alphabetic and numeric entries. It can be
displayed to users in a single-line or a multi-line (scrolling) text area. If the question
is configured as a text area, you can specify the height (in lines) for the control.
56 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
By default, entries in this question type are not restricted. However, when
configuring this question type, you can choose to set a maximum character length
for entries. In addition, you can restrict users from entering a value in the Text
question that is identical to a value entered in another record within the
questionnaire, thereby ensuring that all values in the Text question are unique.
You can choose to use a list or radio buttons when configuring a Values List
question. If you choose one of the other control types for the question, you can
specify the minimum and maximum number of selections users are permitted to
make. In addition to configuring the interface, you also can add a numeric weight to
a question and assign a numeric value to the individual selections available within
the question. These numbers are used to compute the score for a questionnaire.
During the configuration process, you can populate a Values List question with
either a custom or a questionnaire values list. If you choose to use a custom answer
list, you must define the answers for the question. Custom answer lists cannot be
used to populate any other Values List question. For more information, see Define
Answers for a Values List Question.
You also can create questionnaire values lists that you can reuse for any Values
List question within the questionnaire. For example, you could create an answer list
with the values "Yes," "No," and "I don't know," and you could use this list for
questions such as "Is sensitive cardholder data securely disposed of when no longer
needed?" and "Are all but the last four digits of the account number masked when
displaying cardholder data?" For more information, see Work with Questionnaire
Values Lists.
Chapter 3: Questions 57
RSA Archer GRC Platform Questionnaires
Note: Once you copy a question from the Question Library into your questionnaire,
it no longer is connected to the original question in the Question Library. As a
result, you can modify the question without affecting the version in the Question
Library. This enables you to tailor questions for a specific type of assessment. For
example, you can change the question weighting, relate a question to additional
authoritative sources, add new answer options, and more.
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
2. Click the Fields tab and then click the Question Library link in the top-right
corner of the page.
The Record Lookup page is displayed listing the available questions.
Note: You also can access the Record Lookup page from the Layout tab. Click
the Add New Field arrow and select Add from Question Library.
3. On the Record Lookup page, select the checkbox for each question that you
want to copy into your questionnaire.
Note: To limit the types of questions that you see on the Question Lookup page,
enter the values that you want to filter by in the filter boxes for that column.
Click Filter in the column header to refine your search results. You can also
select all questions within the Search Results page by selecting the checkbox at
the top of the Question Name column.
4. Click Apply to copy the selected questions into your questionnaire. When
prompted to confirm your selections, click Continue to complete the copy
operation.
When you leave the Question Lookup page, the Administrators tab is displayed
on the Manage Questionnaires page. In the Last Question Library Copy control
group at the bottom of the page, you can see the status of your copy operation.
When it is complete, click the Layout tab to view your questions in the
questionnaire layout. The questions automatically are grouped in sections by
question category.
5. Click Apply.
Related Topics
Create a New Question in a Questionnaire.
58 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Note: To protect data integrity, the Questionnaire feature prohibits question type
changes, for example, changing a Date question to a Text question, once a question
has been created.
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Chapter 3: Questions 59
RSA Archer GRC Platform Questionnaires
5. Click OK.
The New Field page is displayed.
6. In the Name field, enter a name for the question.
7. Click Apply.
Next Steps
Update the General Properties of a Question
Configuring Questions
You can create and configure a question by performing the following steps in order:
1. Create a Question.
2. Update the General Properties of a Question.
3. Update Question Options.
4. Update Question Text.
5. Update Question Filter Properties.
6. Update the Help Text for a Question.
Based on the filter properties that you assign to a question, you can define rules that
will display or hide the question when an end user fills out the questionnaire based
on attributes of the target the user is assessing, such as a specific asset, vendor,
business process, and so on.
For example, suppose you have defined a question display rule for a questionnaire
that assesses targets in your Vendors application. The question display rule
specifies that if a vendor handles your customer's financial information, the
questionnaire should display all questions with the following filter properties:
l Customer Data: Yes
l Financial Data: Yes
When a vendor relationship manager in your organization fills out the questionnaire
to assess a vendor that handles your customer's financial information, the manager
is prompted to answer all questions with these filter properties, as determined by
the question display rule that you defined. For more information on question display
rules, see Configure Show and Hide Rules for a Questionnaire.
60 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
You can create and assign any number of filters to a question. When you create a
filter, you must provide a name and a list of values. For example, the name of your
filter could be "Customer Data," and the available values could be "Yes" and "No."
When you assign the filter to a question, you will select the filter and the specific
filter value that applies to the question. For example, you would apply the
"Customer Data: Yes" filter to the following question: "Do you have a documented
program in place to dispose of customer data when you no longer need to handle
it?"
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Next Steps
Update Question Options
Chapter 3: Questions 61
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Next Steps
Update Question Text
62 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
The following table describes the display and functionality options for the
Attachment question.
For instructions on updating these options, see Update Question Options.
Option Description
Grid The Grid option contains a grid containing the name of the
file, the size of the file, the file type, and the upload date for
each attachment added to the record.
Single Column The Single Column option contains the name of the
attachment as a single column. Users can click the name of the
file to access the file.
Options Section
Required Field Select this option to require users to supply a value for the
field when adding or editing a record in the application.
Required fields are indicated with an icon (selected in the
Appearance feature) to alert users that they must supply a
value. If this checkbox is not selected, users can skip this field
when adding or editing a record in the application.
Auditing Information Select this option to display auditing information next to the
field each time that its value is changed. The auditing
information includes only the name of the user who made the
change and the date and time of the change. If this checkbox
is not selected, auditing information is not displayed with the
field in the user interface.
Search Results Select this option to make this field available for display in
search results. If this checkbox is not selected, you cannot
include this field in search results or reference the values in
the field in search filters.
Search Default Field Select this option to include the field by default in search
results for the application. This option does not prevent users
from removing the field from the Search Results page. Users
can click Modify in the toolbar and remove the field from the
Fields to Display section of the application's Advanced Search
page.
Chapter 3: Questions 63
RSA Archer GRC Platform Questionnaires
Option Description
Keyword Searching Select this option to enable users to search documents attached
to the field. File types supported for document searching
include Microsoft Word, Microsoft Excel, .pdf, and text. If a
user does not have access to the field but the field is
configured to allow document searching, the field will still be
searched when the user executes a keyword search in the
application. However, the field will not display in the search
results.
Validate Always Select this option to validate the field when any field has
changed when saving a record. If the Validate Always option
is not selected, the field is validated only when the value in
that field has changed. See Managing Questions.
Configuration Section
Minimum Attachments Enter the minimum number of attachments that you want to
require for the field.
Maximum Attachments Enter the maximum and minimum number of attachments that
you want to require for the field.
Maximum Size Select the maximum size, up to 100 MB, that you want to
allow for each file uploaded to the Attachment field. This
setting does not restrict the total size of all files uploaded to
the field.
Display Fields Select which fields of information you want to display along
with your attachment file.
64 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Option Action
Single Column Select this option to display the name of the attachment as a
single column. Users can click the name of the file to access
the file.
Options Section
Required Field Select this option to require users to supply a value for the
field when adding or editing a record in the application.
Required fields are indicated with an icon (selected in the
Appearance feature) to alert users that they must supply a
value. If this checkbox is not selected, users can skip this
field when adding or editing a record in the application.
Auditing Information Select this option to display auditing information next to the
field each time that its value is changed. The auditing
information includes only the name of the user who made
the change and the date and time of the change. If this
checkbox is not selected, auditing information is not
displayed with the field in the user interface.
Search Results Select this option to make this field available for display in
search results. If this checkbox is not selected, you cannot
include this field in search results or reference the values in
the field in search filters.
Search Default Field Select this option to include the field by default in search
results for the application. This option does not prevent
users from removing the field from the Search Results page.
Users can click Modify in the toolbar and remove the field
from the Fields to Display section of the Advanced Search
page for the application.
Chapter 3: Questions 65
RSA Archer GRC Platform Questionnaires
Option Action
Add New If you selected the Grid display control, you can also select
the Add New checkbox to allow users to add new records to
the related applications from a record in View mode. Users
will not have to open a record in Edit mode to create new
related records. If a user does not have rights to create
records in the related application, the link will not be
displayed for that user.
When a user creates a new related record from View mode,
that record will be selected in the Cross-Reference field just
as it would if it were created from Edit mode. For example,
if a user opens a Vendor record in View mode and creates a
record in the related Audits application by clicking Add
New in the Cross-Reference field, that new Audit record will
be selected in the Vendor record's Cross-Reference field,
even though the user did not open the Vendor record for
editing.
Validate Always Select this option to validate the field when any field has
changed when saving a record. If the Validate Always
option is not selected, the field is validated only when the
value in that field has changed. See Managing Questions.
66 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Option Action
Display Fields If you selected the Grid or Single Column display control,
you can define the fields of data from the relationship
application that should display in the Record Lookup page
for end users when they select related records in the Cross-
Reference field.
Chapter 3: Questions 67
RSA Archer GRC Platform Questionnaires
Option Action
Display Format Select how you want the cross-referenced records displayed
on the Record Lookup page:
l Column Hierarchical. Displays the records in a
columnar layout where fields are displayed across the
page from left to right, and the field values are presented
showing relationships.
l Column-Flat. Displays the records in a simple columnar
layout without any grouping of values.
Use Record Lookup Select this option to apply the values selected in the Record
Configuration Lookup Configuration section to the corresponding
View/Edit Display control group fields.
Display Fields If you selected the Grid or Single Column display control,
you can define the fields of data from the relationship
application that should display in the Lookup control for
end users when they select related records in the Cross-
Reference question.
68 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Option Action
Configuration Section
Minimum and Specify the minimum and maximum number of records that
Maximum Selections users can select in the question.
Field Height If you selected the Single Column display control, you can
configure the height of the question in lines.
This setting impacts the display of the question only when
users add or edit records in the questionnaire. For example, if
you set the question height to three lines, and a user makes
four selections in the question, a scroll bar is displayed.
Default Records If you selected the Grid display control, you can configure
Display the number of cross-referenced records that display within
the grid. If this option is selected, only the first X records are
displayed, where X is the selected value for the Default Grid
Display field. If the number of records exceeds the default
display number, a View All link is displayed. A user can
click this link to view all of the associated records.
Chapter 3: Questions 69
RSA Archer GRC Platform Questionnaires
Option Description
Options Section
Required Field Select this option to require users to supply a value for the field
when adding or editing a record in the application. Required fields
are indicated with an icon (selected in the Appearance feature) to
alert users that they must supply a value. If this checkbox is not
selected, users can skip this field when adding or editing a record
in the application.
Auditing Select this option to display auditing information next to the field
Information each time that its value is changed. The auditing information
includes only the name of the user who made the change and the
date and time of the change. If this checkbox is not selected,
auditing information is not displayed with the field in the user
interface.
Search Results Select this option to make this field available for display in search
results. If this checkbox is not selected, you cannot include this
field in search results or reference the values in the field in search
filters.
Search Default Select this option to include the field by default in search results
Field for the application. This option does not prevent users from
removing the field from the Search Results page. Users can click
Modify in the toolbar and remove the field from the Fields to
Display section of the application's Advanced Search page.
70 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Option Description
Unique Field Select this option to prevent users from entering an identical value
in the field within two separate records. If a user attempts to save a
value in the field that has already been saved in the field for
another record, the user is prompted to enter a unique value.
Key Field Select this option if you want the field to serve as the key field for
the application. Only one field can serve as the key field for an
application. You can select the key field values in search results,
and users can click the values to open individual records. Once
saved, you can only clear this checkbox by selecting the Key Field
checkbox for another field in the application. Also, when you
select the Key Field checkbox for a field and save your changes,
the Required Field, Search Results, and Search Default Field
checkboxes are automatically selected.
Validate Select this option to validate the field when any field has changed
Always when saving a record. If the Validate Always option is not
selected, the field is validated only when the value in that field has
changed. See Managing Questions.
Configuration Section - Select the default date value that is displayed in the Date
field when a user adds a new record in the application. The default date value is set
on the date of record creation; the value is not affected by record edits.
None Select this option if you do not want to place a default value in the
Date field.
Current Date Select this option to display the date of record creation in the Date
field.
Future Date Select this option to display a default date value that is a specific
number of days after the date of record creation. Then enter the
specific number of days in the field to the right.
Specific Date Select this option to display a static date as the default value for
the Date field. Then enter the date in the adjacent field or click
to select the date from the Date Range dialog box.
Chapter 3: Questions 71
RSA Archer GRC Platform Questionnaires
Option Description
Options Section
Required Select this option to require users to supply a value for the field when
Field adding or editing a record in the application. Required fields are
indicated with an icon (selected in the Appearance feature) to alert
users that they must supply a value. If this checkbox is not selected,
users can skip this field when adding or editing a record in the
application.
Auditing Select this option to display auditing information next to the field each
Information time that its value is changed. The auditing information includes only
the name of the user who made the change and the date and time of the
change. If this checkbox is not selected, auditing information is not
displayed with the field in the user interface.
Search Select this option to make this field available for display in search
Results results. If this checkbox is not selected, you cannot include this field in
search results or reference the values in the field in search filters.
Search Select this option to include the field by default in search results for the
Default application. This option does not prevent users from removing the field
Field from the Search Results page. Users can click Modify in the toolbar and
remove the field from the Fields to Display section of the application's
Advanced Search page.
Unique Select this option to prevent users from entering an identical value in
Field the field within two separate records. If a user attempts to save a value
in the field that has already been saved in the field for another record,
the user is prompted to enter a unique value.
Key Field Select this option if you want the field to serve as the key field for the
application. Only one field can serve as the key field for an application.
You can select the key field values in search results, and users can click
the values to open individual records. Once saved, you can only clear
this checkbox by selecting the Key Field checkbox for another field in
the application. Also, when you select the Key Field checkbox for a
field and save your changes, the Required Field, Search Results, and
Search Default Field checkboxes are automatically selected.
72 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Option Description
Sum Field Select this option to provide a total of all values entered in the field on
the Search Results page for the application. An additional row will
appear at the bottom of the search results page that provides a total
value in the Numeric field column. The summation value represents a
grand total in all records displayed in the search results; subtotals are
not shown per page.
Numeric Select this option to enable users to filter search results in the
Ranging application based on specific ranges of values in the Numeric field. The
field will be displayed in the Field to Evaluate list in the Filters section
of the application's Advanced Search page.
Format Select this option to format the value using thousand separators.
Validate Select this option to validate the field when any field has changed
Always when saving a record. If the Validate Always option is not selected, the
field is validated only when the value in that field has changed. See
Managing Questions.
Configuration Section
Decimal Specify the number of decimal places that you want to require for
Places values entered in the field. The largest value available for this field is 6.
If a user enters a value in the Numeric field with fewer decimal places
than the number you have required, the value will be padded with
zeros. For example, if you require 3 decimal places and a user enters a
value of "4.1" in the field, the value will be displayed as "4.100" when
the record is saved. If a user enters a value in the field with more
decimal places than the number you have required, the user will not be
permitted to save the record and will be prompted to limit the number
of decimal places in the value to fit the field's requirements.
Negative Select how you want negative numbers to display. Options include the
Display following:
l (1234.56) font color = red; default option
l -1234.56 font color = red
l (1234.56) font color = black
l -1234.56 font color = black
Minimum To require users to enter values that fit within a defined range (such as
Value and between 1 and 100), enter the minimum and maximum values allowed
Maximum in the field in the Minimum Value and Maximum Value fields.
Value
Chapter 3: Questions 73
RSA Archer GRC Platform Questionnaires
Option Description
Prefix Enter up to 10 characters of text that you want to display in front of the
numeric value. For example, you could enter a $ symbol to label the
values as dollars.
Suffix Enter up to 10 characters of text that you want to display after the
numeric value. For example, you could enter "miles" to label the values
as a measurement of distance.
Option Description
Options Section
Required Select this option to require users to supply a value for the field when
Field adding or editing a record in the application. Required fields are
indicated with an icon (selected in the Appearance feature) to alert
users that they must supply a value. If this checkbox is not selected,
users can skip this field when adding or editing a record in the
application.
Auditing Select this option to display auditing information next to the field each
Information time that its value is changed. The auditing information includes only
the name of the user who made the change and the date and time of the
change. If this checkbox is not selected, auditing information is not
displayed with the field in the user interface.
74 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Option Description
Search Select this option to make this field available for display in search
Results results. If this checkbox is not selected, you cannot include this field in
search results or reference the values in the field in search filters.
Search Select this option to include the field by default in search results for
Default the application. This option does not prevent users from removing the
Field field from the Search Results page. Users can click Modify in the
toolbar and remove the field from the Fields to Display section of the
application's Advanced Search page.
Unique Select this option to prevent users from entering an identical value in
Field the field within two separate records. If a user attempts to save a value
in the field that has already been saved in the field for another record,
the user is prompted to enter a unique value.
Key Field Select this option if you want the field to serve as the key field for the
application. Only one field can serve as the key field for an
application. You can select the key field values in search results, and
users can click the values to open individual records. Once saved, you
can only clear this checkbox by selecting the Key Field checkbox for
another field in the application. Also, when you select Key Field for a
field and save your changes, the Required Field, Search Results, and
Search Default Field checkboxes are automatically selected.
Validate Select this option to validate the field when any field has changed
Always when saving a record. If the Validate Always option is not selected, the
field is validated only when the value in that field has changed. See
Managing Questions.
Configuration Section
Chapter 3: Questions 75
RSA Archer GRC Platform Questionnaires
Option Description
Maximum To restrict the number of characters a user can enter in the Text field,
Characters enter the maximum number of allowable characters in the Maximum
Characters field.
Input Mask If you selected the Text Field display control, you can select masked
text fields that require end users to enter data in defined formats. Select
from the following options:
l SSN. The format is ###-##-####. The mask will be configured so
the entire SSN is confined to one field.
l Telephone. The format is ###-###-#### The mask will be
configured so the entire phone number is confined to one field.
l Zip Code. The format is #####.
l Zip+4. The format is #####-####.
l IP Address v4. The format is ###.###.###.###.
l IP Address v6 Full. The format is
####.####.####.####.####.####.####.####.
l IP Address v6 Shorthand. The format is any appropriate shorthand
notation.
l Email Address. The mask is configured to require the @ character
in the text entry.
Default To prepopulate your Text field with default text, enter the default text
Value in the Default Value text box. If you want this default text to disappear
once an end user selects the Text field in Edit mode, select Remove the
default text on mouse click.
Note: Default text with the "Remove" option enabled should be used
for only instructional and informational purposes. The text will not be
saved with the record. If you would like your default text to be treated
as a standard text field entry, do not select the Remove the default text
on mouse click checkbox.
Default Select this option to remove the default text when the user clicks the
Behavior field.
76 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Option Description
Options Section
Required Select this option to require users to supply a value for the field when
Field adding or editing a record in the application. Required fields are
indicated with an icon (selected in the Appearance feature) to alert
users that they must supply a value. If this checkbox is not selected,
users can skip this field when adding or editing a record in the
application.
Auditing Select this option to display auditing information next to the field each
Information time that its value is changed. The auditing information includes only
the name of the user who made the change and the date and time of the
change. If this checkbox is not selected, auditing information is not
displayed with the field in the user interface.
Search Select this option to make this field available for display in search
Results results. If this checkbox is not selected, you cannot include this field in
search results or reference the values in the field in search filters.
Search Select this option to include the field by default in search results for
Default the application. This option does not prevent users from removing the
Field field from the Search Results page. Users can click Modify in the
toolbar and remove the field from the Fields to Display section of the
application's Advanced Search page.
Chapter 3: Questions 77
RSA Archer GRC Platform Questionnaires
Option Description
Description Select this option to display the selected value for the field as a
Links hyperlink when users view records in the application. Users can click
the linked value to read a description of the value from a pop-up
window.
Validate Select this option to validate the field when any field has changed
Always when saving a record. If the Validate Always option is not selected, the
field is validated only when the value in that field has changed. See
Managing Questions.
Configuration Section
Minimum If you selected the Check Boxes, Listbox, or Values Popup display
Selections control in the Display Control section, you can specify the minimum
and and maximum number of values that can be selected in the field. Enter
Maximum the desired number of values in the Minimum Selections and Maximum
Selections Selections fields.
Column If you selected the Radio Buttons or Check Boxes display control in
Layout the Display Control section, you can configure the number of columns
in the field by selecting the desired number of columns.
Field If you selected the Listbox display control in the Display Control
Height section, you can configure the height of the field in lines by entering
the desired number of lines in the Field Height field. If more values are
available for selection in the field than the number of lines you
specified for the field height, a vertical scroll bar will appear in the
field to enable users to view all available values.
78 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Important: If you do not manage authoritative source data in the Platform, disregard
the Authoritative Source References section on the Define Fields page. You cannot
use this feature.
When you link a Values List question to an authoritative source, the authoritative
source becomes a filter property for the question that you can utilize in the creation
of question display rules. These rules enable you to show or hide questions based on
the attributes of an assessment target. For example, suppose you create a Values
List question and link it to the Payment Card Industry (PCI) Data Security Standard.
You can create a question display rule specifying that questions related to PCI
should display in questionnaires for all vendors that provide payment processing
services. For more information on question display rules, see Configure Show and
Hide Rules for a Questionnaire.
Linking a question to an authoritative source also enables you to search completed
questions for instances of non-compliance with a particular regulation, industry
standard, and so on. Also, if you enable findings for the questionnaire you are
managing, the system automatically creates Findings records for questions that are
answered incorrectly, and each finding includes the associated authoritative source,
enabling you to search and sort findings by source. For more information on
findings, see Auto-Generate Findings for Questionnaires.
Chapter 3: Questions 79
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
2. Click the Fields tab and in the Field column, click the question that you want to
configure.
3. Click the Question tab.
4. If the application that contains your authoritative sources does not display in the
Application column, click the Manage References link in the Authoritative
Source References section and perform the following steps to create a
reference to your authoritative source application:
a. In the Authoritative Sources section, click Add New.
The Manage Authoritative Source List page is displayed.
b. Click Add New.
A listing of applications is displayed.
c. Select one or more applications.
d. Click OK to return to the Manage Authoritative Source List page.
e. Click Save.
The Manage Field page is displayed.
c. Click the Question tab if it is not already displayed.
5. To link the question to a specific record within your designated authoritative
sources application, click Select in the Authoritative Source References
section.
The Record Lookup dialog box opens.
6. Select the authoritative source that you want to link to your question:
a. Scroll through the list of available authoritative sources, or click Show
Filters, and enter keywords to narrow the list.
b. Once you locate the authoritative source that you want to link to your
question, select the checkbox for that source. You can select multiple
checkboxes.
7. Click OK to return to the Manage Field page.
8. To remove a selected authoritative source reference, click in the Reference
80 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
column
9. Click Apply.
Link a Values List Question to Control Standards
You can link a Values List question to control standards, which are mandatory
directives for carrying out corporate security policies and are used to measure
policy compliance.
Important: This option is available only if your organization licenses the Policy
Management solution, which includes a Control Standards application. If you do not
license Policy Management, the Control Standards control is not displayed, and you
cannot use this feature.
When you link a Values List question to a control standard, the standard becomes a
filter property for the question that you can utilize in the creation of question display
rules. These rules enable you to show or hide questions based on the attributes of an
assessment target. For example, if you create a Values list question and link it to
your Password Changes control standard. You can create a question display rule
specifying that questions related to Password Changes should display in
questionnaires for all applications that require user logon. For more information on
question display rules, see Configure Show and Hide Rules for a Questionnaire.
Linking a question to a control standard also enables you to search completed
questions for instances of non-compliance with a particular standard. Also, if you
enable findings for the questionnaire that you are managing, the system will
automatically create Findings records for questions that are answered incorrectly,
and each finding will include the associated control standard, enabling you to search
and sort findings by standard. For more information on findings, see Auto-Generate
Findings for Questionnaires.
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
3. Click the Fields tab and in the Field column, click the question that you want to
configure.
4. Click the Question tab.
Chapter 3: Questions 81
RSA Archer GRC Platform Questionnaires
6. Select the control standard that you want to link to your question:
a. Scroll through the list of available control standards, or click Show Filters
and enter keywords to narrow the list.
b. Once you locate the control standard that you want to link to your question,
select the checkbox for that standard. You may select multiple checkboxes.
7. Click OK to return to the Manage Field page.
8. To remove any selected control standard references, click and in the Record
Lookup dialog box, clear the checkboxes or any record references that you want
to remove and click Apply.
9. Click Apply.
Define Answers for a Values List Question
You can define answers for a Values List question, either by adding answers
manually or importing them from an .xml file. You can create any number of
answers for a single question, and each answer can have a unique set of attributes,
including a default status, an assigned numeric value, text color, and more.
For more information on questionnaire-level answer lists, see Work with
Questionnaire Values Lists.
For example, suppose that you are managing the question, "Are intrusion alarms in
place and monitored by appropriate authorities in case of unauthorized access to
your facilities?" You could create the following answers for assessors to choose
from:
l Yes, all facilities have monitored intrusion alarms in place.
l Yes, but not at all facilities.
l No, we have not implemented intrusion alarms at our facilities.
Important: The Answers tab enables you to create and edit custom answers that are
unique to the question you are managing. If you have selected to use a questionnaire
values list rather than a custom list for the question, you also can create and edit
answers in that shared list. Be aware that any changes that you make to a
questionnaire values list impacts every question that uses the list. If you need to add
or edit answers for a question that uses a questionnaire values list but you do not
want your changes to impact other questions, RSA Archer recommends that you
delete the question and recreate it to use a custom answer list. You can then create
the appropriate answers for the question without affecting any others.
82 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
2. Click the Fields tab and in the Field Name column, click the field whose
properties you want to define.
3. Click the Answers tab.
4. Do one of the following:
l To add a new answer, click Add New.
The fields in the Properties area are reset.
l To edit an existing answer, click the answer in the Text Value column.
The fields in the Properties area display the attributes of the selected
answer.
5. In the Text Value field, enter the answer text, for example, "Yes".
6. In the Description field, enter a description for the answer.
7. To make the answer unavailable for selection, clear the Active checkbox.
If users have already selected the answer within a questionnaire, those
selections are reserved. Inactivating an answer is a good way to retain historical
data while limiting future selections. By default, the Active checkbox is
selected and the answer is available for selection in the questionnaire.
8. Select the Default Selection checkbox to configure this answer as the default
selection for users.
9. To associate a numeric value with the answer, in the Numeric Value field,
enter the appropriate number in this field.
For example, you could associate the number 10 with the answer "Yes." The
Numeric Value field accepts positive, negative, and decimal values. You can
reference these numeric values in calculated field formulas for custom
questionnaire scoring. This value also is factored into the standard questionnaire
scoring.
10. To display the answer in a specific color, click in the Text Color field
and select the color.
If you associate a color with an answer, the color is displayed in questionnaire
records in view mode. Answers are not displayed in color when users fill out a
questionnaire.
Chapter 3: Questions 83
RSA Archer GRC Platform Questionnaires
11. To set the answer as the correct answer for all questions that utilize the list,
select the checkbox in the Correct field.
12. To include an image to represent the answer, such as a green checkmark for the
value "Yes," click Add in the Image field, select a graphic and click OK.
If you associate an image with an answer, the image is displayed in
questionnaire records in view mode in place of the value name. Answers are not
displayed as an image when users fill out a questionnaire.
13. To require users to enter an explanation when they select the answer, select the
checkbox in the Other field.
When selected, a text box is displayed next to the question when the user
selects this answer. The user must then enter comments in this text box.
Important: You may select Other for only one answer per answer list. If you
create another answer and select the Other checkbox, the checkbox is cleared
for the first answer. If users have already provided comments for the first
answer while filling out a questionnaire, those comments will be lost.
Note: If the name is not linked, you cannot edit the questionnaire.
2. Click the Fields tab and in the Field Name column, click the field whose
properties you want to define.
3. Click the Answers tab.
4. From the Sort Order drop-down list, select one of the following options:
l Custom. Answers display in the specific order you define. To adjust the
order of answers, drag and drop the answers in the Structure area.
l Ascending. Answers display in ascending alphanumeric order. For example,
the answers "High," "Medium" and "Low" would be displayed in the
following order: High, Low, Medium.
84 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
2. Click the Fields tab and in the Field Namecolumn, click the field whose
properties you want to define.
3. Click the Answers tab.
4. Click Import.
The File Upload dialog box opens.
Note: To export a values list for use in another questionnaire, click the Export
link. Save the resulting XML to a location where you can easily find it later.
Chapter 3: Questions 85
RSA Archer GRC Platform Questionnaires
8. Click Save.
Important: If you change the text of a question that has already been answered in
one or more questionnaire records, the question is updated in the existing saved
questionnaire records and may invalidate the answers. Take caution in modifying
question text if your changes alter the meaning of the question.
If you are working with a Values List question, the Question tab also provides a
control for applying a numeric weight to the question. (You cannot assign a weight
to other question types, including Text, Numeric, Date, Attachment, and Cross-
Reference). When a user completes a questionnaire, the question weight is
multiplied by the numeric value of the selected answer to produce a question score.
See Update Question Weighting.
For an overview of the complete configuration process, see Configuring Questions.
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
2. Click the Fields tab and in the Field Name column, click the field whose
properties you want to define.
3. Click the Questions tab.
4. In the Question Text field, make the appropriate changes to your question.
5. From the Category list, select an appropriate category for the question. If
necessary, click Edit to modify the list of categories.
86 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Next Steps
Update Question Filter Properties
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
2. Click the Fields tab and in the Field Name column, click the field whose
properties you want to define.
3. Click the Questions tab.
4. Do one of the following:
l To apply an existing filter to the current question, in the Question Filter
Properties section, click in the Values column for that filter and select
Chapter 3: Questions 87
RSA Archer GRC Platform Questionnaires
the specific filter value that applies to your question. To remove a filter from
the question, click to the right of the filter value.
l To add a new filter, click Add New.
Important: Do not click to remove a filter from the current question. Doing
so will permanently delete the filter for all questions that use it. Instead, use
to remove the filter from the current question while preserving its application to
other questions. If the Value column for a filter is blank, that filter is not applied
to the current question.
12. In the Question Filter Properties section, click to the right of the filter that
you just created.
13. Select one or more filter values to apply to the question and click Apply.
Next Steps
Update the Help Text for a Question
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
88 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Note: If the name is not linked, you cannot edit the questionnaire.
Categorize a Question
You can assign a question to a category for organizational and filtering purposes,
such as Access Control, Business Continuity, and Risk Management. This enables
you to group and view the results of a questionnaire by category.
If you enable Findings for the questionnaire that you are managing, the system
automatically creates Findings records for questions that are answered incorrectly,
and each finding includes the associated question category, enabling you to search
and sort findings by category. For more information on findings, see Auto-Generate
Findings for Questionnaires.
Chapter 3: Questions 89
RSA Archer GRC Platform Questionnaires
A key use of question categories is in the creation of question display rules. You
can define rules to show or hide questions when end users fill out a questionnaire
based on attributes of the target they are assessing. For example, suppose you have
defined a question display rule for a questionnaire that assesses targets in your
Assets application. The question display rule specifies that if an asset contains
confidential customer data, the questionnaire should display all questions in the
Access Control category. When an asset manager in your organization fills out the
questionnaire to assess the security of a server that houses confidential customer
data, the asset manager will be prompted to answer the Access Control questions
you have selected for display. For more information on question display rules, see
Configure Show and Hide Rules for Questionnaires.
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
2. Click the Fields tab and in the Field Name column, click the field whose
properties you want to define.
3. Click the Question tab.
4. In the Category field, select the appropriate category for the question. A
question can belong to only one category.
5. To create a new category:
a. Click Edit to the right of the category field.
The Edit Filter Property: Category page is displayed.
b. In the Filter Values section, click Add New.
c. In the Value field, enter the category name and click Apply.
d. Close the Edit Filter Property page.
6. Click Save.
90 Chapter 3: Questions
RSA Archer GRC Platform Questionnaires
Chapter 4: Findings
Managing Findings
Findings is an application that is used to auto-generate records from questionnaires.
When the Findings feature is enabled, a record is created in the Findings application
each time a user answers a question incorrectly in the questionnaire. This enables
you to view reports to determine the risk associated with specific targets.
Findings are not a required component of your assessment process, but by enabling
findings, you gain valuable insight into areas of non-compliance within your
organization. Each finding generated by the system is prepopulated with the:
l Question that was incorrectly answered.
l Incorrect answer the user selected.
l Specific target of the assessment.
l Questionnaire record in which the question was incorrectly answered.
l Authoritative source related to the question that was incorrectly answered (if
applicable).
l Control standard related to the question that was incorrectly answered (if
applicable).
Note: Consider adding the Findings application to the same solution as your
questionnaire. This allows you to access the Findings application from the
Navigation Menu for the purposes of searching and managing records.
Chapter 4: Findings 91
RSA Archer GRC Platform Questionnaires
Configuring Findings
When you configure findings generation for a questionnaire, you must define the
specific conditions within the questionnaire that should trigger findings creation. By
default, findings are created for a questionnaire record when the value in the
Submission Status field is changed to Submitted. You can change this default
condition, or you can create additional conditions that will trigger findings creation.
For example, you can generate findings when a questionnaire record is submitted
and when it is approved. If multiple conditions are defined, all of them must be met
in order to trigger findings creation. Note that a finding is created only once for
each incorrectly answered question. So if a finding is created for a question when
the questionnaire is submitted and that same question is still incorrectly answered
when the questionnaire record is marked Approved, the system does not create
another finding for that question.
As an optional step, you can create static or dynamic content that is displayed in the
Description field in all findings generated for the questionnaire. For example, you
could enter the following: "The question '[Question]' was answered incorrectly. The
answer provided was '[Answer].'" The [Question] and [Answer] elements in this
text display the specific question that was answered incorrectly and the answer the
user provided. So the text might be displayed in a Findings record as: "The question
'Is strong encryption used for restricted information?' was answered incorrectly.
The answer provided was 'No'."
You can perform the following Findings-related tasks:
l Auto-Generate Findings for Questionnaires
l Categorize a Question
l View Findings from a Questionnaire
l Remediate a Finding
l Accept the Risk of a Finding
92 Chapter 4: Findings
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the questionnaire that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Questionnaires.
c. Click the questionnaire.
Note: If the name is not linked, you cannot edit the questionnaire.
Chapter 4: Findings 93
RSA Archer GRC Platform Questionnaires
l [Weighted Score]. This element is the weighted score for the question,
which the system generates by multiplying the question weight and the
numeric value associated with the incorrect answer.
7. Click Apply.
Next Steps
Work with Questionnaire Values Lists
Important: To work with Findings, your user account must have access to both the
questionnaire and to the Findings application.
Procedure
1. Select the finding that you want to manage:
a. In the Navigation pane, expand the questionnaire and click Display All.
The individual questionnaires associated with that questionnaire are
displayed on the Search Results page.
b. Click the questionnaire for which you want to display findings.
2. Expand the Findings section.
3. Click the Finding ID for the Finding record that you want to view.
The Findings page is displayed with information for that record.
4. To close a finding, you must do one of the following:
l Remediate a Finding.
l Accept the Risk of a Finding.
Remediate a Finding
To remediate and close a Finding, associate the Finding record to a Remediation
Plan record. These steps apply to a default questionnaire. Your administrator may
have customized the questionnaire.
Important: To work with Findings, your user account must have access to both the
questionnaire and to the Findings application.
94 Chapter 4: Findings
RSA Archer GRC Platform Questionnaires
Procedure
1. Select the finding that you want to manage:
a. In the Navigation pane, expand the questionnaire and click Display All.
The individual questionnaires associated with that questionnaire are
displayed on the Search Results page.
b. Click the questionnaire for which you want to display findings.
2. Expand the Findings section.
3. Click the Finding ID for the Finding record that you want to view.
The Findings page is displayed with information for that record.
4. Click Edit.
5. In the Description section, click the Response field and click Remediate
Risk.
6. Complete the fields in the Remediation section:
a. To add a new Remediation Plan record, click Add New.
b. Complete the fields provided and click Save to save the Remediation Plan to
the Findings record.
c. In the Remediation Validated field, select Yes.
7. Continue to update the Findings record as needed. Depending on your
organization, you may also need to update the values in the Workflow section.
8. Click Save.
The status of the Findings record is changed to Close.
Note: These steps apply to a default questionnaire. Your administrator may have
customized the questionnaire.
Important: To work with findings, your user account must have access to both the
questionnaire and to the Findings application.
Procedure
1. Select the finding that you want to manage:
a. In the Navigation pane, expand the questionnaire and click Display All.
The individual questionnaires associated with that questionnaire are
Chapter 4: Findings 95
RSA Archer GRC Platform Questionnaires
96 Chapter 4: Findings
RSA Archer GRC Platform Questionnaires
Chapter 5: Reports
Questionnaire Reports
The following table describes the reports available for each questionnaire within the
Platform. You can find these reports by clicking for the questionnaire on the
Manage Questionnaires page.
Report Description
Question Detail This report lists each question within a questionnaire, along with their
attributes. For Values List questions, the report also shows each
answer and its attributes.
Questionnaire This report presents a bar chart indicating the answers for each Values
Answer List question and the distribution across all responses. You can filter
Distribution by the report by questionnaire, category, or question. You also can click
Question the question to view the Questionnaire Results By Question Detail
report, which contains information about each question.
Questionnaire This report shows the configuration, including the formula, for each
Calculation calculated field within a questionnaire.
Summary
Questionnaire This report presents a bar chart of the compliance percentage for each
Compliance by authoritative source within one questionnaire or across questionnaires.
Authoritative You can filter the report by questionnaire. You also can click the
Source Chart category to view the Questionnaire Results by Authoritative Source
report.
Questionnaire This report presents a bar chart of the compliance percentage for each
Compliance by category within a questionnaire. You can filter the report by
Category Chart questionnaire. You can click the category to view the Questionnaire
Results by Category report.
Questionnaire This report presents a bar chart of the compliance percentage for each
Compliance by question within a questionnaire. You can filter the report by
Question Chart questionnaire or category. You also can click the category to view the
Questionnaire Results by Question report.
Questionnaire This report lists the custom objects and their associated content
Custom Object within a questionnaire.
Summary
Chapter 5: Reports 97
RSA Archer GRC Platform Questionnaires
Report Description
Questionnaire This report lists the data driven events within a questionnaire,
Data Driven including the description, action types, and status.
Events
Summary
Questionnaire This report provides detailed information about each field within a
Detail questionnaire.
Questionnaire This report provides a summary of the access control rights for private
Private Fields fields within a questionnaire. It lists all private fields that give a user
or group full access, cascade, or read-only privileges.
Questionnaire This report lists the results associated with each authoritative source
Results by attributed to one questionnaire or across questionnaires. You can filter
Authoritative the report by questionnaire, category, or authoritative source. You
Source also can click the key field to view general and reference content
information about the field.
Questionnaire This report lists the results associated with each category within a
Results by questionnaire. You can filter the report by questionnaire or category.
Category You also can click the category to view the Questionnaire Results by
Question report.
98 Chapter 5: Reports
RSA Archer GRC Platform Questionnaires
Report Description
Questionnaire This report lists the results associated with each question within a
Results by questionnaire. You can filter the report by questionnaire, category, or
Question question. You also can click the question name to view the
Questionnaire Results by Question Detail report, which contains more
information about the question.
Questionnaire This report presents a bar chart of the score for each authoritative
Score by source within one questionnaire or across questionnaires. You can
Authoritative click the authoritative source to view the Questionnaire Results by
Source Chart Authoritative Source report.
Questionnaire This report presents a bar chart of the score for each category within a
Score by questionnaire. You can filter the report by questionnaire. You also
Category Chart can click the category view the Questionnaire Results by Category
report.
Questionnaire This report lists all field types within a questionnaire. It includes a
Summary by count of each field type and the calculated fields as well as the total
Field Type number of standard and calculated fields.
Questionnaire This report lists the values and configuration for each Values List
Values List field within a questionnaire.
Summary
Chapter 5: Reports 99
RSA Archer GRC Platform 5.4
Solutions
June 2013
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm.
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and EMC are either registered trademarks or trademarks of EMC
Corporation ("EMC") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This
software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Solutions
Contents
Preface 5
About this Guide 5
Product Documentation 7
Support and Service 7
Chapter 1: Solutions 9
Create a Solution 9
Update the General Properties of a Solution 9
Select Applications and Questionnaires for a Solution 10
Attach Documentation to a Solution 11
Chapter 2: Reports 13
Solution Reports 13
Solution Diagram Abbreviations 17
3
RSA Archer GRC Platform Solutions
Preface
Note: A single application can be grouped into multiple solutions. For example, a
Contacts application could be placed in a Vendor Management solution, a Customer
Relationship Management solution, and a Service Request solution. By grouping a
single application into multiple solutions, you can reuse the same information for a
variety of purposes.
Solutions are displayed as branches in the Navigation Menu on the left side of the
screen. When you click a solution branch, the Navigation Menu displays all
applications grouped in that solution, as shown in the following figure.
Preface 5
RSA Archer GRC Platform Solutions
The Navigation Menu can be further customized to display only solutions related to
a particular workspace. For example, if you have a Policy Management workspace
that displays information related to the Policy Management solution, the Navigation
Menu could be configured to display only the Policy Management solution when
users view this workspace, as shown in the following figure.
In addition to the Navigation Menu, the Quick Search feature in the top frame of the
user interface also makes use of solutions. By entering keywords and selecting a
solution from the adjacent list, you can keyword search in all applications housed
within a solution.
The process of creating a solution involves selecting applications for inclusion and
attaching documentation to it, such as design specifications, sign-off forms, and so
on.
You can perform the following tasks to manage solutions:
l Create a Solution to Group Applications
l Attach Documentation to a Solution
l Update the General Properties of a Solution
l Select Applications and Questionnaires for a Solution
6 Preface
RSA Archer GRC Platform Solutions
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
Preface 7
RSA Archer GRC Platform Solutions
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
8 Preface
RSA Archer GRC Platform Solutions
Chapter 1: Solutions
Create a Solution
You can create a solution to group-related applications. For example, RSA Archer
created a Policy Management solution to group the following applications:
Corporate Objectives, Policies, Control Standards, Authoritative Sources,
Baselines, Exception Requests, and the Question Library.
When creating a solution, you select the applications that you want to be grouped in
that solution and determine which applications display in the Navigation Menu.
Note: A single application can be grouped into more than one solution.
Procedure
1. Navigate to the Manage Solutions page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Solutions.
2. Click Add New in the toolbar.
The Add Solution dialog box opens.
3. Do one of the following:
l To use the settings of an existing solution as a starting point for your new
solution, select Copy an Existing Solution and select the existing solution
from the Solution list.
l To select new settings for a solution, select Create a new Solution from
scratch.
4. Click OK.
The Manage Solution page is displayed.
Next Steps
Update the General Properties of a Solution
Chapter 1: Solutions 9
RSA Archer GRC Platform Solutions
Procedure
1. Select the solution that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Solutions.
c. In the Solution name column, click the solution.
2. Complete the General Information section:
a. In the Name field, enter a name for the solution.
b. In the Description field, enter a description of the solution.
This description is displayed on the Manage Solutions page.
c. In the Status field, select Inactive to prevent anyone from using this
solution. Otherwise, select Active.
3. Click Apply.
Next Steps
Select Applications and Questionnaires for a Solution
Procedure
1. Select the solution that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Solutions.
c. In the Solution name column, click the solution.
2. In the Applications section, click Add New.
3. Click the Applications tab and select the application that you want to include in
the solution.
10 Chapter 1: Solutions
RSA Archer GRC Platform Solutions
4. Click the Questionnaires tab and select the questionnaire that you want to
include in the solution.
5. Click OK.
The applications and questionnaires that you selected are displayed in the
Applications section.
6. (Optional) If you do not want an application or questionnaire that is grouped in
the solution to display within the Navigation Menu, clear the Menu Display
checkbox in the Applications section. By default, all applications and
questionnaires grouped in a solution are displayed beneath the solution branch in
the Navigation Menu.
7. (Optional) If you do not want an application or questionnaire that is grouped in
the solution to be searchable through the Quick Search feature in the top frame
of the user interface, clear Quick Search in the Applications section. By
default, all applications and questionnaires grouped in a solution are searchable
from the top frame.
Note: Because a single application can be grouped into more than one solution,
you can enable Quick Search for an application in one solution while disabling
Quick Search for the same application in another solution.
8. Click Apply.
Next Steps
Attach Documentation to a Solution
Procedure
1. Select the solution that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Solutions.
c. In the Solution name column, click the solution.
Chapter 1: Solutions 11
RSA Archer GRC Platform Solutions
12 Chapter 1: Solutions
RSA Archer GRC Platform Solutions
Chapter 2: Reports
Solution Reports
The following table describes the reports available for each solution in the Platform.
You can access these reports by clicking Reports on the Manage Solutions page.
Important: To view the Solution Diagram reports, you must have a copy of
Microsoft Office Visio or Visio Viewer installed on your computer. Select to
enable macros the first time a drawing is opened, which ensures proper placement
of the connectors on the drawing. Once the drawing is saved after enabling macros
the first time it was opened, the settings are saved and the drawing is displayed
properly on subsequent openings regardless of your choice to enable or disable
macros when opening the file.
For a description of the abbreviations that are used in the solution diagram reports,
see Solution Diagram Abbreviations.
Chapter 2: Reports 13
RSA Archer GRC Platform Solutions
Solution Diagram - All This diagram shows the solutions contained in the
Solutions system with their IDs and GUIDs, and a listing of
all applications contained in each solution. Arrows
in the diagram represent relationships among
applications and questionnaires across solutions.
14 Chapter 2: Reports
RSA Archer GRC Platform Solutions
Solution Diagram - This report produces a Visio diagram that shows the
Application Summary solution name, instance name, and Platform version
number, along with the following information for
each application:
l Application name
l Application ID and GUID
l Application status (Production, Development,
and so on)
l Number of records by data level
Chapter 2: Reports 15
RSA Archer GRC Platform Solutions
Solution Diagram - This report produces a Visio diagram that shows the
Field Statistics solution name and Platform version number, along
with the following information for each application:
l Application name
l Application ID and GUID
l Application status (Production, Development,
and so on)
l Number of records by data level
l Total number of fields
l Number of fields by type (Date: 2, Numeric 3,
and so on)
Solution Diagram - This report produces a Visio diagram that shows the
Relationship Fields solution name, instance name, and Platform version
number, along with the following information for
each application:
l Application name
l Application ID and GUID
l Application status (Production, Development,
and so on)
l Number of records by data level
l Names of the key fields
l Names of all relationship fields (Cross-Reference,
Related Records, and Cross-Application Status
Tracking) with their field type
l Names of all global Values List fields with the
name of the global values list
16 Chapter 2: Reports
RSA Archer GRC Platform Solutions
Attachment Att
Cross-Reference XRef
Date D
Discussion Disc
External Links EL
First Published FP
History Log HL
Image Img
Chapter 2: Reports 17
RSA Archer GRC Platform Solutions
IP Address IP
Last Updated LU
Matrix M
Numeric N
Record Permissions RP
Record Status RS
Related Records RR
Sub-Form SF
Text T
Tracking ID ID
Values List VL
18 Chapter 2: Reports
RSA Archer GRC Platform 5.4
Solutions User Guide
June 2013
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm.
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and EMC are either registered trademarks or trademarks of EMC
Corporation ("EMC") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This
software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Solutions User Guide
Contents
Preface 9
About this Guide 9
Product Documentation 9
Support and Service 10
Chapter 1: About RSA Archer GRC Platform 11
Document Conventions 11
Product Terminology 11
Displaying Information 13
RSA Archer Community 13
Community Features 15
RSA Archer Exchange 16
Exchange Components 17
Chapter 2: Managing User Preferences 19
User Preferences 19
Update Your User Profile 19
Set Your Time Zone 21
Change Your Password 21
Update Your Workspace Display 22
Manage Your Email Subscriptions 22
Subscription Notifications 23
Manage Your Discussion Forum Preferences 24
Update Discussion Forum Email Subscriptions 24
Access a Discussion Forum Bookmark 25
View Your Logon History 25
Review Job Queues 26
Chapter 3: Managing Searches and Reports 27
Searching and Reporting 27
Searches 27
Reports 27
Run a Quick Search 28
Advanced Search 28
Search by Keyword 29
Keyword Search Operators 30
Keyword Search File Types 34
Select Fields to Display in Search Results 34
Search Across Multiple Applications 35
Multiple Application Search Options 37
Run a Statistics Search 37
Statistical Report Functions 39
Report Functions by Field Type 41
Set Statistics Drill Down Options 43
Filter Search Results 47
Filter Operators 48
Search Filter Examples 51
3
RSA Archer GRC Platform Solutions User Guide
Time-Based Filtering 52
Advanced Operator Logic 54
Determine the Sort Order for Search Results 56
Configuring Display Options for Search Results 58
Display Format Types 59
Display Search Results in Column Format 61
Display Search Results in Row Format 63
Display Search Results in Summary Format 64
Display Search Results in Calendar Format 65
Display Search Results in Card Format 66
Display Search Results in Map Format 67
Modifying Search Results 70
Delete Records from Search Results 71
Edit a Record from Search Results 71
Charting 72
Statistical Search Query 72
Single-Series Charts 72
Multi-Series Charts 73
Charting Toolbar 73
Charting Terminology 74
Supported Chart Types 75
Managing Charts 86
Charting Toolbar Options 96
Change the Display Format 99
Choose a Chart Type 99
Display a Chart in 3D 99
Configure Display Variations 100
Set Chart Colors 100
Define the Chart Transparency 101
Apply Shading to the Data Series 102
Enable Smart Breaks 104
Create Threshold Markers 104
Add Range Markers for Gauge Charts 105
Identify Data Point Markers for Gauge Charts 106
Configure Heat Map Display Properties 107
Configure the Chart Labels and Legend 108
Modify Chart Results with Filters 110
Drilling Down into Chart Data 110
Master Reports Listing 114
View Personal and Global Reports 114
Add a Report 115
Update a Report 115
Delete a Report 117
Working with Trended Data 117
Trending 117
Add a Trending Chart to an Application Layout 119
Enable Trending for a Field 120
View a Trending Chart in a Record 120
Chapter 4: Using the Navigation Menu 123
Navigation Menu 123
4
RSA Archer GRC Platform Solutions User Guide
5
RSA Archer GRC Platform Solutions User Guide
6
RSA Archer GRC Platform Solutions User Guide
7
RSA Archer GRC Platform Solutions User Guide
Preface
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Preface 9
RSA Archer GRC Platform Solutions User Guide
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
10 Preface
RSA Archer GRC Platform Solutions User Guide
Document Conventions
The following table describes the document conventions used in the RSA Archer
Help Center.
Click, Drag, and Use the mouse to choose an To add a field to the sub-form's
Drop object and then move it to the layout, select the field from the
appropriate location. Available Fields list, drag the
selection to the appropriate spot
in the layout and release the
mouse button.
Drill Down Obtain more information by Click the pie piece to drill down
clicking an object. into the chart data.
Select Choose the checkbox or option To set the current theme as the
button. active appearance theme for the
application, select Active
Theme.
Product Terminology
The following tables provide definitions and examples for frequently used terms in
the Platform.
Displaying Information
The following figure shows the home page of the RSA Archer Community.
Community Features
The following table describes the contents of the pages that you can access in the
RSA Archer Community.
Feature Description
Discussions Offers a place for members to ask questions, post comments, and
exchange best practices about product use and configuration.
Discussions are moderated by the Product Support team to ensure
that clients are able to receive quick answers to their inquiries and
that all discussion strings are professional in nature.
Documents Supplies members with an easily accessible resource library for the
latest product collateral, documentation, and training, as well as
installer packages for recent releases of the product.
Polls Lists the active polls with which you can be involved. Results of
each poll are also available on this page.
Videos Provides access to all of the videos available through RSA Archer.
Tags Lists the tags assigned to content on the Community. You can filter
the content list by selecting a tag from the list.
Exchange Components
The following table describes the contents that you can access in the RSA Archer
Exchange.
Component Component
Service Exchange Provides direct access to Archer-certified consultants who can assist
clients in building and enhancing applications in their GRC
environment. Representing top-tier companies, these consultants
have the industry knowledge and technical expertise to automate
complex business processes using the Platform.
Integration Provides tools for integrating external data repositories, data feeds,
Exchange and point solutions with the Platform. The Exchange provides
integration instructions and gives direct access to data feed and
solution providers whose products feed dynamic content into GRC
applications to support business processes.
User Preferences
User preferences include user account settings, options to customize your work
environment, and access to your logon history. You can access pages that enable
you to change your preferences from the User Preferences menu.
Note: The options listed in the User Preferences menu depend on the access
privileges of your user account.
You can perform some or all of the following tasks, depending on your access
privileges:
l View Your User Profile
l Update Your Contact Information
l Change Your Password
l Update Your Localization Settings
l Set Your Time Zone
l Set Your Locale
l Set Your Language
l Update Your Workspace Display
l Manage Your Email Subscriptions
l Manage Your Discussion Forum Preferences
l View Your Logon History
l View Your Data Import History
Procedure
1. Click Preferences in the menu strip in the top frame and select View Your
User Profile.
2. (Optional) Complete the fields in the Contact Information section.
Field Action
Email Enter one or more email addresses. For each email address, select an
address type from the related list.
Phone Enter one or more phone numbers. For each phone number, select a
phone type from the related list.
3. (Optional) If you have update permission, you can change your password. See
Change Your Password.
4. (Optional) If you have update permission, you can update your time zone,
locale, and language to non-default settings. Complete the fields in the
Localization section.
Field Action
Override Select and then select your preferred language for Platform
Language navigation from the Language list.
Unselect to see Platform navigation in the language to which your
associated locale is assigned.
5. (Optional) In the Account Notes section, in the Notes field, enter or update the
note text.
6. Click Apply.
Procedure
1. Click Preferences in the top frame of the instance.
2. Select View Your User Profile.
3. In the Localization section, in the Time Zone list, select the time zone that
matches your physical location.
4. Click Apply.
Note: For information about the password-creation rules for your user account, see
your Platform administrator.
Procedure
1. Navigate to the View Your User Profile page:
a. From the menu strip in the top frame, click Preferences.
b. From the User Preferences menu, select View Your User Profile.
2. In the Password section, click Change Password.
Note: The Change Password link is unavailable if you do not have the Update
permission for your user account.
3. In the Change Your Password dialog box, enter the requested information.
4. Click OK.
Note: If you enter an invalid current password or a new password that does not
meet the security parameters for your account, a message provides instructions
to help you correct the error.
Procedure
1. Navigate to the Personalize Workspace Display page:
a. From the menu strip in the top frame, click Preferences.
b. From the User Preferences menu, select Update Your Workspace
Display.
2. In the Select Workspaces section, from the list of available workspaces, select
each workspace that you want to display. Or, clear the checkboxes of
workspaces that you want to remove.
3. Click Apply.
Procedure
1. Navigate to the Manage Your Email Subscriptions page:
a. From the menu strip in the top frame, click Preferences.
b. From the User Preferences menu, select Manage Your Email
Subscriptions.
The Manage Your Email Subscriptions page shows the list of available
email notification templates. Notifications to which you are currently
subscribed are selected.
2. In the Email Subscriptions section, select each notification to which you want
to subscribe. Or, to unsubscribe from a notification, clear the checkbox.
3. For each subscription, select the email address or addresses to receive the
email:
Note: Your user profile specifies the email addresses that are displayed in
this list. To update your contact information, see Update Your User Profile.
b. In the Selected list, associate one or more email addresses with the
subscription.
c. Click OK.
4. Click Apply.
Subscription Notifications
Subscription notifications enable users to receive email alerts of events or activities
related to applications.
Platform administrators use templates to configure the following characteristics of a
notification:
l Name of the application that is related to the notification
l Layout and content of the notification email
l Delivery methods and delivery frequency
l Recipients
l Filter criteria that define the trigger condition
l Read receipt request
Note: A notification template that requests a read receipt from the recipient
allows managers to track whether users are reading the notifications that they
receive.
For example, the notification template for an Issue Tracker application might
specify that an alert email be sent to all members of the Risk Response team each
time the application reports a new issue. To limit the volume of alert emails, filters
can be applied that only trigger email messages if the values "Urgent" and "High"
are selected in the Priority field.
Users can select which notifications to receive and can receive notifications on any
email-enabled device.
Procedure
1. Navigate to the Manage Your Discussion Forum Preferences page:
a. From the menu strip in the top frame, click Preferences.
b. From the User Preferences menu, select Manage Your Discussion
Forum Preferences.
2. (Optional) In the Discussion Forum Email Subscriptions section, you can do
the following:
l To see the description of a forum, click the row of the forum.
l To delete a subscription, in the Actions column of the row of the forum, click
.
3. (Optional) In the Discussion Forum Bookmarks section, you can do the
following:
l To see the description of a bookmark, click the row of the bookmark.
l To access a bookmarked topic, click the name of the topic.
l To delete a bookmark, in the Actions column of the row of the bookmark,
click .
Procedure
1. Navigate to the Manage Your Discussion Forum Preferences page:
a. From the menu strip in the top frame, click Preferences.
b. From the User Preferences menu, select Manage Your Discussion
Forum Preferences.
The Manage Your Discussion Forum Preferences page is displayed. This
page lists your discussion forum email subscriptions and discussion forum
bookmarks.
2. In the Discussion Forum Email Subscriptions section, click the row to display
a description of the forum.
3. To delete a subscription, click Delete in the Actions column.
Procedure
1. In the top frame of the Platform interface, click Preferences.
A menu of User Preference pages is displayed.
2. Click Manage Your Discussion Forum Preferences.
The Manage Your Discussion Forum Preferences page is displayed. This page
lists your discussion forum email subscriptions and discussion forum bookmarks.
3. Click the row to display a description of the bookmark.
4. Click the topic that you want to display.
Procedure
Navigate to the Login History page:
a. From the menu strip in the top frame, click Preferences.
b. From the User Preferences menu, select View Your Login History.
The Login History page shows the details of each logon session that is
associated with your user account.
The following table describes the information that the system captures for each
logon session.
Column Description
Length Active Duration of the session, or, Active if the session is currently active.
Session Type User Initiated. A session that you started by logging on to the
system.
System Impersonated. A session that the system started by using
your account to perform an action, such as importing data.
Procedure
1. Navigate to the Review Job Queues page:
a. Click the Administration workspace. a. From the menu strip in the top
frame, click Preferences.
b. In the Navigation Menu, click
Integration > Review Job Queues. b. From the User Preferences menu,
click View Your Data Import
History.
The Review Job Queues page is displayed, which lists current status of data
imports for the Platform.
2. Locate the data import that you want to view.
3. Click to display the Run Detail dialog box for that data import.
This page contains application-specific data regarding the last run of the data
feed.
Searches
The Platform provides two methods for searching:
l Quick Search (from the top frame)
l Advanced Search (from the Navigation Menu)
With advanced searches, you can configure the appearance of the search results by:
l Selecting the fields of data to display
l Specifying the sort order
l Selecting a search results format, for example, column, row, or summary
Filtered searches that look for matches in selected fields can find and display
matched content in any language in which users enter content. Keyword searches
can be set up by an administrator to find content in only the design language of an
Archer component, or in the design language and all other languages in which users
enter content. To enable multi-lingual keyword searches, an administrator must
adjust the setting for search index contents in the RSA Archer Control Panel to
include all languages.
In addition to advanced keyword searching, you can create statistical reports by
grouping specific field values in the search results, and by applying aggregate
functions, such as Group by, Count of, Average, Median, Mode, and Sum,
Minimum of, or Maximum of, to other field values.
After running a statistics search, you can view the search results as a chart or graph
in addition to text. Charting enables users to grasp the full scope of the data without
paging through hundreds or thousands of records. Additionally, users can click any
portion of a chart to view details of the underlying data. Because you can configure
your charts, you have control over their size, color palette, and labeling.
Reports
Once you complete running a search, you can save the search criteria as a report.
Reports can be shared with other users and incorporated into a system dashboard
for easy access to the latest data.
Important: To run a search in which you can control more input and output
parameters, use the Advanced Search feature. For more information, see Advanced
Search.
The Quick Search Results page lists the results of a Quick Search by relevance.
Those records that are most relevant for your keyword search string are displayed
at the top of the search results, and those that are least relevant are displayed at the
bottom. A relevancy ranking also is displayed for each record. The Quick Search
Results page enables you to filter the records by application. By default, records
from all of the applications within the selected solution are intermixed in the search
results. However, by clicking an application link in the Results filter bar, you can
view records for one application at a time.
Procedure
1. In the Quick Search field in the top frame of the user interface, enter the term
or phrase you want to search for.
You can also incorporate one or more of the Keyword Search Operators.
4. Click .
The Quick Search Results page displays up to 50 records meeting the search
criteria.
Advanced Search
On the Advanced Search page, you can search for records across a single
application or search for records across a related chain of applications.
You can use the following options for finding the records you want in search
results:
l Specify terms for a keyword search.
l Define the fields to display within the search results.
l Configure the relationships for applications included within the search
parameters.
Once your search is complete, you can save the results of a search operation as a
named report that you can re-run in the future. When you save search results as a
named report, you are saving the search criteria, but not the specific records in your
search results. Therefore, each time you open a report, all records that meet the
report's search criteria are displayed, regardless of whether those records were
included in the original search results.
You can perform the following advanced search tasks:
l Search by Keyword
l Search Across Multiple Applications
l Run a Statistics Search
l Select Fields to Display in Search Results
l Filter Search Results
l Determine the Sort Order for Search Results
l Configure the Display Options for Search Results
l Modify Search Results
l Add a Report
l Manage Charts
Search by Keyword
You can search for records that contain specific terms or phrases.
To help narrow the search results, the Platform search engine supports a variety of
keyword operators, such as "Or" and "Not." For more information, see Keyword
Search Operators.
Also, when running a keyword search, you can search by keywords in files that are
attached to records through an Attachment field. For information on the file types
that can be searched by keywords, see Keyword Search File Types.
If the application in which you are searching is related to other applications, you
can search fields in the related applications. For more information about searching
related applications, see Search Across Multiple Applications.
Procedure
1. Navigate to the Advanced Search page for the application in which you want to
search:
a. From the Navigation Menu, expand the application you want to search in.
b. Click Advanced Search.
2. In the Keyword Search field, enter the term or phrase that you want to search
for.
You can also incorporate one or more of keyword search operators or include
fields from related applications.
3. Click Search.
Up to 50 records meeting the search criteria are displayed in the Search Results
page.
Next Steps
Modify Search Results
Add a Report
The following table lists the available operators for refining the keyword search
results.
Single Term document Returns all records that contain the term
"document."
Phrase "important document" Returns all records that contain the phrase
“important document.” Enclose your
phrase in quotation marks. If you do not,
your search returns all records that contain
the term “important” or the term
“document.”
Wildcard Search a?ert Returns all records that contain the terms
“alert,” “avert” and so on. The question
mark (?) is a single-character wildcard,
meaning that it can represent any letter of
the alphabet within your search term. The
question mark cannot serve as the first
character in the search term. It can replace
any other character in the term, however,
and it also can be placed after the term, for
example, alert?.
Fuzzy Search receive~ Returns all records that contain the term
“receive” and any other term that is similar
in spelling. Fuzzy searching enables you
to search for keywords that may be
misspelled within records. For example, if
you search for "receive~", the search
returns records that contain "receive,"
"reseive" and so on. Place the tilde (~)
directly after the term with no space
between the term and the tilde.
Proximity Search "important Returns all records that contain the terms
document"~5 “important” and “document” within five
words of each other. You can use any
number for the required proximity. Enclose
your phrase in quotation marks with no
space between the closing quotation mark,
the tilde (~) and the number.
AND Operator important AND Returns all records that contain both the
document term “important” and the term "document.”
Capitalize the AND operator. You can use
the && symbol in place of the AND
operator, for example, important &&
document.
NOT Operator important NOT Returns all records that contain the term
document “important,” but do not contain the term
“document.” Capitalize the NOT operator.
You can use an exclamation point (!) in
place of the NOT operator, for example,
important ! document.
+ Operator +important document Returns all records that contain the term
“important.” The records also may contain
the term “document,” but they don’t have
to. Place the plus sign (+) before the
required term or phrase with no space
between the plus sign and the term that
follows it.
Grouping (important OR urgent) Returns all records that contain the term
AND document “document” and either or both of the terms
“important” and “urgent.” Note the use of
parentheses in this example. Without the
parentheses, the search returns all records
that contain both the terms “urgent” and
“document,” but it does not return records
that contain both the terms “important”
and “document.”
You cannot search on terms that contain decimal points, for example, 10.5. In this
case, the system translates the decimal point as "AND" and returns records that
contain both the number 10 and the number 5. Additionally, you cannot do a
keyword search on dates, for example, 12/01/2011.
l HTM l GIF
l JPG l PNG
l JPEG l BMP
You can search by keyword in files in Attachment fields only when a Platform
administrator enables the Keyword Searching option for the field.
Procedure
1. On the Advanced Search page, expand the Field to Display section and
complete the following:
a. From the Available list, select the fields that you want to include in your
search results.
b. (Optional) To remove fields from your search results, click to the right of
the field in the Selected list.
c. (Optional). To reorder the fields in the Selected list, click a field and use the
to move it up or down in the list.
Note: If you select to view fields from related applications or data levels, or
fields from within a History Log or Sub-Form field, you can reorder how
these fields are displayed in their respective grouping. However, you cannot
mix fields contained in these items with fields from your primary
application. All contained Sub-Form fields must be displayed together.
3. Click Search.
Next Steps
Modifying Search Results
Add a Report
Procedure
1. On the Advanced Search page, complete the following in the Fields to Display
section:
a. In the Available list, click Add New Relationship.
b. In the Add New Relationship dialog box, select the related application that
you want to include in the search.
c. In the Available list, find the list of fields for the related application and
select the fields that are to be included in the search.
d. (Optional) Continue adding fields and related applications as needed.
2. (Optional) Complete any of the following tasks.
Task Action
Click OK.
c.
Add any additional criteria to your See Filter Search Results and Sort Order
search, such as filters or sorting. for Search Results.
Define the display format to customize See Configuring the Display Options for
the display of the search results. Search Results.
3. Click Search.
Next Steps
Modifying Search Results
Add a Report
Options Description
The primary application is the application from which you originate your search,
and secondary applications are any number of subsequent applications linked to the
primary application and sometimes to each other. Cross-references contained within
sub-form records are not supported. In addition, an application or questionnaire can
be displayed in a search tree only once.
Permissions still apply, regardless of the structure of the search. In other words, you
cannot view records for which you do not have access.
Procedure
1. Navigate to the Advanced Search page for the application in which you want to
search:
a. From the Navigation Menu, expand the application you want to search in.
b. Click Advanced Search.
Task Action
Rename a field label for the a. In the previous step 4, select a grouping or
Selected list. aggregate function other than "Group by."
b. Click the field name.
c. Enter the label that you want to display.
Add any additional criteria to your See Filter Search Results and Determine the
search, such as filters or sorting. Sort Order for Search Results.
View totals for each grouping a. Expand the Display Options section.
within the search results.
b. Select Display Totals.
In the search results, a Totals row
can be listed for each unique
group.
For example, if you are running a
statistics search in the Facilities
application using the Display
Totals function combined with the
Task Action
Define the display format to See Configuring the Display Options for
customize the display of your Search Results.
search results.
Note: If your search results are to be displayed
in column format or summary format, the top-
to-bottom order of the fields in the Selected
list is the left-to-right order of the field in the
search results. If your search results are to be
displayed in row format, the top-to-bottom
order of the fields in the Selected list is the
top-to-bottom order of the fields in the search
results.
Display the records in a data point a. Expand the Statistics Drill Down Options
when a user drills into a chart. section.
b. Set options to specify how you want to
display the records.
For more information, see Set Statistics
Drill Down Options.
6. Click Search.
Next Steps
Modifying Search Results
Add a Report
Function Description
Group by Returns a single record for each distinct value stored in the specified
field. This function is intended to be used in combination with one of
the aggregate functions, such as Count of, Average of, or Sum of.
For example, if you are performing a statistics search in the Facilities
application, and you apply the Group by function to the Region field
and apply the Count of aggregate function to the Facility Name field,
you can produce a report listing the number of facilities by region.
Additionally, if you apply the Group by function to two or more
fields in the Selected list, the statistical report is grouped by the first
Group by field in the list. All other fields with the Group by function
are nested in the previous Group by field in the list. Therefore,
building on your statistical search in the Facilities application, you
can nest the Type field with the Group by function under the Region
field, which produces a report that lists both the number and type of
facilities by region.
Group by (Date Groups data in date-based fields (for example, Date, First Published,
Range) and Last Updated) into specific date ranges, such as "by Week" or
"by Day." It returns a single record for each distinct value stored in
the specified field. This function is intended to be used in
combination with one of the aggregate functions.
For example, if you are performing a statistics search in the Incidents
application, and you apply the Group by Month function to the Date
Reported field and apply the Count of function to the same field, a
report listing the number of incidents reported by month is produced.
Count of Returns a count of each distinct value returned for a specified field.
(aggregate function)
Average Returns the average of all numeric values for a specified field. When
you drill down on the value in the Average of [Selected field]
column, you see the records that were calculated to the average value.
(aggregate function)
Median Returns the middle value of all numeric fields in a list of records.
When there is an even set of records, a calculated value shows as the
average of the two middle values.
For example, suppose that the list of values is 1, 2, 3, 4, 5, 6, The
value shown is 3.5 ([3 + 4] / 2). When you drill down on the value in
the Median of [Selected field] column, you see the records that were
calculated to the median value. (aggregate function)
Mode Returns the value that occurs most often of all numeric fields in a list
Function Description
Sum Returns the total of all numeric values for a specified field.
(Aggregate function)
Minimum of Returns the minimum numeric value for a specified field. (Aggregate
function)
Maximum of Returns the greatest numeric value for a specified field. (Aggregate
function)
Note: To render a chart from a statistical report, the results of a statistical query
must properly form a series. For more information, see Managing Charts.
Not all functions are available for every field type. For more information on the
functions supported for each field type, see Report Functions by Field Type.
Note: While the Sub-Form field type is not supported for statistics searches, fields
within an embedded sub-form are supported. In other words, you cannot apply a
grouping or aggregate function to a Sub-Form field, but you can apply these
functions to fields within the sub-form.
The following table identifies the functions supported for each field type.
Cross-Reference Group by
Count of
Date Group by
Group by [Date Range]
Count of
Minimum of
Maximum of
IP Address Group by
Count of
Matrix Group by
Count of
Numeric Group by
Count of
Average
Median
Mode
Sum
Minimum of
Maximum of
Text Group by
Count of
Tracking ID Group by
Voting Group by
Count of
Average
Median
Mode
Sum
Minimum of
Maximum of
When a statistics search is rendered as a chart, you can drill into a section of the
chart to review the specific records that are contained in the search results of that
data point. For more information on drilling into chart data, see Drilling Down into
Chart Data.
Procedure
1. On the Advanced Search page, expand the Statistics Drill Down Options
section and complete the following tasks.
Task Action
Configure the fields a. From the Available list, select the fields that you want
in the search results. included.
Task Action
Set the sorting a. Under Sorting, in the Field column, select the field that
options for the search is the primary sort.
results.
b. In the Order column, select from the following options:
l Ascending. Text values are sorted A to Z. Numeric
values are sorted smallest to largest. Data values are
sorted oldest to newest.
l Descending. Text values are sorted Z to A. Numeric
values are sorted largest to smallest. Data values are
sorted newest to oldest.
Set the display a. From the Display Format list, select how the search
options. results of the data points are to be displayed.
For more information, see Display Format Types.
b. From the Results per Page list, select the number of
records that should be displayed on each page of the
data point search results.
If the search results include more records than can be
displayed on a single page, a set of arrows appears at the
top of the Search Results page, enabling you to move
from one page to the next.
2. (Optional) Add any additional criteria to your search, such as filters or sorting
options.
See Filter Search Results and Determine the Sort Order for Search Results.
3. Click Search.
Next Steps
Modifying Search Results
Procedure
1. On the Advanced Search page, expand the Filters section.
2. To select filtering options, complete the following:
a. In the Field to Evaluate column, select the field to evaluate for one or more
specific values.
To create additional conditions, click Add New.
b. In the Operator column, select the filter operator.
For more information see Filter Operators.
c. In the Value(s) column, select the values for the condition.
For information on operators and values based on time filters, see Time-
Based Filtering.
d. If you have created more than one condition, you can apply logic to your
search criteria.
For more information, see Advanced Operator Logic.
3. (Optional) Complete any of the following:
l Add any additional criteria to your search, such as sorting options. For more
information, see Determine the Sort Order for Search Results.
l Define the display format to customize the display of your search results. For
more information, see Configuring the Display Options for Search Results.
4. Click Search.
Next Steps
Modifying Search Results
Add a Report
Filter Operators
To help narrow your search results to the desired information, the Platform search
engine supports a variety of filter operators, such as "Equals" and "Contains." You
can build filters through a series of conditional statements. Filter values are not
case sensitive.
Additionally, you can then relate your statement through the use of advanced
operator logic. The following examples of search strings show how you can use
operators to form your filter conditions:
l Example 1: [Product and Services] CONTAINS "IT Development"
Result: This search returns any records where the Product and Services field
contains the value "IT Development." If there are other values selected in the
field for a record, that record is still returned in the search results.
l Example 2: [Product and Services] EQUALS "IT Development"
Result: This search returns any records where the Product and Services field
includes only the value "IT Development." If there are other values selected in
the field for a record, that record is not returned in the search results; the value
must match the filter criteria exactly.
l Example 3: [Contract Amount] GREATER THAN "1,000,000"
Result. This search returns any records where the Contract Amount field
includes any value greater than 1,000,000.
l Example 4: [First Publishes] LAST "10 Hours"
Result: If the current time is 10:00 p.m., 10:15 p.m., 10:59 p.m., or any other
value during the 10 o'clock hour, this search returns all records where the time
value for the First Published field is equal to one of the values between 12:00
a.m. and 9:59 p.m. (the last 10 hours not including the current hour). The search
will not return any records where the First Published field falls in the current 10
o'clock hour.
The following table describes all of the available operators for filtering your search
results.
Contains Includes any record that has a value that matches the specified
filter values.
Does Not Contain Includes any record that does not have a value that matches the
specified filter values.
Equals Includes records with values that exactly match to the specified
filter values. For Date fields, date and time values can be
included in the filter. For more information, see Time-Based
Filtering.
Does Not Equal Includes only the records with values that do not match the
specified filter values. For Date fields, date and time values can
be included in the filter. For more information, see Time-Based
Filtering.
l Minute l Month
l Hour l Quarter
l Day l Year
l Minutes l Months
l Hours l Quarters
l Days l Years
This filter does not include records of the current interval. For
example, if you filter "Last" "3" "Days", the results include the
previous three days, but do not include the current day. To
include the current day, add another filter condition to the
search criteria that includes the "Current" "Day".
For more information, see Time-Based Filtering.
Next Includes records based on the selected interval after the current
interval. Available intervals include:
l Minutes l Months
l Hours l Quarters
l Days l Years
This filter does not include records of the current interval. For
example, if you filter "Next" "3" "Days", the results include the
next three days, but do not include the current day. To include
the current day, add another filter condition to the search criteria
that includes the "Current" "Day".
For more information, see Time-Based Filtering.
Greater Than Includes only records with values greater than the specified filter
value. for Date fields, date and time values can be included in
the filter. For more information, see Time-Based Filtering.
Less Than Includes only records with values less than the specified filter
value. For Date fields, date and time values can be included in
the filter. For more information, see Time-Based Filtering.
Between Includes only records with values within the specified date
range, or date and time range, including the date and time
selected. For more information, see Time-Based Filtering.
Time Interval Includes only records with values within the specified time
range. Dates can also be specified to further filter the search.
Search results include the selected times and dates.
For more information, see Time-Based Filtering.
After Today Includes records of all dates after the current day, but does not
include the current day.
Prior to Today Includes records of all dates before the current day, but does not
include the current day.
Special Situations
Blank Values A blank value is acceptable only when the ‘Equals’ or ‘Does Not
Equal’ operator has been selected for non-list-based fields, such as
Text, Numeric, Date, and IP address. In this case, if no value is
entered, the system translates that to mean either an empty string or a
null value. A blank/null value is not the same as an explicitly entered
value of 0.
Note: Unless a specific time is selected, the Platform uses the "All
Times" option.
records relevant to the user who is viewing them. The "Current User" filter
allows you to create a report that dynamically adjusts content based on the user
generating the report. For example, you can create a “My Incidents” report for
your Investigators team. When "Incident Investigator A" runs the report, only the
incidents assigned to this user are displayed. When "Incident Investigator B"
runs the report, only the incidents assigned to this user are displayed.
l If you are trying to locate the records that fall within a specific date range, you
can search for records based on date values that fall within a given number of
days of the current date, date values that fall between two dates with specific
times included or not, or date values relative to the current date. You also can
perform date-range searches against a Date field in an application or against
Date fields in applications that are linked through a Cross-Reference or a Cross-
Application Status Tracking field.
l If you are trying to locate the records that fall within a specific time range, you
can search for records based on time values that fall within a given number of
minutes or hours of the current time, time values that fall between two time
intervals with specific dates included or not, or time values relative to the current
minute or hour. You also can perform time-range searches against a Time field
in an application or against Time fields in applications that are linked through a
Cross-Reference or a Cross-Application Status Tracking field.
Time-Based Filtering
For an advanced search to return search results to a level smaller than a single day,
you can set time filters to your search criteria. Using specific filter operators and
values, you can configure time filters, with or without dates. For more information
on available filter operators, see Search Filter Operators.
Time-based filtering requires several rules and logic to determine the correct search
results. The following general rules apply to the time filter options:
l The time filter options are available only when a Date field is configured to
show time.
l Unless a specific time is selected, the Platform uses the "All Times" option.
l Where available, a specific time zone can be selected, or the local time zone of
the user performing the search can be used when the search is saved and run by
another user.
l A time must be selected before a specific time zone can be selected.
l Daylight saving time is accommodated.
The following table describes the other rules and logic by filter type.
Equals If you enter 09/12/2012 1:15 p.m., the search returns records that
Does Not Equal meet that exact date and time for an "Equals" search, or records
that do not equal that exact date and time for a "Does Not
Equal" search.
If the field is not configured to show time, you can only select a
date.
You must select a date before you can select a time.
You must select a time before you can select a time zone.
If you leave the date and time values empty, the results return
all records that have blank values in the field on which the filter
was configured. If a date is selected, but you do not select a
time value, the filter acts as a date-only filter.
Current If you select the current hour, all records with a time in the
(Minute or Hour) current hour are included in the search results. For example, if
the time value is 10:14, all records in the 10:00 hour are
included.
Time zone options are not available on this filter type. The local
time zone of the user performing the search is used.
Last If you filter "Last" "3" "Hours", the results include the previous
three hours, but do not include the current hour.
(Minutes or Hours)
The time zone options are not available on this filter type. The
local time zone of the user performing the search is used.
This filter types does not include the current minute or hour.
Next If you filter "Next" "3" "Days", the results include the next three
(Minutes or Hours) days, but do not include the current day.
The time zone options are not available on this filter type. The
local time zone of the user performing the search is used.
This filter types does not include the current minute or hour.
Greater Than If the field is not configured to show time, you can only select a
date.
Less Than
You must select a date before you can select a time.
If you leave the date and time values empty, the results return as
blank values. If a date is selected, but you do not select a time
value, the filter acts as a date-only filter.
You must select a time before you can select a specific time
zone.
You must select a date in each Date field.
If a date is selected, but you do not select a time value, the filter
acts as a date-only filter with selected dates included.
Important: Custom operator logic must validate before you can save or apply
changes to your data filter. If your custom operator logic does not validate, you are
prompted with an "Invalid Operator Logic" error message.
Examples
Single operator. Suppose you are importing assets from an external source into the
Assets application. You want to import assets from your external file only if they
are labeled as being in a production environment or if they are customer impacting.
To set up this process, you define data filters to evaluate both the System
Environment and Security Class elements in your external data file for the desired
values. Without using operator logic, your conditions are related with the AND
operator, and the data feed imports items that are both in a production environment
AND have a high security class. By using operator logic with the OR operator, you
achieve the desired result: Assets that are in a production environment OR have a
high security class are imported into the Assets application.
Based on the above criteria, the following table details the result of the operator
logic.
(1) System
(2) Security Class (3) Manufacturer Result
Environment
The system evaluates the parenthetical expression first. In the last example in the
previous table, since neither 1 or 2 evaluate to "TRUE," the entire condition fails
even if 3 evaluates to "TRUE".
Multiple operators with nested parenthetical expressions. You also can use
nested parenthetical expressions in your operator logic. Nested parenthetical
expressions allow you to combine the results of two separate logical conditions,
thereby creating an additional logical condition, as shown in the following example.
Based on the above criteria, the following table details the result of the operator
logic.
(1)
(3)
System (2) Security (4) Operating (5) Server
Manufactu Result
Environm Class System Room
rer
ent
The Data Feed Manager evaluates the nested parenthetical expressions first. In the
last example in the previous table, since neither 3 or 4 evaluate to "TRUE" in the
nested parenthetical expression, the primary parenthetical expression evaluates to
"FALSE," and thus the entire logical condition fails and the data is not imported,
even though all of the other conditions are met.
The sorting interface supports sorting on multiple fields. Adding fields for sorting is
useful when the search results yield a "one-to-many" relationship between the
initial sorting field and the additional sorting fields. For example, if you select to
sort records in the Vendor Profile application records by the values in the Risk
Rating field, multiple records may have the same value. By including an additional
sorting field, you can sort how records appear within the initial sort. When sorting
by multiple fields, numeric indicators show the sort order.
Procedure
1. On the Advanced Search page, expand the Sorting section and complete the
following:
l In the Field column, select the field that is the primary sort for the search
results.
Note: Even fields that are not displayed in the search results can be selected
for sorting. For more information on how to include a field in the search
results, see Select Fields to Display in Search Results.
Option Description
Descending Test values are sorted Z to A. Numeric values are sorted largest
to smallest. Date values are sorted newest to oldest.
Note: When values in a value list have been custom ordered, the order is
used for the ascending or descending sort, not the actual alphabetical sort of
the value. Null (blank) values are listed first in ascending sorts. Prefixes and
suffixes are not evaluated when determining a sort order.
l In the Grouping column, select whether to enable grouping for the search
results.
If you select to enable grouping, you can expand and collapse sections of the
search results based on the values in the sorting field. This option is available
for only the Column-Hierarchical display format. For more information, see
Display Search Results in a Column Format.
l (Optional) In the second row of the Field column, select a field by which
results are sorted after the initial sort.
l (Optional) Select the order and grouping preferences for this field.
l (Optional) To add additional fields for sorting, click Add New in the Sorting
section.
An additional row is added to the sorting display, where you can select the
field, the order, and grouping preferences.
2. (Optional) Complete any of the following tasks.
Task Action
Define the display format to customize See Configuring the Display Options for
the display of the search results. Search Results.
3. Click Search.
See Also:
Modifying Search Results
Add a Report
To configure the search results display, you can do any of the following:
l Display Search Results in Column Format
l Display Search Results in Row Format
l Display Search Results in Summary Format
l Display Search Results in Calendar Format
l Display Search Results in Card Format
l Display Search Results in Map Format
Column-Hierarchical Shows the search results in columnar layout where fields are
displayed across the page from left to right. The Hierarchical
option groups the results by the values in the search fields. For
more information, see Display Search Results in a Column
Format.
Column-Flat Shows the search results in a columnar layout where fields are
displayed across the page from left to right. The Flat format
displays field values in a simple column layout. For more
information, see Display Search Results in Column Format.
Row Displays the search results in a row layout where fields are
stacked vertically, and records are separated by horizontal lines.
This format does not display field labels for empty fields. For
more information, see Display Search Results in Row Format.
The Flat format displays field values in the search results in a simple column
layout. This format shows records from related applications in a grid with rows
spanning to indicate the relationship.
When configuring the Hierarchical format, there is an option in the Sorting section
that groups search results by the values within search results fields. If this option is
selected, the search results show the related or referenced records in a grid
underneath the higher level record.
Procedure
1. On the Advanced Search page, expand the Display Options section and
complete the following:
a. From the Display Format list, select Column-Flat or Column-
Hierarchical.
b. From the Record Count list, select the number of records to be returned.
When this value is set, the search returns no more than the specified number
of records. If you select the All Records option, all records meeting the
search criteria are returned. Record count is applied to primary application
records only. Records returned from related applications are not included in
this number.
c. From the Results Per Page list, select the number of records that you want
to be displayed on each page of the search results.
If the search results include more records than can be displayed on a single
page, a set of arrows is displayed at the top of the Search Results page,
enabling you to move from one page to the next.
d. (Optional) In the Headings section, select one or more of the following
options:
l Criteria - To display the search criteria that you entered in order to
produce the search results.
l Date - To display the current date and time at the top of the Search
Results page.
2. (Optional) If you selected the Column-Hierarchical display format, select
Expand All Results to automatically expand all content in grid controls for
related applications.
3. (Optional) Select Fix Headers to display a static header row that remains in
view as you scroll down a report or iView.
4. (Optional) Add any additional criteria to your search, such as filters or sorting
options.
For more information see Filter Search Results and Determine the Sort Order
for Search Results.
5. Click Search.
Next Steps
Modifying Search Results
Add a Report
Procedure
1. On the Advanced Search page, expand the Display Options section and
complete the following:
a. From the Display Format list, select Row.
b. From the Record Count list, select the number of records to be returned.
When this value is set, the search returns no more than the specified number
of records. If you select the All Records option, all records meeting the
search criteria are returned. Record count is applied to primary application
records only. Records returned from related applications are not included in
this number.
c. From the Results Per Page list, select the number of records that you want
to be displayed on each page of the search results.
If your search results include more records than can be displayed on a single
page, a set of arrows is displayed at the top of the Search Results page,
enabling you to move from one page to the next.
d. (Optional) In the Headings section, select one or more of the following
options:
l Criteria - To display the search criteria that you entered in order to
produce the search results.
l Date - To display the current date and time at the top of the Search
Results page.
Next Steps
Modifying Search Results
Procedure
1. On the Advanced Search page, expand the Display Options section and
complete the following:
a. From the Display Format list, select Summary.
b. From the Record Count list, select the number of records to be returned.
When this value is set, the search returns no more than the specified number
of records. If you select the All Records option, all records meeting the
search criteria are returned. Record count is applied to primary application
records only. Records returned from related applications are not included in
this number.
c. From the Results Per Page list, select the number of records that you want
to be displayed on each page of the search results.
If your search results include more records than can be displayed on a single
page, a set of arrows is displayed at the top of the Search Results page,
enabling you to move from one page to the next.
d. (Optional) In the Headings section, select one or more of the following
options:
l Criteria - To display the search criteria that you entered in order to
produce the search results.
l Date - To display the current date and time at the top of the Search
Results page.
2. To automatically expand all content in grid controls for related applications,
sub-forms, and levels, select Expand All Results.
3. (Optional) Add any additional criteria to your search, such as filters or sorting
options.
For more information see Filter Search Results and Determine the Sort Order
for Search Results.
4. Click Search.
Next Steps
Modify Search Results
When reviewing the search results, you can toggle between day, week, and month
views. You can also create events in one-hour blocks or all-day events.
Procedure
1. On the Advanced Search page, expand the Display Options section and
complete the following:
a. From the Display Format list, select Calendar.
b. In Date Display, click and select the date-based field from your
application that is to be used for placing records on the Calendar.
You can select more than one date field for each application or level.
c. For each selected field, click , select a display color for records on the
calendar and click OK.
d. Click OK.
Next Steps
Modifying Search Results
Procedure
1. On the Advanced Search page, expand the Display Options section and
complete the following:
a. From the Display Format list, select Card.
b. From the Record Count list, select the number of records to be returned.
When this value is set, the search returns no more than the specified number
of records. If you select the All Records option, all records meeting the
search criteria are returned. Record count is applied to primary application
records only. Records returned from related applications are not included in
this number.
c. From the Results Per Page list, select the number of records that you want
to be displayed on each page of the search results.
If your search results include more records than can be displayed on a single
page, a set of arrows is displayed at the top of the Search Results page,
enabling you to move from one page to the next.
Next Steps
Modifying Search Results
When building a Map format search, you specify the fields in your application that
contain the address information. These fields are used to plot the search results on
the map. For more information in storing address information in fields, see Address
Information in Map Format Searches.
When displaying the search results in the Map format, you can display the map in
road or aerial view. You can also assign varying pin colors to plotted locations,
allowing visual differentiation of the data represented within the map. Additionally,
you can save your map as a named report.
Note: Map search results may not render over an HTTPS connection because Bing
Maps geocode is received via HTTP. When attempting to display a map via an
HTTPS connection, many browsers flag this content as "mixed content" and do not
render the map search results. Depending on the browser, security settings, and
user selections to possible prompts, an error that may or may not be visible and
blank results will occur.
Procedure
1. On the Advanced Search page, expand the Display Options section and
complete the following:
a. From the Display Format list, select Map.
b. From the Record Count list, select the number of records to be returned.
When this value is set, the search returns no more than the specified number
of records. If you select the All Records option, all records meeting the
search criteria are returned. Record count is applied to primary application
records only. Records returned from related applications are not included in
this number.
c. (Optional) In the Headings section, select one or more of the following
options:
l Criteria - To display the search criteria that you entered in order to
produce the search results.
l Date - To display the current date and time at the top of the Search
Results page.
2. To specify the address information fields, complete the following:
a. In the Map Configuration section, click in the Address Data field and
select one or more fields from your application that contain the address
information.
Note: Only fields from the primary application can be referenced for
address information. Also, if the primary application is leveled, only fields
from the first level of the application can be referenced.
b. (Optional) If you selected multiple fields, move the fields into the proper
order using the before the Selected list.
c. Click OK.
3. From the Display Mode list, select one of the following map types.
Option Description
Aerial Shows the terrain as viewed from a satellite. This view does not include
territorial borders and does not label roads.
Road Shows information on a map view. This view includes territorial borders
and identifies major roads.
4. From the Pin Color list, select the color of the identifier of records on the map.
Note: The Custom (By Value) option enables you to use difference colored
identifiers on the map for records with specific field values. For example, if you
are displaying Incident records on a map, you can have incidents with a High
priority be displayed in red and incidents with a Low priority be displayed in
green.
5. (Optional). If you selected the Custom (By Value) option, complete the
following:
a. From the Values List, select the Values List field in the primary application
that contains the values you want to distinguish by color.
b. For each value, click , select the color for that value and click OK.
6. (Optional) Add any additional criteria to your search, such as filters or sorting
options.
For more information see Filter Search Results and Determine the Sort Order
for Search Results.
7. Click Search.
Next Steps
Modifying Search Results
Address Information in Map Format
To display search results in a Map format, address information can be stored in a
single Text field or a combination of multiple fields. If you select multiple fields,
the fields must be positioned in the correct order. Also, successful generation of the
Map display depends on the designated fields containing sufficient address data.
The following table describes various scenarios and their results.
On the Search Results page, you can select Modify in the page toolbar to open
the Advanced Search page. Using this page, you can change the search results and
criteria by completing any of the following:
l Search by Keyword
l Search Across Multiple Applications
l Run a Statistics Search
l Select Fields to Display in Search Results
l Filter Search Results
l Determine the Sort Order for Search Results
l Configure the Display Options for Search Results
You can use the Options menu in the Search Results title bar to modify the display
of the search. The following table describes the options in this menu.
Option Description
Modify Results Per Page Allows you to select the number of search results to be
displayed on the Search Results page.
Change Report Format Allows you to present information in a format that is clear
and easy to read. For information on the available format
types, see Display Format Types.
Enable Delete Allows you to turn on the ability to delete records from
the Search Results list when the display format is
Column-Flat or Column-Hierarchical. The ability to
delete records remains active until you disable it or leave
the Search Results page.
Application and permission settings determine what you can do with records in the
Search Results list. You can open a record to view or edit by clicking the record
link. If you have permission to delete records, you can enable the option to delete
records and then select records to delete in the Search Results list.
Procedure
1. Run a search with the results display format set to Column-Flat or Column-
Hierarchical>
2. On the Search Results page, select Options > Enable Delete.
The page refreshes to add a column of checkboxes to the Search Results list.
Note: If the option is inactive, you do not have delete permission for the
application. If you enable the delete option, it remains active until you disable it
or leave the Search Results page.
Procedure
1. On the Search Results page, click the link for the record that you want to edit.
Note: If the record does not open in edit mode, either the Direct to Edit option
is disabled or you do not have update privileges for the record.
Charting
When running a statistics search, you can view your search results as a chart rather
than text. The charting functionality is designed for you to grasp the full scope of
data without paging through hundreds or thousands of records. Charts can provide a
snapshot of your business or can sum up large amounts of data. You can share
charts by exporting them to embed into presentations, by emailing them, or printing
them for paper distribution.
The Platform can render search results in different chart types. Most chart types
can be displayed in different styles. For chart type information, see Supported Chart
Types. With the system's drill-down capabilities, you can click on a data element of
a chart to view details of the underlying data. For more information, see Drill Down
into Chart Data.
Single-Series Charts
In a single-series chart, a single data point is plotted for each data value in the
specified data category. To produce a single-series chart, a statistical search must
contain only one Group by function and only one aggregate function. Certain chart
types support single-series charting. For more information, see Chart Type Report
Configurations.
Multi-Series Charts
In a multi-series chart, multiple sets of data points are plotted for each data value
within one or more data categories. To produce a multi-series chart, a statistical
search must contain one of the following configurations.
One Group by function with more than Plots a single group of data elements
one aggregate function resulting from the Group by function
against a grouping of data points resulting
from the aggregate functions.
Two Group by functions with one or two Plots the two groups of data elements
aggregate functions resulting from the Group by functions
against the grouping of data points
resulting from the aggregate functions.
Charting Toolbar
Once a statistical query is created that can be used in a chart, the Charting toolbar
is displayed at the top of the Search Results page. After setting the report format to
Chart and Data or Chart Only, you can use the toolbar to select the chart type that
you want to display and configure the properties of the selected chart type.
For more information, see Charting Toolbar Options.
Charting Terminology
The following table defines terms relating to the Charting feature in the Platform.
Term Definition
Aggregate A function that returns a single value, calculated from the values of
each distinct value of a Group by function. The aggregate function
is intended to be used in combination with a Group by function.
For example, if you are performing a statistics search in the
Facilities application, and you apply the Group by function to the
Region field and apply the Count of function to the Facility Name
field, you can produce a report listing the number of facilities by
region.
Data Point A single numeric value displayed as a part of bar, pie slice, or other
shape associated with a given data element in a chart. For example,
for Risk Level, the data element "High" has a value of 23. This
numeric value translates into a data point for charting purposes.
Group by A function that returns a single record for each distinct value stored
in the specified field. This function is intended to be used in
combination with an aggregate function. For example, if you are
performing a statistics search in the Facilities application, and you
apply the Group by function to the Region field and apply the
Count of function to the Facility Name field, you can produce a
report listing the number of facilities by region.
Additionally, if you apply the Group by function to two or more
fields in the Selected list, the statistical report is grouped by the
first Group by field in the list, and all other fields with the Group
by function are nested in the previous Group by field in the list.
Therefore, building on your statistical search in the Facilities
application, you can nest the Type field with the Group by
function under the Region field, which produces a report that lists
both the number and type of facilities by region.
Marker A static line, needle, or shaded area that can be added to charts to
communicate a goal, requirement level, overload range, or
comparison figure.
charting.
Display variations
include:
l Standard
l Explode Largest
l Explode Smallest
l Explode All
l Vertical Linear
l Horizontal Linear
Display Variations
The following table describes the display variations for each chart type.
horizontal cylinder.
Vertical bar Full Stacked The data points are stacked upon each other
Horizontal bar in a single bar, which is oriented vertically
or horizontally according to the selected
chart type. The bar represents a value of 100
percent, and each data point within that bar
represents a portion of the total percentage.
Vertical bar Full Stacked Cylinder The data points are stacked upon each other
Horizontal bar in a single cylinder, which is oriented
vertically or horizontally according to the
selected chart type. The cylinder represents a
value of 100 percent, and each data point in
the cylinder represents a portion of the total
percentage.
Vertical bar Stacked The data points are stacked upon each other
Horizontal bar in a single bar, which is oriented vertically
or horizontally according to the selected
chart type. The bar is divided based on the
number of records included in each data
grouping.
Vertical bar Stacked Cylinder The data points are stacked upon each other
Horizontal bar in a single cylinder, which is oriented ver-
tically or horizontally according to the selec-
ted chart type. The bar is divided based on
the number of records included in each data
grouping.
Pie Explode All All slices of the chart are separated from each
Donut other. Each slice has its data points rendered
as a percentage compared to the other data
points.
Line Rounded Stacked The area under the rounded line is shaded.
The following table identifies the available chart types according to the number of
Group by and aggregate functions.
Managing Charts
When you run a statistics search, the results of your search are displayed as
statistical data in a table. You can display this data in chart form, which can
provide you with a more concise visual presentation of the information. An
application cannot render a chart if any of the following conditions exist:
l The statistics search yields more than 400 points.
l The statistics search is configured with more than two Group by functions or
more than three aggregate functions.
l The statistics search is configured to apply either the Minimum of or Maximum
of aggregate function to a date type field.
l The statistics search yields more than one value in a mode aggregate.
l The statistics search yields unchartable data. For example, if you include an
aggregate function for a sub-form contained in a field, and no sub-form records
are attached to any parent records, there is no data for the sub-form aggregate.
Therefore the chart is not rendered.
For more information on Group by and aggregate functions, see Statistical Report
Functions.
The Platform can render search results in different chart types, and each chart type
can be displayed in different styles. For chart type information, see Supported Chart
Types.
To work with charts, begin with any of the following tasks:
After creating the chart, you use the Charting toolbar to configure the chart. For
example, you can configure the chart to display in 3D or specify the color properties
of the data series, legend, and plot area. For more information, see Charting
Toolbar Options.
You can specify how the advanced search results can be displayed for a user to
drill into the chart. For more information, see Set Statistics Drill Down Options.
Create a Vertical Bar Chart
Complete this task to create a vertical bar chart to visually compare or contrast data
points as their actual values or as a comparative percentage in one or more series of
data elements.
Vertical bar charts provide a visual representation of grouped data. The data
grouped by the possible values of the field appears along the X axis and the height
of the bar corresponds to the value of each grouping.
The following table identifies the report configurations and plotting results for
vertical bar charts.
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
2. From the Chart Type list, select Vertical Bar.
Next Steps
To configure the vertical bar chart, complete any of the following tasks:
The following table identifies the report configurations and plotting results for
horizontal bar charts.
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
2. From the Chart Type list, select Horizontal Bar.
Next Steps
To configure the horizontal bar chart, complete any of the following tasks:
Note: To create a pie chart, the statistical search must be set up with one Group by
function and one aggregate function.
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
2. From the Chart Type list, select Pie.
Next Steps
To configure the pie chart, complete any of the following tasks:
Note: To create a donut chart, the statistical search must be set up with one Group
by function and one aggregate function.
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
2. From the Chart Type list, select Donut.
Next Steps
To configure the donut chart, complete any of the following tasks:
Note: To create a gauge chart, the statistical search must be set up with one Group
by function and one aggregate function.
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
2. From the Chart Type list, select Gauge.
Next Steps
To configure the gauge chart, complete any of the following tasks:
Note: To create a funnel chart, the statistical search must be set up with one Group
by function and one aggregate function.
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
2. From the Chart Type list, select Funnel.
Next Steps
To configure the funnel chart, complete any of the following tasks:
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
2. From the Chart Type list, select Line.
Next Steps
To configure the line chart, complete any of the following tasks:
Two Group by functions Each element of the second Group by function rendered as
with one aggregate a spoke in the radar
function
Each aggregate functions plotted as a line
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
Next Steps
To configure the radar chart, complete any of the following tasks:
One Group by function Group by function represented by bubble size and shown
with two aggregate in legend
functions
Aggregate values plotted in X and Y axes
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
2. From the Chart Type list, select Bubble.
Next Steps
To configure the bubble chart, complete any of the following tasks:
Two Values Lists Group by Renders the standard heat map, which you can change to
functions with one the risk (summary) chart.
aggregate function
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
2. From the Chart Type list, select Heat Map.
Next Steps
To configure the heat map chart, complete any of the following tasks:
One Group by function (on All data points will be one color.
the Tracking ID field) with
two aggregate functions
Procedure
1. On the Search Results page of the statistics search that you just ran, select
either Chart and Data or Chart Only in the Charting toolbar.
For more information on the Charting toolbar, see Charting Toolbar Options.
2. From the Chart Type list, select Scatter.
Next Steps
To configure the scatter chart, complete any of the following tasks:
The following table describes the options available for configuring a chart.
Icon Description
Report Format Allows you to choose the format in which the resulting statistical
data is displayed. Available options include:
l Chart and Data. Displays both the chart and data results from
the statistical search.
l Chart Only. Displays only the rendered chart as a result from
the statistical search.
l Data Only. Displays only the rendered data as a result from
the statistical search. No charts are rendered or displayed when
you select this option. Also, this option is the only available
option if the statistical query cannot be rendered as a chart.
Chart Type Allows you to choose the chart that represents the results of a
statistical search data. Selecting a different chart causes the Search
Results page to refresh and display the new chart type.
Depending on the number of series in the statistical search, only
certain charts can be rendered.
For more information, see Choose a Chart Type.
Icon Description
Note: The gauge, radar, heat maps, and scatter chart types do not
support 3D rendering.
Chart Options Allows you to select specific display variation available for the
currently displayed chart. For more information, see Display
Variations.
The purpose of these variations is to enhance the visual look and
feel of the chart, as well as to offer more clarity to the data being
presented. Any time that you change a chart type, the Chart
Options list dynamically updates with the available options for
the selected chart type.
For information, see Configure Display Variations.
Colors Dialog Allows you to customize the colors for the following elements of
a chart:
l Data Series. Allows you to select from predefined color
palettes (that is, themed collections of colors) or select a
specific color for each data series.
l Legend. Allows you to select the background and border
colors for charts that support these features. This option is not
available for gauge charts.
l Plot Area. Allows you to select the background and border
colors for charts that support these features. This option is not
available for gauge charts.
Note: For heat map - standard charts, you can define one or more
color thresholds. For heat map - risk (summary and scatter
overlay), you can select the color for each section.
Transparency Level Allows you to select from various levels of transparency for the
currently displayed chart. By default, charts do not have any
transparency applied.
For more information, see Define the Chart Transparency.
Chart Effects Allows you to set the following features of the currently
displayed chart:
l Shading. Allows you to select a shading effect that is applied
to a series based on the currently selected chart type.
Icon Description
Value Labels Allows you to configure the following features of the currently
displayed chart:
l Position of the chart legend
l Display of value labels relative to series data points
l Display of the data labels in the chart representing the values.
l Display of X axis or Y axis value labels.
Note: When this option is selected, all other tools on the Charting toolbar become
unavailable. Tools remain disabled until you select either the Chart and Data
option or the Chart Only option.
Procedure
1. On the Search Results page of the chart that you created, click
and select the preferred display format.
2. To save your chart, click Save.
Procedure
1. On the Search Results page of the chart that you created, click
and select the preferred chart type.
2. To save your chart, click Save.
Display a Chart in 3D
Complete this task to toggle between a 2-dimensional and 3-dimensional rendering
of a chart. When you select the 3D option, the chart is redrawn in a 3-dimensional
format. When the checkbox is cleared, the chart reverts to a 2-dimensional format.
Important: The gauge, radar, heat map, and scatter chart types do not support 3-
dimensional rendering.
Procedure
1. On the Search Results page of the chart that you created, select to
enable the 3-dimensional effect.
2. To save your chart, click Save.
Procedure
1. On the Search Results page of the chart that you created, click and
select the preferred display variation.
2. To save your chart, click Save.
Procedure
1. On the Search Results page of the chart that you created, click .
2. In the Data Series section, complete one of the following tasks.
Task Action
3. In the Legend and Plot Area sections, click the color drop-down arrow for
Background Color and Border Color and select the preferred color in the
Color Picker dialog box.
Note: The Legend section is not available for the heat map -risk (summary) and
heat map - risk (with scatter overlay) chart types
4. (Optional) For gauge charts, click the color drop-down arrow for Gauge Color
in the Plot Area and select the preferred color in the Color Picker dialog box.
5. Click OK.
6. To save your chart, click Save.
Important: Because the gauge chart type is always solid, the Transparency list is
not available for gauges. Additionally, heat map and scatter chart types do not
support the Transparency feature.
Procedure
1. On the Search Results page of the chart that you created, click and
select one of the following levels of transparency:
l 0%
l 25%
l 50%
l 75%
2. To save your chart, click Save.
Procedure
1. On the Search Results page of the chart that you created, click and
select the preferred shading effect. See Shading Options.
2. Click OK.
3. To save your chart, click Save.
Shading Options
The following table identifies which shading options are available for specific chart
types.
Horizontal Bar
The following chart types do not support changing shading from the standard option:
Procedure
1. On the Search Results page of the chart that you created, click and
select Smart Breaks.
2. Click OK.
3. To save your chart, click Save.
You can have up to five markers in a chart. The marker name, value, color, and
style appear in the legend of the chart.
Note: If you set markers on a vertical bar chart, and then switch to a horizontal bar
chart or line chart, the markers are displayed. However, if you convert a vertical or
horizontal bar chart to any other chart type, the markers are not displayed.
For information on setting threshold markers on gauge charts, see the following:
l Add Range Markers for Gauge Charts
l Identify Data Point Markers for Gauge Charts
Procedure
1. On the Search Results page of the chart that you created, click .
2. In the Marker Name field, enter a label for the marker.
When the chart is redrawn, the marker name is displayed beside the marker
line.
3. In the Value field, enter the numeric value for the maker.
This number represents the position of the marker on the chart.
4. In the Style field, select a line style for the marker.
5. In the Color field, click the color drop-down arrow to open the Color Picker
dialog box and click the preferred color
6. (Optional) To add more markers, repeat steps 3 through 5.
Important: For each marker that you want displayed on the chart, be certain to
select its corresponding checkbox.
Procedure
1. On the Search Results page of the chart that you created, click .
2. From the Type list, select Range.
3. From the first Group list, select the value to which you want to apply the
marker.
Note: Each value in the Group list, except for the All option, represents one
gauge. If the statistics search produced only one gauge, select the value that you
used to filter the search. If the statistics search produced multiple gauges, you
can configure markers to be displayed on each gauge by selecting a value in the
additional Group lists. Additionally, you can add a set of range markers to all
gauges by selecting the All option.
5. In the Min field, enter the low value of the range that the marker should plot in
the gauge chart.
6. In the Max field, enter the high value of the range that the marker should plot in
the gauge chart.
7. In the Color field, click the color drop-down arrow to open the Color Picker
dialog box and select the color you want to use.
8. (Optional) To add more range markers, repeat steps 3 through 6.
Important: For each range marker you want displayed on the gauge, be certain
to select its corresponding checkbox.
For example, you can configure a marker that represents a low-risk range, one
that represents a medium-risk range, and another that represents a high-risk
range. If your statistics search produces multiple gauges, you can configure
range markers for each gauge by selecting values in the additional Group fields.
To add range markers to more than three gauges, click Add New.
9. Click OK.
10. To save your chart, click Save.
Procedure
1. On the Search Results page of the chart that you created, click .
2. From the Type list, select Marker.
3. From the first Group list, select the value to which you want to apply the
marker.
Note: Each value in the Group list, except for the ALL group, represents one
gauge. If the statistics search produced only one gauge, select the value that you
used to filter the search. If the statistics search produced multiple gauges, you
can configure markers to be displayed on each gauge by selecting a value in the
additional Group lists. If you want the same marker to be applied to all of the
gauges, choose ALL instead of choosing a specific group.
6. In the Color field, click the color drop-down arrow to open the Color Picker
dialog box and select the correct color.
7. Select the checkbox next to Marker Name to display the marker on the gauge
chart.
8. (Optional) To add more markers, repeat steps 3 through 7.
Important: For each marker you want displayed on the gauge, be certain to
select its corresponding checkbox.
If your statistics search produces multiple gauges, you can configure markers
for each gauge by selecting values in the additional Group fields. To more than
three range markers to a gauge, click Add New.
9. Click OK.
10. To save your chart, click Save.
Note: This task is not applicable for heat map - standard or heat map - risk
(summary) chart types.
Procedure
1. On the Search Results page of the chart that you created, click .
2. Enter the number of sections that you want for each axis in the Rows and
Columns fields.
3. In the Y Axis Minimum Value, Y Axis Maximum Value, X Axis Minimum
Value, and Y Axis Maximum Value fields, set the minimum or maximum
number of rows and columns to be included in the chart.
4. Click OK.
5. To save your chart, click Save.
Note: This task does not pertain to heat map charts. With heat map charts, you can
only configure the axis labels. For information on configuring these labels for heat
map charts, see Configure Axis Labels for Heat Maps. Also, the Legend setting is
not available for heat map charts.
Additionally the Values Label settings are not available for gauge charts.
Procedure
1. On the Search Results page of the chart that you created, click .
2. From the Legend list, select the positioning of the legend relative to the plot
area of the chart.
The No Legend option displays the numeric values in the chart. Data labels are
not displayed.
3. From the Value Labels list, select how the numeric value labels are to be
displayed relative to the series data points.
Option Description
Inside Series The labels are displayed inside each data point.
Outside Series The labels appear as callouts for each data point.
Any value that is not applicable for the selected chart type is not listed in the
Value Labels field. For example, options available for bar charts include
Automatic and None.
4. To display series labels in the chart that represent the value, select Smart
Labels.
Note: The Smart Labels checkbox does not work unless you have set the Value
Labels option to anything other than None.
5. To display the X-axis or Y-axis value labels on the chart, select Label X-Axis
or Label Y-Axis.
The X-axis option displays the data labels on the X axis for a vertical bar or line
chart. It is available when the statistics search contains a single Group by
function. The Y-axis option displays the data labels on the Y axis of a horizontal
bar chart. It is available when the statistics search contains a single Group by
function.
Note: This option is not available for the pie, donut, funnel, and scatter chart
types.
6. Click OK.
7. To save your chart, click Save.
Configure Axis Labels for Heat Maps
Complete this task to display and configure the axis labels on the chart for heat map
charts.
Procedure
1. On the Search Results page of the heat map chart that you created, click
.
2. Complete the Axis Labels section according to the following heat map chart
types.
To display both the a. To display both the a. To display both the X-axis
X-axis and Y-axis X-axis and Y-axis and Y-axis Value Labels on
Value Labels on Value Labels on the the chart, select Label Axis.
the chart, select chart, select Label
b. Enter the label names for each
Label Axis. Axis.
axis in the Y Axis and X
b. Enter the label names Axis fields.
for each axis in the Y
c. To define sections along each
Axis and X Axis
axis, enter the label names in
fields.
the Individual Labels fields.
3. Click OK.
4. To save your chart, click Save.
Procedure
Procedure
1. On the Advanced Search page, expand the Statistics Drill Down Options
section and complete the following tasks.
Task Action
Configure the fields a. From the Available list, select the fields that you want
in the search results. included.
Task Action
Set the sorting a. Under Sorting, in the Field column, select the field that
options for the search is the primary sort.
results.
b. In the Order column, select from the following options:
l Ascending. Text values are sorted A to Z. Numeric
values are sorted smallest to largest. Data values are
sorted oldest to newest.
l Descending. Text values are sorted Z to A. Numeric
values are sorted largest to smallest. Data values are
sorted newest to oldest.
Set the display a. From the Display Format list, select how the search
options. results of the data points are to be displayed.
For more information, see Display Format Types.
b. From the Results per Page list, select the number of
records that should be displayed on each page of the
data point search results.
If the search results include more records than can be
displayed on a single page, a set of arrows appears at the
top of the Search Results page, enabling you to move
from one page to the next.
2. (Optional) Add any additional criteria to your search, such as filters or sorting
options.
See Filter Search Results and Determine the Sort Order for Search Results.
3. Click Search.
Next Steps
Modifying Search Results
Procedure
1. In the top frame of the user interface, click Reports.
The Master Report Listing page is displayed.
2. Using the Grouping and Filter toolbars, filter and sort the list as needed to
locate the report that you want to view.
3. Click the report to execute that report and view it.
Add a Report
Complete this task to create new personal reports. If you have global report
administration rights for an application, you can also create global reports.
Procedure
1. In the top frame of the user interface, click Reports.
The Master Report Listing page is displayed.
2. Click Add New to open the Add New Report dialog box.
3. Select the application that you want to run the report against and click OK.
The Advanced Search page is displayed, enabling you to specify criteria for the
report.
4. Enter your search criteria on the Advanced Search page and click Search.
Your report is displayed.
5. Click Save.
The Save Report page is displayed for the new report. This page enables you to
specify the properties of the report.
Next Steps
Update a Report
Update a Report
Complete this task to edit your personal reports. If you have global report
administration rights for an application, you also can edit global reports.
Procedure
1. In the top frame of the user interface, click Reports.
The Master Report Listing page is displayed.
2. Click the report that you want to modify.
3. Click Modify in the record toolbar.
The Advanced Search page is displayed.
4. Enter updated search criteria on the Advanced Search page and click Search.
Your modified report is displayed.
5. Do one of the following:
l Click Save.
l Select Save as New Report from the list displayed to save a separate report
with your changes.
l Select Save Report Changes from the list displayed to save the changes to
the existing report.
6. Complete the Report Information section:
a. In the Name field, enter a name for the report.
b. In the Description field, describe the report.
This description is displayed on the Master Report Listing page.
7. In the Report Type section, select whether the report is a personal report or a
global report:
l Personal Report. Accessible only to the person who created it.
l Global Report. Accessible to all users in an application or to selected users
and user groups.
8. If you selected Global Report, access is granted to all users with access rights
to the current application by default. Assign access rights for the report
according to the following options:
l Current User. In the Available list, expand the Current User node and
select the user who you want to have access to the report.
l Groups. In the Available list, expand the Groups node and select the
groups whose members you want to have access to the report.
l Users. In the Available list, expand the Users node and select the users
who you want to have access to the report.
To revoke access rights for a user or group, click in the Selected list.
9. In the iView Caching section, define the caching behavior and duration for the
report. If caching is enabled, the refresh rate is disabled.
l Enabled iView Caching. Select to enable or unselect to disable iView
caching for the report. Caching requires configuration of a caching provider
before it can be enabled.
l Cache Duration. If you enable caching, set the amount of time to display
cached results instead of running a new search to update iView content. You
can set the duration to a minimum of 2 minutes up to a maximum of 30 days.
l Reset to default. Click to change iView caching settings to the global
defaults defined by the instance administrator.
10. From the Refresh Rate list, select how often you want the report to refresh. If
a refresh rate is set, iView caching is disabled.
11. Click Apply.
12. If you changed the cache duration from one time range to another, open and
refresh the Report iView to complete the change.
Delete a Report
Complete this task to delete your personal reports. If you have global report
administration rights for an application, you also can delete global reports.
Procedure
1. In the top frame of the user interface, click Reports.
The Master Report Listing page is displayed.
Trending
Trending is a method of data tracking that enables you to track status changes for a
numeric or field-specific values list field when trending is enabled. Trending charts
allow you to observe patterns in the trending data over a specified period of time.
The chart reflects a plot point for each time a field value is saved. (For more
information, see Viewing a Trending Chart in a Record.) When a field is enabled
for trending with a duration period, the Platform captures trending data for the
specified field and retains the data for the duration period.
An administrator can perform any of the following tasks related to trending:
The trending data can be displayed on a chart in the content record after the Add
Trending Chart layout object is added to the application layout. Viewing the trended
data on the chart enables the user to see trends in the data in order to make
informed business decisions.
An end user can perform the following tasks related to trending:
l View a trending chart in a record
l Print a record
l Export a record
Trending charts are similar to Text Box objects and Custom Objects in that they
have the following options: Use Default Settings, Display, and Do Not Display. For
more information, see Special Considerations - ACL.
You can add trending charts to packages that are generated, exported, or installed in
the target instance. There are some important rules that you should know when
packaging trended chart objects. For more information, see Trending Charts and
Trending Rules for System ID-Matched Objects. You can also map trended chart
objects in Mapping Analyzer. For more information, see Mapping Analyzer.
The following examples are intended to demonstrate the behavior of trending
functionality.
Example A: You might create a trending chart called "Safety Incidents" to track
the number of safety incidents that occur at a facility before safety policies are
instituted. If the duration period was specified as one year (365 days), the user
might view the trending chart and observe that the number of safety incidents at the
facility has decreased during the one year duration period. The user might conclude
that the safety policies are working.
Example B: To expand on Example A, suppose the duration period is changed from
one year to one month. The trending data on the chart now spans the one year
duration period plus the one-month duration (30 days). On the 31st day, the trending
data shows only the one-month period once an asynchronous job runs. This once-
daily cleanup job removes both expired trended data and any trended data for fields
that the user has disabled trending.
Example C: You might not update a trending-enabled field until after the period of
time specified in the duration period. When the update takes place after the duration
period ends, the chart reflects data for a longer time span, and any removal of data
will not occur until a new value is added.
Procedure
1. From the Administration workspace, navigate to Navigation Menu >
Application Builder > Manage Applications.
2. Select the application that you want to update.
3. Click the Layout tab.
4. Select Add New Layout Object in the left pane.
5. Click and drag the Add Trending Chart option to the layout area.
6. In the Name field, enter the heading that you want to display in the layout.
7. From the Trending Field list, select the trending-enabled field for which to
display chart data.
8. (Optional) To display the chart name as the title, select Show Title.
Procedure
1. From the Administration workspace, navigate to the Navigation Menu >
Application Builder > Manage Applications.
2. Select the application that you want to update.
3. On the Fields tab, select the Numeric or Values List field for which you want
to enable trending.
4. Select the Enable trending options for this field option.
The Duration Type and Duration Amount options are displayed.
5. From Duration Type, select the duration for which you want the Platform to
retain trending data.
6. In Duration Amount, enter a numerical value that specifies the number of
days, months, quarters, or years for which the Platform retains trending data.
7. Click Save or Apply.
Procedure
1. Search for the record using one of the following methods:
l Quick Search
l Advanced Search
2. On the Quick Search Results page or Search Results page, open the record
that you want to view.
The trending chart is displayed. The chart title is displayed if the Show Title
option is selected in the Trending Chart Description dialog box. When a user
changes the value of the trended field and clicks Save or Apply, the chart is
updated to include the new data.
Note: If you are attempting to display a trending chart for a Values List field
that has a large number (approximately 2500) of historical changes, an error
may occur.
Related Topics
Viewing a Trending Chart in a Record
Trending
Adding a Trending Chart to an Application Layout
Navigation Menu
The Navigation Menu, an accordion-type menu located in the left frame, is the
primary navigational tool for the Platform. The hierarchy of the Navigation Menu
enables users to drill down into a solution node to reveal the list of related
applications, and into an application node to reveal the tree structure of that
application.
What you see in the Navigation Menu depends on the currently active workspace,
as configured by administrators. For example, if the active workspace is Risk
Management, you might see the Risk Management and Risk Assessments solutions.
If the active workspace is Policy Management, you might see only the Policy
Management solution.
Administrators configure the default behavior of the Navigation Menu for each
workspace, that is, expanded, collapsed, or hidden. When you click a node in the
Navigation Menu, the menu either expands to show the next lower level in the
hierarchy, or collapses to hide the contents below it.
When you expand an application node, the Navigation Menu displays a tree that
contains that application's operation links, such as Advanced Search, Add New, and
Display All, and folders that contain search filters and reports.
The following figure shows an expanded solution node, several collapsed
application nodes, and the tree structure of an expanded application node.
You can perform the following tasks to modify the display of the Navigation Menu:
l Expand or Collapse the Navigation Menu
l Expand or Collapse a Navigation Menu Node
l Add a Record from the Navigation Menu
l Import Data from the Navigation Menu
Procedure
Do one of the following:
Procedure
Do one of the following:
l To reveal the next level in a menu hierarchy, click a node to expand it.
An expanded solution shows one node for each related application.
An expanded application shows the tree structure of the application, as shown in
the following figure.
l To hide the contents of an expanded node, click the node to collapse it.
Procedure
1. In the Navigation Menu, drill down to the application to which you want to add
a record.
2. Expand the application.
3. Click .
The application-specific Add New Record page is displayed.
Note: The name of the Add New operation link is configured for each
application by a Platform administrator, for example, Add New Device.
However, the link functions as indicated.
The following table describes the types of search operations that applications can
provide.
Operation Link
Description
Example
Note: In the preceding table, the operation links shown are examples that you might
see. Platform administrators can rename operation links, for example, Display All
Devices. However, the links function as described.
Procedure
1. In the Navigation Menu, drill down to the application into which you want to
import data.
2. Expand the application.
3. Click .
The Data Import Wizard opens.
Note: The name of the Data Import operation link is configured for each
application by a Platform administrator. However, the link functions as
indicated.
Workspaces
A workspace is a page that contains one or more dashboards, accessed from a tab
in the workspace tab strip. If a workspace offers more than one dashboard, users
can select a dashboard from the Dashboard list in the page toolbar.
Dashboards
A dashboard is a container for one or more iViews, typically for the purpose of
grouping related content. Platform administrators build global dashboards and can
enable users to build personal dashboards. Users who have permission can see
global dashboards. Users cannot see the personal dashboards of other users.
Users who have permission to create personal dashboards and iViews can add them
to workspaces, change the layouts of dashboards, and resize iViews.
iViews
An iView is a window that can display a report, a chart, links to internal pages and
external websites, an embedded web page, and custom content such as a Flash
presentation or graphic. iViews provide users with the information they need to
make decisions, complete tasks, and stay up to date.
The following are examples of practical uses for iViews:
l Links to security policies
l Links to industry or regulatory sites
l Content review queues
l Embedded web pages
To improve performance, Report iViews can display cached search results. When
caching is enabled, cached Report iViews include a Cached Report message.
Caching requires configuration of a caching provider before it can be enabled.
Administrators can enable and disable the global caching behavior for Report
iViews in the Archer Control Panel. Users can adjust caching behavior for
individual Report iViews on the Save Report page. Users can also manually
refresh a cached Report iView to display updated results.
Users can click a Report iView window to open the list of records found by its
associated search. Selecting a record from the list opens the record for viewing or
editing based on the permissions of the user. Changes made to a record are
reflected in the iView immediately after the changes are saved.
Procedure
1. Navigate to the Personalize Workspace Display page:
a. From the menu strip in the top frame, click Preferences.
b. From the User Preferences menu, select Update Your Workspace
Display.
2. In the Select Workspaces section, from the list of available workspaces, select
each workspace that you want to display. Or, clear the checkboxes of
workspaces that you want to remove.
3. Click Apply.
Note: You can configure personal dashboards only if you have been granted access
by your Platform administrator.
Procedure
1. Click the workspace to which you want to add a personal dashboard.
2. Do one of the following:
l To add a new personal dashboard to the workspace, from the Options list in
the page toolbar, select Add New Personal Dashboard.
l To edit an existing personal dashboard, from the Options list in the page
toolbar, select Edit Personal Dashboard Properties.
3. Complete the following fields on the Manage Dashboards page.
Field Action
Status To activate the dashboard, from the Status list, select Active.
To inactivate the dashboard, from the Status list, select Inactive.
Column Layout In the Layout Design section, select a layout from the drop-
down list.
The Preview field shows how the layout selection will be
displayed.
4. Click OK.
5. If you are adding a new personal dashboard to the workspace and want to
update the iView content, do the following:
a. On the iView Type Selection page, from the Name list, select the iViews
that you want to be displayed in your personal dashboard.
b. Click OK.
6. (Optional) If you are editing an existing dashboard and want to update the iView
content, do the following:
a. From the Options list in the page toolbar, select Add iView Content.
b. On the iView Type Selection page, from the Name list, select the iViews
that you want to be displayed in your personal dashboard.
c. Click OK.
Procedure
1. Click the workspace that contains the personal dashboard that you want to
delete.
2. Select the personal dashboard that you want to delete.
3. From the Options list in the page toolbar, select Delete Personal Dashboard.
CAUTION: This action deletes the currently selected dashboard and the
personal iViews associated with the dashboard. You cannot recover a deleted
dashboard or the iViews associated with that dashboard.
Procedure
Note: The list of available menu options depends on the type of iView that you
are viewing and the access rights assigned to you by your administrator.
Edit Properties If the iView is a global iView and you have permission to
edit it, edit the configuration properties of the iView.
Display Report If the iView runs a report, display the report in the search
results page.
Refresh Run the search associated with the report to update the
iView with the latest available information. When you
change the cache duration, also refresh the Report iView
the next time you see it to complete the change.
Records
Managing records is a universal process in the Platform, meaning that the process is
the same for all applications. Record management involves the following activities:
l Adding records
l Modifying records
l Deleting records
l Exporting records
l Locating or searching specific records
l Reporting on records
Your ability to perform these activities depends on the rights an administrator has
granted you at the application, record, and field level. The following describes each
level of access:
l Application Level. On an application-by-application basis, administrators can
assign create, read, update, and delete permissions to you through your access
roles, which determine whether you can view, add, edit, delete, and search
records within an application. If you do not have any permissions to an
application, the application is not displayed in the Navigation Menu for you, and
you cannot access it in any way.
l Record Level. If an application contains a Record Permissions field, users can
only access the records in the application to which they have been assigned
permissions for each field. It is important to note that a user may not have access
to all records in an application when the user is assigned permissions to some
fields, but not all, of the application records.
l Field Level. Administrators can configure individual fields in an application as
either public or private. With public fields, all users who have create, read,
update, and delete permissions to an application also have create, read, update,
and delete permissions to public fields in the application. With private fields,
only selected users can view and enter data in those fields. Private fields can
also be designated as "read only" for any user, which allows the user to view the
field but not to add, edit, or delete its data.
Depending on your rights, you can perform some or all of the following record
creation and management tasks:
l Add a New Record
l Copy an Existing Record
The following tools are available on the Rich Text Editor toolbar.
Icon Description
The Find and Replace tool enables you to search for a text string and
replace it with a different text string if desired.
The Cut tool deletes the currently selected text, but retains a copy of
the text in the system clipboard. Text that is cut from a field remains
available for pasting until the clipboard content is replaced by another
copy or cut operation.
The Copy tool enables you to place a copy of the currently selected
text in the system clipboard. Text that is copied from a field remains
available for pasting until the clipboard content is replaced by another
copy or cut operation.
The Paste tool enables you to paste the contents of the system
clipboard into the rich text field at the current insertion point.
Formatted text that is copied from a field retains the formatting when
Icon Description
The Spell Check tool allows you to perform spell checking across all
rich text fields on the current page. By clicking this tool, the Spell
Check dialog box is displayed, which contains traditional spell
checking and correction controls.
The Undo tool allows you to reverse the previous action or keystroke
from within the text area field.
The Insert / Edit Image tool enables you to edit images and upload
them to the field. Upon clicking the tool, the Insert / Edit Image
dialog box opens where you can enter a URL to the image, type an
image description, and set the width and height of the image in pixels.
Click OK to save your changes or Cancel to discard your changes.
The Font Family tool provides a drop-down list that specifies font
types, which can be used to format the currently selected text.
Note: If the text is truncated when it is printed, you can adjust the font
size to ensure the text prints properly.
The Font Size tool provides a drop-down list that specifies a selection
of font sizes, which can be used to format the currently selected text.
The Bold tool allows you to apply bold formatting to the currently
selected text. If the selected text already is bold, clicking the Bold
tool removes the bold formatting from the text.
The Italics tool allows you to apply italic formatting to the currently
selected text. If the selected text already is italicized, clicking the
Italic tool removes the italic formatting from the text.
The Underline tool allows you to underline the currently selected text.
If the selected text already is underlined, clicking the Underline tool
removes the underlining from the text.
Icon Description
The Superscript tool enables you to cause the currently selected text,
or the text entered following the insertion point after clicking the tool,
to appear slightly above the baseline. If the selected text already has
superscript formatting, clicking the Superscript tool removes this
formatting.
The Subscript tool enables you to cause the currently selected text, or
the text entered following the insertion point after clicking the tool, to
appear slightly below the baseline. If the selected text already has
subscript formatting, clicking the Subscript tool removes this
formatting.
The Background Color tool allows you to change the highlight color
of the currently selected text. The tool face always displays an
example "swatch" of the most recently applied text color. To change
the color selection, click the drop-down arrow to the right of the tool.
The Color Selector dialog box opens. Select a color, and click OK to
close the dialog box. Click Cancel to close the dialog box without
selecting a color.
The Text Color tool allows you to change the color of the currently
selected text. The tool face always displays an example "swatch" of
the most recently applied text color. To change the color selection,
click the drop-down arrow to the right of the tool. The Select Color
dialog box opens. Select a color, and click OK to close the dialog
box. Click Cancel to close the dialog box without selecting a color.
The Align Left tool allows you to align the currently selected
paragraphs with the left margin.
The Align Center tool allows you to center align the currently
selected paragraphs.
The Align Right tool allows you to align the currently selected
paragraphs with the right margin.
The Unordered List tool enables you to apply bullets to the currently
selected paragraphs. To change the appearance of the bullet, click the
drop-down arrow to the right of the tool. You can select from the
following bullet styles: Standard (Default), Circle, Disc, and Square. If
Icon Description
the selected text is already bulleted, clicking the Unordered List tool
removes the bullets.
The Outdent tool allows you to decrease the current indenting for the
selected paragraphs by one step to the left. If the selected paragraph is
not indented, clicking this tool has no effect.
The Indent tool allows you to indent the selected paragraphs one step
to the right. To indent a paragraph more than one step, click the tool
again.
The Insert Date tool allows you to insert the current date at the current
insertion point.
The Insert Custom Character tool allows you to insert special symbols
into the field. Clicking the tool and then clicking a symbol from the
Select Custom Character dialog box inserts that symbol into the text at
the current insertion point. The dialog box includes currency, legal,
math, and other symbol characters. Select a custom character, and the
dialog box automatically closes.
The Insert/Edit Link tool enables you to link the currently selected
text to an external FTP, HTTP, or HTTPS site or an email address
(External Link tab), or to an internal page, record, or workspace
(Internal Link tab). When you click the tool, the Insert/Edit Link
dialog box opens, where you can enter a URL for an external
Icon Description
hyperlink or select from a list of available internal links. You can also
enter a value in the Title field to modify the way the link is displayed.
Click OK to save your changes or Cancel to discard changes.
The Edit HTML Source tool opens the HTML Source Editor dialog
box, where you can edit the HTML code of the text field. You can
select the Word wrap option to display the text in a wrapped format.
Click OK to save your changes or Cancel to discard your changes.
Data Entry
When you add or edit a record in an application, you are presented with a series of
fields for data entry. An application may contain a variety of field types, each
requiring you to enter or select a specific kind of information.
The following topics contain descriptions and examples of the type of data entry
fields in the Platform.
Text Entry
When adding or editing a record in an application, you can encounter a field that
requires you to input text values. Text fields can be displayed as one-line text boxes
or as multi-line text areas. You also can encounter a Text field that is displayed in
masked format, requiring you to enter text values, such as an IP address, a Social
Security number, a telephone number, an email address, or a zip code, in a defined
format.
The Rich Text Editor toolbar at the top of the record enables you to check the
spelling of any text that you enter in a Text field. If you are entering data in a multi-
line text area, you also can use the other tools in the Rich Text Editor toolbar to
format your text.
The following are data-entry restrictions that an administrator can place on a Text
field:
l You may be required to enter a value in the field before you can save a record.
l The number of characters that you can enter in the field may be limited.
l You may be required to enter a unique value in the field. If you enter a value that
has already been saved in the field within another record, you are prompted to
enter a new, unique value.
l If the administrator configures the field with default text, you may not be able to
enter any value in the field.
"3.210" when you save the record. If you enter the value "3.2125," you are
prompted to reduce the decimal places in the numeric value when you attempt to
save the record.
Date Entry
Date fields in a record accept date values in the following format: mm/dd/yyyy,
such as 10/15/2012. When entering a value in a Date field, you can either enter the
value or click to select the date from a calendar pop-up control. The Date field
may also display a that enables you to enter time information.
Depending on how an application administrator configures a Date field, you may
see a default value in the field when you create a new record. This default value
can be the date of record creation, a date that is a specific number of days after the
date of record creation, or a static date defined by the administrator. If you have full
access to the field (not read-only access), you can change this default date if
necessary.
The following are data-entry restrictions that an administrator can place on a Date
field:
l You may be required to enter a value in the field before you can save a record.
l You may be required to enter a unique value in the field. If you enter a value that
has already been saved in the field within another record, you are prompted to
enter a new, unique value.
Cross-Reference Selection
When adding or editing a record in an application, you may encounter a Cross-
Reference or Related Record field that enables you to associate the record with one
or more records in the same application (resulting in internal references) or in a
related application (resulting in external references). The following are two
examples of how you can use a Cross-Reference field:
l Suppose that you are creating a record in a Trouble Tickets application, and that
application contains a Cross-Reference field designed to allow internal
references. Through the Cross-Reference field, you could select other trouble
tickets in the application that are related to the record that you are creating.
l Suppose that you are creating a record in a Violations application, and that
application contains a Cross-Reference field designed to allow external
references to records in an Investigators application. You could assign one or
more investigators to the violation record that you are creating by selecting those
investigators from the Cross-Reference field.
The following table describes the options for filtering the list of fields in the Record
Lookup page.
Option Description
Search Allows you to enter a keyword to filter the list with only matching
records.
Level Allows you identify the level that should be searched for the
keyword.
Display Higher Allows you to include lower-level records that meet the keyword
Levels search criteria even if they do not have a primary application that
meets the search criteria. Also, primary application records are
included in the results if they contain lower-level records that
match the search criteria.
Expand All Allows you to expand a tree view if the application is a leveled
application. Top-level record references are shown as the top level
and record references in subsequent data levels are indented.
l Pop-up Control. By clicking , you can select records from the application
that you referenced in the drop-down list.
You fill out the fields in the sub-form, and click Save in the sub-form to save your
entry and return to the record. Later that day, you decide that you want to make
another comment about the same record, so you open the record for editing, click
Add New to make an entry in the sub-form and fill out the sub-form fields. When
you click Save in the sub-form, both the entry that you just made and the entry you
made earlier in the day is displayed in a table in the record. The table may also
display comments other users have made about the record.
Note: If you open a record in Edit mode, and click Add to add a sub-form record,
and then click Save to save the sub-form record and return to the parent record, the
sub-form data is displayed in the parent record’s sub-form field. However, if you
then exit the parent record without saving it, the sub-form record will not be linked
to the parent record and will be lost. The parent record must be saved or the sub-
form data will be lost.
You can add a sub-form record in View mode without having to save the parent
record.
The following are data-entry restrictions that an administrator can place on a sub-
form:
l You may be required to make at least one entry in the sub-form before you can
save a record.
l You may be limited in the number of entries that you can make in the sub-form.
For example, if the sub-form is configured to allow a maximum of five entries,
and those five entries have already been made by other users, you cannot save a
sub-form entry.
l Depending on how the sub-form is configured, you may be able to edit and delete
entries made by other users, you may be able to edit and delete only your own
entries, or you may not be able to edit or delete sub-form entries at all.
l Relative
l File
The link is displayed in a table in the record. You can enter multiple external links
in a single record by clicking the Add New link again. By default, the links are
displayed in alphabetical order in the table.
IP Address Entry
If you are adding or editing a record in an application that collects information about
technological assets, you may encounter an IP Address field. The format of this
field, which was determined when the field was created, allows you to enter one of
the following address types:
l IPv4 format. Divided into four adjoining sub-fields, which must contain a
numeric value between 0 and 255.
l IPv6 format. Divided into eight adjoining sub-fields and is displayed using either
the full syntax or the shorthand syntax.
Procedure
1. Go to one of the following locations:
l Navigation Menu
l Search Results page
l An existing record in view or edit mode
l From the Navigation Menu, click the Add New operation link
under the appropriate application branch.
Procedure
1. From an existing record in either view or edit mode, click in the page toolbar.
The Platform opens a new record that it populates with the original record's
values.
2. Edit the duplicate record.
3. Click .
Note: If the application contains a Record Permissions field, you may not have been
granted access to every record in the application. Also, if the application contains
private fields for which you have not been granted access, you cannot view or edit
those fields.
Procedure
1. View an existing record.
2. Click in the page toolbar.
Note: If this icon is disabled, you do not have the appropriate rights to edit the
record.
In the rare case in which changes are made to a record by other processes while
you were modifying the record, the Platform opens the Record Conflicts dialog
box informing you of the conflict.
entered and the values that the system changed, and enables you to select
which ones to keep.
Procedure
1. Add a New Record or Edit an Existing Record.
2. Use the Rich Text Editor Toolbar to format text in a record.
See Rich Text Editor Toolbar for a description of this tool.
Note: The application owner can select specific fields in the application to be
tracked in the History Log. Therefore, changes might not be tracked for every field.
Also, you may not have access to all fields in an application. If you have not been
granted access to a field, changes to that field are not displayed for you in the
History Log.
Procedure
1. Open an existing record.
2. View the History Log section.
3. Select the one of the following formats for the log:
l Detailed. This format displays the initial entries and the respective
changes to a record. Detailed format provides you with the date and
time of each change, the name of the user who made the change,
and a field-by-field description of each change. Deleted items are
shown in red text with strike-through formatting, while additions to
a field are shown in blue text. You can sort the information in this
format by Date or User by clicking a linked column heading.
l Record Version. This format displays the last saved value for
each tracked field, allowing you to quickly compare the progression
of changes in a record. You can sort the information in this format
by Date, Name, or Tracked Field by clicking a linked column
heading.
4. On the View History Log page, click Compare Record Versions to compare a
previous version of the record to the current version.
The Platform sends you to a page on which you can compare the current record
with any logged version of the record.
5. Select the comparison version from the Compare Current Version field with
the drop-down list and click Continue.
The Platform displays the record View Detailed Version Format mode and
shows adds, edits, and deletes for tracked fields between the selected versions.
6. In the Format field, select a different display format to alter the display of the
comparison.
Note: The record comparison view displays all fields in View mode. However,
when you switch to a Detailed or Record Version format, only those fields that are
tracked by the History Log field are displayed.
You also can export and print the records from the View History Log. For
instructions, see:
l Export a Record
l Print a Record
Procedure
1. Open the record for which you want to track the completion status of a task
(update, patch, fix, and so on).
2. Locate the Cross-Application Status Tracking (CAST) field and click
View/Edit [Related Application Name].
The following example shows a CAST field related to the Vulnerabilities
application.
Procedure
1. View or edit a record in an application.
2. Click in the page toolbar.
The Platform sends an email with a link to the record in the body of the
message. You can send this email to whomever you choose, but only users who
can be authenticated by the system and who have read access to the record can
view it.
Note: If you send an email with a link to a record that is enrolled in the application's
formal content review process, the recipient of your email must be a content review
administrator, ad hoc editor, or content reviewer for the content review stage at
which the record resides. Otherwise, the recipient cannot access the record
because it is not yet published for all system users.
Exporting Records
There are two options for exporting a record: standard and mail merge.
Standard Method
In the standard method, you can export a record in any of the following formats.
File Description
Rich Text File Stores data in an RTF document as a Word table. The table is set
to "Automatic resize to fit content." The RTF document will
always fit to the width of one page. Also note that:
l If the width of a page is changed in Word (for example,
changing from Portrait to Landscape) the table is resized
automatically.
l If the file contains rows that are wider than the page, and a
compressed version would make the columns extremely small,
the right side of the report is truncated.
l If the file contains an HTML table with hard-coded widths
that extend beyond the width of the page, the report will be
truncated. To avoid this condition, define table widths as
percentages.
Use this export type when the exported file does not contain an
extended number of columns.
Adobe PDF Stores data in a PDF file. The content of this file is static, and
therefore cannot be resized after the document is created.
The content is rendered on multiple pages when a row extends
past the right margin. Columns are automatically sized so that a
column never expands multiple pages.
Use this export type when a record or report has a large number
of columns. The columns will not be truncated.
Microsoft Excel Stores data in an Excel spreadsheet. This export type does not
include the original formatting. The data will not look the same
as it does in the Platform.
Use this export type for performing computations, reporting or
charting data, or both when not possible in the Platform.
File Description
HTML File Renders the content as an HTML document. The width of each
column is hard-coded to a static value. The HTML file cannot be
resized after the document is created.
The document can be printed even though the number of columns
exceeds a single page. The document can be manipulated to fit
onto a single page by changing the page layout from Portrait to
Landscape and scaling the document as low as 30 percent.
Use this export type when sending content by email and viewing
content in a browser or in any application capable of rendering
an HTML document. This export type works well for printing
documents that have a small number of columns.
XML File Stores the data in an XML file. The XML structure is best for
complex hierarchical data.
Use this export type when the exported data contains complex
data, such as attachments, sub-forms, or cross-references. The
XML format is used for transferring data from the Platform to
another system.
Export a Record
Complete this task to export a record to an external data file using the standard
output file types.
In most cases, this feature exports what is displayed on the screen. Some
exceptions include Calendar, Card View, and Map formats, in which the data is
exported in column format.
Records containing trending charts must be exported before the trending chart is
displayed in a printed format.
Note: To use this Export a Record feature, you might need to change your browser
security settings to allow downloads and pop-ups for the Platform.
Procedure
1. Click in the page toolbar for an individual record or for multiple records in a
set of search results.
The Export Options dialog box opens, enabling you to select the format for the
export file.
Procedure
1. Click in the page toolbar for an individual record or for multiple records in a
set of search results.
The Export Options dialog box opens, enabling you to select the format for the
export file.
2. In the Export Template section, click the template that you want to use. The
Export Document dialog box is displayed.
3. In the Method field, select the applicable method: Run job immediately or
Run job and send email notification when finished.
4. Log on to the Platform and go to the email containing the link to the exported
file.
5. Do one of the following:
l Click the link to open the file. Save and name the document in Word.
l Right-click the link to save and name the file.
Print a Record
Complete this task to print a record.
Procedure
1. View an individual record or multiple records in a set of search results.
Note: Records containing trending charts must be exported before the trending
chart is displayed in a printed format. For more information, see Export a
Record.
Related Topics
Printing a Record
Execute Calculations
Calculations are executed either through administrative or user functions. A formula
executed from an administrative function runs in an asynchronous job. This job can
be queued to run during normal processing or scheduled to run at a specific time. A
formula executed from a user function is triggered from the Recalculate button in
View mode, or the Apply or Save button in Edit mode.
Procedure
1. View an existing record.
Recalculation Conditions
Calculated fields can be recalculated in View or Edit mode. To initiate an
immediate recalculation, a user must have update permissions to the record. When
initiated from either mode, only the content that is 'marked’ is recalculated.
Content changes may result in outstanding calculations in a related level or
application.
The recalculation can be initiated when content is actually changed or for content
that has a status of ‘marked’ for recalculation. All calculated fields are recalculated
immediately within the current content. All related content affected by the change
is 'marked' and queued for recalculations in an asynchronous job. When save or
apply updates calculated fields and there are no other user changes, notification are
not sent.
When 'marked' content is calculated asynchronously, only the fields associated with
the executed job are calculated. Notifications are never sent. Notifications are only
sent when a user saves a record.
Calculated fields are only recalculated based on changes made directly in a data
feed, data import, web API, or scheduled recalculation jobs.
Action 2 User with Read and Update permissions returns to Application A in Edit
mode and clicks Save.
Scenario Application A has three fields Risk, Criticality, and Severity. Rating is a
related record in Application B.
[Total Risk] is dependent on the value of [Criticality].
SUM(REF([Risk], [Criticality]))
[Severity] is dependent on [Rating].
IF([Rating]=10, VALUEOF ([Severity],"High"),VALUEOF ([Severity],
"Low")
Action 1 User changes the value of Critically in Application B and clicks Save.
Procedure
1. In the Navigation Menu, click the application.
A menu of options is displayed.
2. In the Navigation Menu, click My ApplicationName Assignments.
The My Assignments page is displayed with a list of records ready for your
review.
3. Click the record that you want to review.
The record is displayed along with the Workflow toolbar. The options available
on the Workflow toolbar may vary depending on the configuration of the
Workflow process.
4. Review the record and choose one of the available options in the Workflow
toolbar:
l To accept the record and move it to the next stage in the Workflow process,
click Accept.
l To reject the record and demote it to the previous stage in the Workflow
process, click Reject.
l To reject the record and leave a comment describing your decision, click
Comment.
Data Imports
The Data Import feature enables you to import records into an application,
questionnaire, or sub-form from an external data file. Importing data through the
Data Import feature rather than entering it manually can save you a lot of time, and
with good preparation, a data import can be completed quickly and easily.
File Formats
Your import file must be a flat, delimited-values data file. A flat file contains all
data in a single table and does not include any hierarchical structure. In a delimited-
values file, each row is equal to one record, and field values are separated in each
record by a comma, tab, or some other designated character. For more information
on file formats for data imports, see File Formats for Data Imports.
Important: If you are importing data that uses a double-byte character set, such as
Japanese, the alias of each field must be set to a single-byte character set, such as
English. To do this, open the Manage Field page for each field, and rename the
Alias field using single-byte characters.
Consider the following points as you examine your import file and the application
into which you are importing data:
l Your file must be a delimited-values data file, and because the Data Import
Wizard requires you to specify the primary and secondary delimiters used in your
data file, it is important to know what these characters are before you begin the
data import.
l Importing data into an application copies data from an import file into existing
application, questionnaire, or sub-form fields. It does not create any new fields.
Therefore, your application must contain all necessary fields before you begin
the import process. If you import sub-form records, the application to which you
import must contain a Sub-Form field. This Sub-Form field must reference a sub-
form that contains the appropriate fields.
l Mapping fields from your external data file to fields in your application is much
easier if the corresponding fields have the same name. The system automatically
maps import fields to application fields when they have the same name, which
can save you a great deal of time in manually mapping fields.
l If you map a field from your external data file to a required field, each record in
your data file must include a value for this required field.
l If your import file contains date or date-time values, you are asked to specify the
format used for these values. Your import file must use a consistent format for
date and time values, and you must know what these formats are before you
begin the Data Import Wizard. Also, if your import file contains date-time
values, take note of the separator (hyphen, period, comma, space, or so on)
between the date and time values and between the time and the AM/PM
designation.
l When importing data into a leveled application, you must import each level's data
separately, starting with the top data level. Each level must be imported from a
separate external data file.
l When importing data into an application that contains a sub-form, you must
import application records and sub-form entries separately. You need one
external data file for your application records and another for your sub-form
entries. The sub-form data file must contain unique field values from the
application records, such as Tracking ID values, so the sub-form entries can be
appropriately mapped to the application records where they will reside.
Alias Names
Numerous operations in the Platform require references to objects—everything
from solutions, applications, and fields to individual values list values—to specify
the target for a particular activity. One example is mail merge, in which you must
create templates with unambiguous references to individual fields in an application.
Another example is the process of mapping external data to fields in the Data Feed
Manager. To provide a constant name that is also human readable, all Platform
objects, such as workspaces, applications, fields, and notification templates, support
an alias.
An alias is a short name for a unique object in the system that is human readable,
but also can be used in code or as a reference in configuration processes. All alias
names must contain only alphanumeric characters, beginning with a letter and
containing no spaces. The maximum length is 40 characters.
An alias name must be unique in the entity type. The following are additional points
of consideration:
l Field aliases must be unique in the level.
l Values List Value aliases must be unique in a Values List.
l Level, Data Driven Event, Report, and Workflow Stage aliases must be unique
in an application.
You can edit the alias name for non-system provided entities. Alias name for
system-provided entities are read only.
CAUTION: Alias name are used in configuration processes, system processes, and
web service API integrations. Modification of the alias name can cause these
functions to fail.
Note: If you try to import each level by selecting specific columns of data to import
from a single master file, you have duplicate upper-level records and/or your lower-
level records are not associated with their parent records. You must use a separate
file for each level's data import.
Example
The following steps explain the process for importing data into a three-level
application:
1. Perform a new import or an import update of the level-1 field data.
2. Perform a new import or an import update of the level-2 field data. Your import
file must contain the level-2 field values along with unique values for a field in
level 1 of the application, such as the Tracking ID field. When you are mapping
values from your external data file to fields in your application in step 3 of the
Data Import Wizard, you map the level-2 data to the appropriate level-2 fields,
and you map the level-1 values to the appropriate level-1 field. This action
creates the association between level-1 and level-2 records.
3. Perform a new import or an import update of the level-3 field data. Your import
file must contain the level-3 field values along with unique values for a field in
level 2 of the application, such as the Tracking ID field. When you are mapping
values from your external data file to fields in your application in step 3 of the
Data Import Wizard, you map the level-3 data to the appropriate level-3 fields,
and you map the level-2 values to the appropriate level-2 field. This action
creates the association between level-2 and level-3 records.
The following field types are supported for sub-form data import:
l Cross Reference
l Date (unless the field is configured as a calculated field)
l IP Address
l Numeric (unless the field is configured as a calculated field)
l Text (unless the field is configured as a calculated field)
l User/Groups List
l Values List (unless the field is configured as a calculated field)
The following field types are not supported for data import:
l Attachment
l Discussion
l External Links
l First Published Date
l History Log
l Image
l Last Updated Date
l Multiple Reference Display Control
l Record Status
l Tracking ID
l Voting
Individual field types react differently when their content is modified through a data
import. Additionally, some fields require specific data formats for successful
imports. The following table provides information on data import results and data
requirements for various field types.
Cross CAST values can be specified only during an import update. If you are
Application adding additional field values rather than updating existing values with
Status your data import, this field is not available in the Application Fields
Tracking drop-down list on the second page of the Data Import Wizard. CAST
(CAST) values are specified in the target/child application. Because a CAST value
is specific to two different records, you must include unique identifiers for
both the parent and the child record.
Example
To update the Implementation Status of two vulnerabilities on 10 assets,
you need 20 rows of data. You need the asset identifier, for example, IP
Address or Asset Name, the vulnerability identifier, for example, BugTraq
ID, and a status value, for example, Implemented.
Cross- The values that you import into a Cross-Reference field must be key-field
Reference values for the related application. If you import values that are not key-
field values for the related application, the data importer cannot link
records in the import application to records in the cross-referenced
application.
Matrix When importing data into this field type, you must specify the column
name and corresponding row value for each column in the Matrix field.
Column names are separated from row values with a comma, and a
semicolon is used to separate column and row pairs.
The following is an example of an import value for a Matrix field:
Maintenance Burden, Low; Portability, Medium; Power Consumption,
High
Consumption" are column names, and "Low," "Medium," and "High" are
the corresponding row values.
Note: If you import a Matrix value that contains a column or row value
that does not display in the application's Matrix field, that column or row
is added to the Matrix field. If you do not want additional columns or
rows to be added to your Matrix field during a data import, ensure that
your external data file only includes Matrix values that appear in your
application's Matrix field.
Numeric If the application with which you are working has a ranged Numeric
field, and you import values that are outside of the field's defined ranges,
records with these values are not returned when users execute advanced
searches in the application using numeric-range filters.
Also, if you import numeric values that exceed your Numeric field's
maximum number of decimal places, the values are rounded off to meet
the field's requirements. If you import values with fewer decimal places
than the minimum number of decimal places allowed in the Numeric
field, these values are padded with zeros, for example, 4.22000.
In addition, if you import values that are above or below the Numeric
field's minimum and maximum values, an error is reported.
Record If you import an empty value into a Record Permissions field, the field is
Permissions empty in the new or updated record, even if the field is configured with
one or more default values. When no value is selected in the Record
Permissions field, the only users who have access to the record are those
who are assigned the System Administrator access role, and those who are
assigned as owners of the application.
Sub-Form A Sub-Form field can be active or inactive during the import process;
however, the actual sub-form storing the data from the data import must
be active.
Text This field is updated regardless of the content of your data import.
Values List If you import a value into a Values List field that is not included in the
field's values list, the value is added to the values list. If the values list is
global, the imported value is displayed in the global values list for all
fields configured to use it.
Note: Importing a record with all of the values that you want your values
list to include is an easy way to add those values to the list.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Note: You can also access the Data Import Wizard from the Navigation Menu of an
application, if your account has been granted appropriate privileges. If the
application contains levels or sub-forms, the Platform prompts you to select the
level or sub-form before the wizard starts.
Procedure
1. Navigate to the Manage Data Imports page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Integration.
A menu of Integration pages is displayed.
c. Click Manage Data Imports.
This page enables you to import data to applications and questionnaires for
which you have ownership rights.
2. In the Name column, locate and click the name link for the application,
questionnaire, or sub-form that you want to receive the data import.
The Data Import Wizard opens.
Next Steps
Select the Data File and Import Options
Procedure
1. Click Browse to select the source file for the data that you want to import. The
file that you select must be a flat, delimited-values file. Additionally, verify that
the source file is closed.
Note: If you make changes to the source file after you have uploaded it to the
Data Import Wizard, you must return to this step and upload the file again
before initiating the data validation and import process.
2. In the Format Options section, select the characters that your data file uses as
its Field and Values Delimiters. If your data file's Field Delimiter is something
other than a comma or a tab, enter the correct character in the Other field.
Likewise, if your Values Delimiter is something other than a semicolon or pipe
(|), enter the correct character in the Other field.
3. In the Locale field, select the locale of the input file.
4. If the first row of data in your file contains field names instead of actual record
data, select File Contains Header Row in the Header Row field. If the first
row of data in your file contains actual record data, select File Does Not
Contain Header Row in the Header Row field.
5. In the HTML Formatting field, indicate whether fields in your data file contain
HTML formatting.
6. In the Advanced Options section, make selection for the following fields:
l Are any field values quoted in your data file? If the answer is yes, select
the double quotes or single quotes option.
l Should imported records be allowed to trigger notifications? If
notifications are enabled for the application into which you are importing
data, you can select to send notifications for your imported records.
Important: Consider this option carefully. If you are importing a large
number of records, triggering a notification email for each of these records
could produce a heavy load on the email accounts of users who are
subscribed to a notification template for the application.
leaves all existing values in the record intact and adds new cross-reference
values from the data file to the records.
7. Click Next.
Note: Be certain that you have selected the source file (see step 1) so that you
can advance to the next window of the Data Import Wizard.
Next Steps
Select Unique Record Identifiers
Note: The Tracking ID field can only be used as a unique identifier if configured as
System ID. If configured as Application ID, it is not available for use as a unique
identifier.
By establishing a unique identifier, the Data Import Wizard maps import data to
existing data in the application. If you are updating application records with your
data import, the unique identifier matches records in your import file with existing
records in the application. If you are importing data into a sub-form, the unique
identifier correctly matches your sub-form entries to their parent application
records.
The steps for selecting unique record identifiers vary depending on the type of data
import you are performing.
Procedure
1. On page 2 of the Data Import Wizard, in the General Information section,
select one of the following options:
l Import New Records. If you are importing new records, existing records in
your application remain unchanged. The new records are added to the
existing population of records in the application.
l Update Existing Records. If you are updating existing records, the system
examines your existing records and, when it finds a match between a record
in your application and a record in your external data file, the existing record
is updated with the imported record. If your external data file contains
records that do not match any records in your application (according to the
unique record identifier that you specify), those unmatched records are added
as new records in your application.
2. If you are updating existing records with your data import, do the following:
Next Steps
Map Import Data to Application Fields
Procedure
1. For each field in the Import Fields row, select the corresponding field in the
Application Fields row from the lists. This allows you to map data from your
import file to the appropriate fields in your application or sub-form. If you do not
want to import one or more columns of data from your import file, select Do
Not Import from the list in those columns.
Note: If you are updating existing records or importing sub-form entries, you
must map the field that you selected as a unique identifier to the appropriate
field in the field mapping grid. Otherwise, an error message is displayed. For
more information on unique identifiers, see Select Unique Record Identifiers.
Additionally, import values for a Cross-Reference field must be key field values
for the cross-referenced application. If the values are not key field values, the
importer cannot link the records.
2. If you have mapped a Date field in the import file to a Date field in the
application, specify the format for date and time values in the import file.
The format for these values in the import file must be consistent. The examples
to the right of the date and time drop-down lists update according to the
selections that you make, enabling you to verify your choices.
3. Click Next.
Next Steps
Review Data Import Wizard Settings
Procedure
1. On page 3 of the Data Import Wizard, review the data import settings.
2. To change any of the settings, click Previous to return to the appropriate Data
Import Wizard page. For more information on a particular page, see the Help
content for that page.
Next Steps
Initiate Data Validation and Import
Procedure
1. When you are satisfied with the Data Import Wizard settings, click Import to
initiate the validation and import of your data.
Once you click Import, the system begins a three-stage import process:
l Validating Records
l Building the Import File
l Importing/Updating Records
In the Validating Records stage, each record in your data file is examined for
errors. If you click Cancel during the Validating Records stage, your data
import is aborted. When the Validating Records stage completes, the Data
Import Wizard reports any errors that are found, up to the first 100 errors. If
errors are found, the import process terminates, and you must correct these
errors before attempting to import the records again.
2. If necessary, correct errors, and begin the import process again (starting on the
first page of the Data Import Wizard).
For more information on correcting errors, see Data Validation Errors.
If no errors are found in the Validating Records stage, the system continues
with the Building the Import File stage, where your import file is built record by
record. During this stage, you can abort the import by clicking Cancel.
Important: You must not close this window or log off from the system during
this stage of the import process. Doing so causes adverse results.
Note: Invalid HTML or XML characters in the external data file are stripped
from the data during the import process to prevent import errors.
The Overall Import Status message provides a link to this external .csv file.
Once you have corrected the problems that prevented these records from being
imported, you can attempt to import these records again.
3. Once the import is completed successfully, click Continue.
All unique identifiers must be If you are importing new sub-form records, you must
mapped for insert map the fields that you selected to serve as the
application's unique identifier to those fields in the
field mapping grid.
All unique identifiers must be If you are updating existing master or sub-form records,
mapped for update you must map the field that you selected to serve as the
application's unique identifier to that field in the field
mapping grid.
Column mismatch Your external data file contains a value that does not
match the data type of the field to which the value is
mapped. For example, the value might be a text string
while the field that you are attempting to import the
value into only accepts date values. To correct this
problem, change the value in your data file to match
the data type required by the field to which you are
mapping the value.
Could not locate group name This error can occur if your external data file contains a
group value that is not a group value established in the
system. To correct this problem, either change the
group value in your data file so it matches a group in
the system, or add the group from your data file to the
system from the Manage Groups page in the Access
Control feature.
Date does not match expected Your external data file contains a date that does not
format match the date format that you specified for the import.
To correct this problem, reformat the date value so it
matches the format that you selected in the Data Import
Wizard.
Field is required Your external data file is missing one or more values
for a required field. You can resolve this problem by
entering the required values in your import file or by
changing the field in your application so it is no longer
a required field.
Field requires a selected value Your external data file is missing a value for a Values
List field that requires a selected value. To correct this
problem, enter the required value in your data file or
change the field in your application so it no longer
requires a certain number of value selections.
Imported sub-form record This error can occur if you are importing sub-form data,
cannot have multiple parents and the field from the parent record that you selected as
the unique identifier contains non-unique data. To
correct this problem, select a unique field value from
the parent record to serve as the application's unique
record identifier.
Invalid key or keys for cross This error can occur if you are updating records with a
application status field for Cross-Application Status Tracking (CAST) field and
application you do not specify valid, unique identifiers for the
parent-application and child-application records
associated with the CAST field. To correct this
problem, see the Cross-Application Status Tracking
Invalid matrix format Your external data file contains a value for a Matrix
field that is not formatted correctly. To correct this
problem, reformat the value according to the guidelines
in the Matrix entry in Field Types for Data Imports.
Invalid number This error can occur if you are importing a value into a
Numeric field that contains alphabetic characters. To
correct this problem, change the value in your external
data file so it contains only numeric characters.
Invalid tracking ID This error can occur if you are doing an import update,
and the Tracking ID field in your external data file
contains a value that is not a valid tracking ID for the
application into which you are importing. The tracking
ID value may not exist in the system, or it may be a
valid tracking ID for another application. To correct
this problem, change the value in your data file so it is
a valid, unique tracking ID for the import application.
Multiple columns are mapped This error can occur if more than one field from your
to the same field data import file is mapped to the same application field.
If you are performing a sub-form data import, a field
from your data import file may be mapped to the same
field as the parent record. To correct this problem, make
sure that your application fields are mapped to different
fields and that the import data fields are mapped to the
sub-form fields.
Number is larger than This error can occur if you are importing a value into a
maximum value Numeric field that is above the maximum value
allowed for the field. To correct this problem, examine
the Numeric field in your application to determine the
maximum value it allow and change the value in your
data file, so it falls at or below that maximum value.
Number is smaller than This error can occur if you are importing a value into a
minimum value Numeric field that is below the minimum value
allowed for the field. To correct this problem, examine
the Numeric field in your application to determine the
minimum value it allows and change the value in your
data file, so it falls at or above that minimum value.
Too many cross references This error can occur if a record in your external data
selected file contains more values for a Cross-Reference field
than the maximum number of value selections that field
allows. To correct this problem, examine the Cross-
Reference field in your application to determine how
many values can be selected for the field, and then
reduce the number of values in your data file so they fit
within that limit.
If the number of values selected in your data file does
not exceed the value limit for your Cross-Reference
field, this error can also occur if the key field for the
cross-referenced application is not unique and your
Cross-Reference field maps to one of the non-unique
values. To correct this, verify that the key field of the
cross-referenced application is unique.
Unsupported import type This error can occur if you are importing new records
and attempt to import data into a Tracking ID field. To
correct this problem, select Do Not Import from the list
for the Tracking ID field in the field mapping grid.
Unsupported link type This error can occur if you are updating records with
your data import and you select a field type for the key
field that cannot serve as the key field for a record.
Examples of field types that cannot serve as the key
field for a record include First Published Date, Last
Updated Date, Record Status, and Related Records. To
correct this problem, select a field type for the key field
that can serve as the key field for a record.
Cross Application CAST values can be specified only during an import update.
Status Tracking (CAST) If you are adding additional field values rather than updating
existing values with your data import, this field is not
available in the Application Fields drop-down list on the
second page of the Data Import Wizard. CAST values are
specified in the target/child application. Because a CAST
value is specific to two different records, you must include
unique identifiers for both the parent and the child record.
Example
To update the Implementation Status of two vulnerabilities
on 10 assets, you need 20 rows of data. You need the asset
identifier, for example, IP Address or Asset Name, the
vulnerability identifier, for example, BugTraq ID, and a status
value, for example, Implemented.
Cross-Reference The values that you import into a Cross-Reference field must
be key-field values for the related application. If you import
values that are not key-field values for the related
application, the data importer cannot link records in the
import application to records in the cross-referenced
application.
Matrix When importing data into this field type, you must specify
the column name and corresponding row value for each
column in the Matrix field. Column names are separated from
row values with a comma, and a semicolon is used to
separate column and row pairs.
The following is an example of an import value for a Matrix
field:
Maintenance Burden, Low; Portability, Medium; Power
Consumption, High
Numeric If the application with which you are working has a ranged
Numeric field, and you import values that are outside of the
field's defined ranges, records with these values are not
returned when users execute advanced searches in the
application using numeric-range filters.
Also, if you import numeric values that exceed your Numeric
field's maximum number of decimal places, the values are
rounded off to meet the field's requirements. If you import
values with fewer decimal places than the minimum number
of decimal places allowed in the Numeric field, these values
are padded with zeros, for example, 4.22000.
In addition, if you import values that are above or below the
Numeric field's minimum and maximum values, an error is
reported.
Record Permissions If you import an empty value into a Record Permissions field,
the field is empty in the new or updated record, even if the
field is configured with one or more default values. When no
value is selected in the Record Permissions field, the only
users who have access to the record are those who are
assigned the System Administrator access role, and those who
are assigned as owners of the application.
User/Groups List Users are identified using following format: last_name, first_
name middle_name. Groups are identified by their name. If
there is more than one user or group with the same value
(name), the first one (based on the system ID) is used.
Multiple values are separated with the secondary delimiter
specified on the first page of the Data Import Wizard.
If you try to import a user or group that is not a valid
selection among the User/Groups List field values list, an
error is reported.
If you import an empty value into the User/Groups List field,
the field is empty in the new or updated record, even if the
field is configured with one or more default values.
Values List If you import a value into a Values List field that is not
included in the field's values list, the value is added to the
values list. If the values list is global, the imported value is
displayed in the global values list for all fields configured to
use it.
Questionnaire Records
Questionnaire records are designed to assess compliance against an internal control
or a regulatory requirement. If you are responsible for managing a business process,
technical asset, vendor relationship, or some other organizational object, you may
be asked to fill out a questionnaire record.
For instructions on how to complete the questionnaire record, see Fill Out a
Questionnaire Record.
Question Formats
When you fill out a questionnaire, you may be presented with questions in any of
the following formats:
l Attachment. This question type allows you to upload documents or images to
provide supporting information or evidence.
l Cross-Reference. This question type enables you to associate the questionnaire
record you are filling out with records from another application or questionnaire.
For example, you could answer the question "Who is responsible for monitoring
the security of the server room?" by selecting a user from your related Contacts
application.
l Date. This question type allows you to enter or select a date value.
l Numeric. This question type enables you to enter positive or negative numeric
values.
l Text. This question type allows you to provide a free-form response.
l Values List. This question type allows you to select from a predefined list of
answers.
Procedure
1. Do one of the following:
l To create a questionnaire record from the Navigation Menu, click to expand
the questionnaire branch and click Add New.
l To create a record from the Search Results page for a given questionnaire or
from an existing record, click in the toolbar.
The Add New Record dialog box opens.
2. In the Add New Record dialog box, click and select the record from the
target application that you want to assess through the questionnaire record.
3. Click OK.
The record name is displayed in the Target field.
4. Click Apply.
A new questionnaire record opens.
Procedure
1. Access the questionnaire record in one of the following ways:
l If you received the questionnaire as an email attachment, click the link
provided in the email.
l From the target record. For example, if you are the asset administrator for
your organization's accounting application, you may be able to access the
questionnaire record for that server from the "Accounting Application"
record in your Assets application.
l From the Navigation Menu, expand the questionnaire, click Display All and
locate your assignment on the Search Results page.
2. Review the instructions listed in the Instructions section. These instructions
describe four steps:
l Answer questions.
l Add comments.
l Change the status.
l Save or Exit the questionnaire.
3. Complete the appropriate fields in the General Information section.
4. Answer the questions provided in the questionnaire.
Note: When a comment has been added to a question, the Comment icon
changes from to .
Procedure
1. Review the submitted answers for accuracy. If you notice any errors or find an
answer that is not supported with sufficient documentation, do one of the
following:
l Click next to the question to attach a comment describing the error.
This enables the original submitter to understand what steps need to be taken
so that the questionnaire record can be approved.
l Correct the answer.
Note: When a comment has been added to a question, the Comment icon
changes from to .
Tasks
Many business processes that are automated using the Platform require the ability to
create, assign, and manage the tasks of various users. To assist you with these
activities, the Platform includes a Task Management application. Through the Task
Management application, you easily can track and manage open and completed
activities associated with specific content records and regulate the manner in which
task management activities are implemented across your solutions. Administrators
can select to enable task management capabilities for any application in the
Platform.
When task management capabilities are enabled for an application, tasks related to
content records in that application are tracked and logged in a Related Records field
called Open Tasks/Activities. In addition to viewing tasks in a content record, your
administrator also can enable the My Tasks iView. This Report iView allows you
to select reports detailing tasks that have been assigned to you.
For example, using Task Management, a risk manager can create assignments to
correct an assessment finding. The assigned individual can view all assigned
remediation tasks in the My Tasks iView. As the remediation progresses, the
original risk manager can track the completion status of all remediation tasks by
viewing a single content record or running a search on a group of findings.
You can access the Task Management application from an application that has been
enabled with task management capabilities. For example, if you are reviewing a
Password Requirements record in the Policy Exception application and task
management capabilities have been enabled, you can click Add New in the Open
Tasks/Activities field to create and assign a task associated for that specific content
record.
You can perform the following Task Management tasks:
l Create and Assign a Task
l View Tasks Associated with a Record
l View Your Tasks
l Complete a Task
The Task Management application centralizes all tasks and activities, enabling end
users and administrators to view detailed reports describing the status of open tasks
and a history of completed tasks.
If an administrator has enabled Task Management for an application, the Platform
displays a Related Records field named Open Tasks/Activities in the application's
content records.
Procedure
1. Open a content record in an application that has been enabled with Task
Management capabilities.
2. In the application's content record, click Add New in the Open
Tasks/Activities field to open a new Task Management record.
3. From the Subject list, select the value that best describes the type of task you
are assigning.
4. From the Priority list, select the value that best describes the priority level for
this task.
5. In the Due Date field, enter the date by which the task should be completed or
select the date by clicking .
6. From the Status list, select Not Started.
7. From the Related To list, select the application with which this task is
associated and select the content record that this task is associated with.
8. In the Assigned To field, assign a user to complete the task.
9. In the Description field, enter a detailed description of the task that needs to be
completed.
10. Click Save to assign the task record to the designated user.
Next Steps
View Tasks Associated with a Record
Procedure
1. Open a content record in an application that has been enabled with task
management capabilities.
2. In the Open Tasks/Activities or Closed Tasks section, select the task that you
want to view.
The Task record opens in View mode.
Next Steps
View Your Tasks
Procedure
1. Navigate to a workspace that displays the My Tasks iView.
2. In the My Tasks iView, select one of the available reports from the Display
list.
3. From the report, select the task that you want to view.
The Task record opens in View mode.
Next Steps
Complete a Task
Complete a Task
Complete this task to document the resolution of an assignment. You must update
the task status, enter the completion date for the task, and describe the steps taken
to complete the task.
Procedure
1. Do one of the following to open a task record:
l If Task Management is enabled for an application, select the record that
contains the task and from the Open Tasks/Activities, Related Records
field, select the desired task.
l In the My Tasks iView, select Current Tasks from the Display list and
select the desired task.
2. Click to edit the record.
3. From the Status list, select Complete or Deferred.
These values close the task.
4. In the Completion Date field, enter the date the task was finished, or select the
date by clicking .
5. If the task was deferred to another user, click in the Delegates field to
select that user.
6. In the Resolution field, enter a detailed description of how the task was
resolved.
7. Review your content for clarity and accuracy and click Save to complete the
task.
The task is displayed in the Activity History field on the related content record.
Discussion Forums
A discussion forum is a structured, secure environment where you can participate in
focused conversations with other application users. Discussion forums are a good
place to ask questions, share opinions, offer solutions, and explore new ideas. When
you post a message to a discussion forum, the message is immediately available to
other forum members, and the message remains displayed in the forum until the
forum administrator archives or deletes it.
You can access discussion forums from the end-user Discussion Forums feature
within the Navigation Menu. If an application administrator has included a
Discussion field within an application, you can also access content-specific
discussion forums within individual records. For example, if you are reviewing a
Password Requirements record in the Policies application, you could click the View
Forum link in the Discussion field to discuss changes to the record with other policy
administrators.
Forums that you access through the Navigation Menu are organized into discussion
communities by subject or theme. A single community can contain any number of
forums; however, you can only view forums for which you have been enrolled as a
member.
As a discussion forum member, you are assigned a role that determines your rights
within the forum. Depending on the role your discussion forum administrator has
assigned to you for a particular forum, you may have rights to:
l Read posts
l Post replies to existing topics
l Post new topics
l Delete your own posts
l Edit posts belonging to others
l Delete posts belonging to others
l Add users or groups to the forum and assign roles to them
l Remove forum access for existing users and groups
l Manage forum properties
l Merge topics (threads) within a forum
Icon Description
This discussion forum or topic is locked, and you have read all posts
in it.
Term Definition
Community Administrator This is a user who has been granted the rights to view,
edit, and delete all forums in a selected community,
regardless of whether the user has been enrolled as a
member of those forums. Discussion community
administrators also can add new forums in their assigned
communities.
Term Definition
Locked Topic When a topic is locked, users are not permitted to reply to
it. The topic and its previous replies, however, remain
visible to users. Locked topics can be unlocked at any
time by users who have the proper rights.
Term Definition
Thread A single topic and all of its related replies. The topic-
directed discussion that occurs in a forum is thought of as
"threaded" because you can trace the path of information
from the original topic down through all of its reply
postings.
Procedure
1. Navigate to the Discussion Community Listing page:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
b. In the Navigation Menu, expand that solution.
c. Click Discussion Forums to expand the menu.
This menu lists the available discussion communities and includes links to
Communities and Preferences.
d. Click Communities.
The Discussion Community Listing page is displayed. This page lists the
discussion forum communities that contain at least one forum of which you
are a member.
2. To view discussion forums within a community, click the community name.
The Forums page is displayed. For more information on this page, see Explore
the Discussion Forums Listing.
Procedure
1. Navigate to the Manage Discussion Forums page:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
This menu lists the available discussion communities and includes links to
Communities and Preferences.
d. Click the discussion community that contains the forum that you want to
manage.
The Forums page is displayed with a list of existing forums within the
community.
e. Click the forum that you want to manage.
The Forum page is displayed for the selected forum.
2. To add a new topic, click Add New in the toolbar.
The New Message dialog box opens.
3. To reply to an existing post:
a. Click the post that you want to reply to.
The message is displayed in the Message section.
b. Click Reply in the toolbar of the Message section.
The Reply To dialog box opens.
4. In the Subject field, enter a title for your post.
If you are replying to an existing post, this field is prepopulated with "Re: [post
name]," but you can change this title as needed.
5. (Optional) If the forum creator has enabled you to post anonymously in the
forum, select the Post this message as Anonymous option to the right of the
Subject field to conceal your identity.
6. In the Body field, enter and edit the content of your message.
You can format the text that you enter using the Rich Text Editor toolbar at the
top of the page.
7. To add attachments to the message, click Add in the Attachments section and
select the files in the Upload dialog box.
8. To subscribe to the forum and receive an email message when a new topic is
posted, select one of the options in the Subscribe field.
9. To bookmark the topic, select the option in the Bookmark field.
10. Click Save.
Note: If this option is not available, you do not have appropriate rights to edit the
post.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Note: If this option is not available, you do not have appropriate rights to delete
the post.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Note: The recipient must have proper access rights to display the link.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
d. Click the discussion community that contains the forum that you want to
manage.
The Forums page is displayed with a list of existing forums within the
community.
e. Click the forum that you want to manage.
The Forum page is displayed for the selected forum.
2. Click the post that you want to print.
The message is displayed in the Message section.
3. In the Message section, click the Options menu and click Print this post or
Print this topic.
A dialog box opens with the parameters of the print job.
4. Select the appropriate print options and click Print.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
2. Click .
The Export Options dialog box opens.
3. Select the file format option.
The File Download dialog box opens.
4. Click Save.
5. Specify a location for the file and click Save.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Note: If the Lock this Topic checkbox is not available, you do not have
appropriate rights to lock or unlock the topic.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Note: If a large number of posts display on the Forum Search Results page, you
can sort the display of posts by clicking a subject or date/time sort option in the
Sort By list at the top of the page.
Bookmark a Topic
Complete this task to bookmark topics in the forum, creating a list of Favorites that
you can quickly access again.
Your bookmarks are stored on the Manage Discussion Forum Bookmarks page, and
from this page, you can open any bookmarked topic or delete a bookmark.
For information on subscribing to a discussion forum so you can receive email alerts
when new posts are made, see Manage Discussion Forum Subscriptions.
Procedure
1. Select the topic that you want to bookmark:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
Procedure
1. Select the discussion forum that you want to manage:
a. Click a workspace that contains a solution that includes the Discussion
Forums feature.
The Forums page is displayed with a list of existing forums within the
community.
e. Click the forum that you want to manage.
The Forum page is displayed for the selected forum.
2. In the Message section, click the Options menu, point to Personal Options and
select one of the following options:
l Subscribe to all posts in the Forum. When you subscribe to a forum, you
receive an email each time a user posts a message within any of the forum's
topics.
l Subscribe to all posts in this Topic. When you subscribe to a topic, you
receive an email each time a reply is posted anywhere within the topic
thread.
l Subscribe to this Post. When you subscribe to an individual post within a
topic thread, you will receive an email when any forum member replies to
that post.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Sub-Forms
Contents
Preface 5
About this Guide 5
Product Documentation 6
Support and Service 6
Chapter 1: Sub-Forms 9
Create a Sub-Form 9
Create a Sub-Form within an Application 9
Change the Status of a Sub-Form 10
Set the Design Language for a Sub-Form 11
Attach Documentation to a Sub-Form 11
Remove Documentation from a Sub-Form 12
Add a Field to a Sub-Form 13
Assign Sub-Form Owners 14
Delete a Sub-Form 15
Chapter 2: Sub-Form Layout 17
Customizing a Sub-Form's Layout 17
Add Sections to a Sub-Form's Layout 17
Create Tabbed Groupings of Fields in a Sub-Form 19
Manage the Visibility Properties of a Field in a Sub-Form 20
Add Text Boxes to a Sub-Form's Layout 21
Add Placeholders to a Sub-Form's Layout 22
Add Custom Objects to a Sub-Form's Layout 23
Arrange Elements in a Sub-Form's Layout 24
Chapter 3: Reports 27
Sub-Form Reports 27
3
RSA Archer GRC Platform Sub-Forms
Preface
Preface 5
RSA Archer GRC Platform Sub-Forms
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
6 Preface
RSA Archer GRC Platform Sub-Forms
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 7
RSA Archer GRC Platform Sub-Forms
Chapter 1: Sub-Forms
Create a Sub-Form
You can create a sub-form to include in an application using the Manage Sub-Forms
page. You can create an original sub-form, or you can create a sub-form by copying
and modifying the properties of an existing one. If you select to copy a sub-form,
your new sub-form contains all of the fields and structural components of the copied
sub-form, but it does not include any attachment files or sub-form entries.
Procedure
1. Navigate to the Manage Sub-Forms page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
2. Click Add New.
3. Do one of the following:
l To create a new sub-form, select Create a New Sub-Form from scratch
and click OK.
l To copy an existing sub-form, select Copy an existing Sub-Form, select the
sub-form that you want to copy from the list and click OK.
4. In the Name box, enter a name for the sub-form and click OK.
Next Steps
Change the Status of a Sub-Form
Chapter 1: Sub-Forms 9
RSA Archer GRC Platform Sub-Forms
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
6. In the Sub-Form field, click , select the predefined sub-form that you want
to embed in the application and click OK.
7. Click the Options tab and select any additional options that you want to apply to
the field.
On this tab, there is a variety of options for the display, status, and search
functionality of the Sub-Form field.
8. (Optional) Click the Help Text tab and add field-level Help to provide users
with guidance on how they should interact with the field.
9. On the Access tab, set the Sub-Form field to Public or Private.
10. Click Save.
10 Chapter 1: Sub-Forms
RSA Archer GRC Platform Sub-Forms
Note: Data stored in a sub-form is not deleted when the sub-form is inactivated. It
is hidden from view until the sub-form and the corresponding Sub-Form field are
reactivated.
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
2. In the Status field on the General tab, select the status for the sub-form, Active
or Inactive.
Next Steps
Attach Documentation to a Sub-Form
Procedure
1. Click Administration > Application Builder > Manage Sub-Forms.
2. Select a sub-form.
3. In the General tab > Options section, select the design language in the
Language field.
4. Click Apply.
Chapter 1: Sub-Forms 11
RSA Archer GRC Platform Sub-Forms
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
Next Steps
Add a Field to a Sub-Form
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
2. In the Documentation section on the General tab, locate the file that you want
to remove from the sub-form and click in its row.
12 Chapter 1: Sub-Forms
RSA Archer GRC Platform Sub-Forms
Note: To protect data integrity, the application prohibits field type changes, for
example, you cannot change a Date field to a Text field, once a field has been
created.
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
Next Steps
Customize a Sub-Form's Layout
Chapter 1: Sub-Forms 13
RSA Archer GRC Platform Sub-Forms
If you have been assigned as a sub-form owner for one or more sub-forms, you can
open those sub-forms for editing from the Manage Sub-Forms page. If no users have
been assigned ownership for a sub-form, only users who have been granted the
System Administrator access role can open the sub-form for editing.
Note: If you create a new sub-form, you are automatically granted ownership rights
to that sub-form. However, your rights can be revoked by any other user who is
subsequently granted ownership of the sub-form.
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
14 Chapter 1: Sub-Forms
RSA Archer GRC Platform Sub-Forms
To search for a specific name, in the Find field, enter the name and (if
applicable) select the type from the adjacent list and click Search. The results
of your search are displayed in the Search Results node in the Available list.
5. Click Apply.
Next Steps
Create a Sub-Form Field within an Application
Delete a Sub-Form
If you have delete permissions to the Manage Sub-Forms page, you can delete sub-
forms for which you have ownership rights.
Important: Extreme caution should be taken when deleting sub-forms because once
a sub-form is deleted, all data in that sub-form are lost permanently.
Note: Sub-forms that are referenced by Sub-Form fields in applications may not be
deleted. To delete a sub-form, you must first delete the Sub-Form fields that are
referencing the sub-form. To view the Sub-Form fields that are referencing a given
sub-form, navigate to the Manage Sub-Forms page of that sub-form, and review the
Related Applications section on the General tab.
Procedure
1. Navigate to the Manage Sub-Forms page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
2. Click to select the row of the sub-form that you want to delete.
Chapter 1: Sub-Forms 15
RSA Archer GRC Platform Sub-Forms
Next Steps
Assign Sub-Form Owners
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
Note: If a user does not have access to any of the fields on a tab, the tab is not
displayed when the user adds or edits records within the sub-form.
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
Note: The default tab is displayed first for users when they add or edit
records in the application. It does not have to be the left-most tab. If a user
does not have access to any of the fields on the default tab, the default tab is
not displayed and the tab with the application’s key field is displayed instead
as the default.
d. Click OK.
8. To add fields to a tab, use the drag-and-drop feature on the Layout page to
arrange the fields until they are displayed in the correct order.
Note: Before you can add fields to a tab, you must first add a section to a tab.
9. To delete a tab, click the arrow to the right of the tab and select Delete Tab.
Important: To delete a tab, you first must remove all tabs, sections, fields, and
objects contained in the tab .
10. To delete a tab set, click the arrow to the right of the title that you want to
delete and select Delete Tab Set.
Important: To delete a tab set, you first must remove all tabs, sections, fields,
and objects contained in the tab set.
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
6. In the Text field, enter the text that you want to show in the text box when it is
displayed for users as they interact with the sub-form in an application.
For example, you could provide instructions, definitions of new terms or
background information to help users understand a particular process. The
following example shows a text box arranged among fields in a sub-form.
7. Select one of the following options to use to display the text box for users as
they interact with the sub-form in an application:
l Edit Mode. Display for users as they add and edit records in the sub-form.
l View Mode. Display for users when they view saved records in the sub-
form.
8. Click OK.
9. Click Apply.
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
8. In the Display field, select one of the following methods to use to display the
object for users as they add and edit records in the application:
l Edit Mode. Display the custom object when editing a record.
l View Mode. Display the custom object when viewing a record.
l Both. Display the custom object when viewing or editing a record.
9. Click OK.
10. Click Apply.
Procedure
1. Select the sub-form that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder > Manage Sub-Forms.
c. In the Sub-Form Name column, click the sub-form.
Note: If the sub-form name is not linked, you cannot edit the sub-form.
Do Not Span Columns. The Do Not Span Rows. The element consumes
element will consume only one only one row of space.
column of space.
Span Two Columns. The Span. The element consumes the number of
element will always span across rows you select from the Rows spin box.
the columns. If you change the
application's column settings to
two columns, the element will
then span two columns.
l Remove an Element from the Layout. To remove a field, section, text box,
placeholder, or custom object from the sub-form layout, click the element and
drag it to the Available Fields list. The element is not deleted; however,
users cannot see it when they interact with the sub-form in an application.
Note: Leaving a field in the Available Fields list rather than arranging it in
the sub-form's layout can be useful if you want the field to remain active but
you do not want it exposed to users. For example, you may have a system
field that is referenced in a formula for a calculated field. It would be
important for the field to remain active so the system can continue to
populate the field’s value and use those values in calculations, but you might
want to hide the field from view for end users.
Important: If you delete a field, all record data stored in that field is lost. The
only exceptions to this are system field types (Tracking ID, First Published
Date, Last Updated Date, and Record Status). If you delete a system field
type, data previously stored in the field is maintained in the database, and the
system continues to populate the field in new and updated records, even
though that data is not visible through the user interface.
4. Click Apply.
Chapter 3: Reports
Sub-Form Reports
A Sub-Form Detail Report is available for each sub-form in the Platform. You can
access these reports by clicking on the Manage Sub-Forms page.
For each field within the sub-form, the following general information is provided:
l Field Name
l Field ID
l Field Type
l Status
l Description
l Display Control
l Field Permissions
Chapter 3: Reports 27
RSA Archer GRC Platform 5.4
Training and Awareness
June 2013
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm.
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and EMC are either registered trademarks or trademarks of EMC
Corporation ("EMC") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This
software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Training and Awareness
Contents
Preface 5
About this Guide 5
Product Documentation 7
Support and Service 7
Chapter 1: About Training and Awareness 9
Training and Awareness Terminology 9
Chapter 2: Campaigns 11
Managing Training and Awareness Campaigns 11
Sample Training and Awareness Campaign 11
Create a Training and Awareness Campaign 11
Delete a Training and Awareness Campaign 12
Chapter 3: Presentation Events 15
Managing Presentation Events 15
Create a Presentation Event 15
Update General Information for a Presentation Event 16
Define the Content of a Presentation Event 17
Select Delivery Options for an Email Presentation Event 18
Select Delivery Options for a Prompt Presentation Event 19
Select Recipients for a Presentation Event 20
Delete an Event 21
Chapter 4: Acceptance Events 23
Managing Acceptance Events 23
Create an Acceptance Event 23
Update General Information for an Acceptance Event 24
Define the Content of an Acceptance Event 25
Select Delivery Options for an Acceptance Event 26
Select Recipients for an Acceptance Event 27
Delete an Event 28
Chapter 5: Quiz Events 29
Managing Quiz Events 29
Create a Quiz Event 29
Update General Information for a Quiz Event 30
Define the Content of a Quiz Event 31
Select Delivery Options for a Quiz Event 32
Select Recipients for a Quiz Event 33
Configure Question and Answer Settings 34
Determine Quiz Behavior 35
Create Questions for a Quiz Event 36
Configure Display Order of Questions 38
Import Questions into a Quiz Event 39
Delete an Event 39
3
RSA Archer GRC Platform Training and Awareness
Chapter 6: Reports 41
Training and Awareness Reports 41
4
RSA Archer GRC Platform Training and Awareness
Preface
Each event within a campaign contains a start and stop date to allow organizations
to build events in advance of delivery. The stop date enables organizations to
specify an end to an event if the information it contains becomes irrelevant or no
longer requires distribution. Various formatting and delivery options are available
for complete customization of events. All events can include custom text and
content from any application. Events can be directed to a single user, multiple
users, a single group, or multiple groups.
Preface 5
RSA Archer GRC Platform Training and Awareness
The three types of Training and Awareness events— presentation, acceptance, and
quiz— can be developed together to create highly effective campaigns for
education and assessment. For example, you could deliver a presentation event to
your end-user community informing them that your organization's Internet Use
policy is being revised and describing the proposed changes. You then could present
the revised Internet Use policy in the form of an acceptance event, requiring them
to accept the policy or decline it with an explanation of their choice. Finally, you
could deliver a quiz event to the same users, requiring them to correctly answer a
series of questions about the revised policy.
When developing a Training and Awareness campaign, you can create any number
of events, selecting the event types that are appropriate for your purpose and the
information you need to communicate. For each event you create, you must provide
a subject, enter content, or select it from within the Platform and configure
presentation and delivery options. In addition, if you are creating a quiz event, you
must create questions and their corresponding answers.
For additional information on training and awareness campaigns, see the following
topics:
l Sample Training and Awareness Campaign
l Training and Awareness Terminology
l Training and Awareness Reports
6 Preface
RSA Archer GRC Platform Training and Awareness
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
Preface 7
RSA Archer GRC Platform Training and Awareness
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
8 Preface
RSA Archer GRC Platform Training and Awareness
Term Definition
Term Definition
Chapter 2: Campaigns
Chapter 2: Campaigns 11
RSA Archer GRC Platform Training and Awareness
Procedure
1. Navigate to the Manage Training and Awareness page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
2. On the Training and Awareness Campaigns toolbar, click Add New.
3. In the Campaign Name field, enter a name for the campaign.
4. In the Description field, enter a brief description of the campaign.
5. Click Save.
The campaign is displayed on the Training and Awareness Campaigns page.
The Empty status is displayed in the Status column because you have not added
any events.
Next Steps
Add events to the campaign. Depending on the type of event that you want to add,
see one of the following topics:
l Create a Presentation Event
l Create an Acceptance Event
l Create a Quiz Event
Procedure
1. Navigate to the Manage Training and Awareness page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
12 Chapter 2: Campaigns
RSA Archer GRC Platform Training and Awareness
2. Click the row and view the description of the campaign that you want to delete.
Chapter 2: Campaigns 13
RSA Archer GRC Platform Training and Awareness
Procedure
1. Navigate to the Manage Training and Awareness page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
2. Click the campaign in which you want to create a new event.
3. Click Add New in the Training and Events section header.
The Add Event dialog box opens.
4. Do one of the following:
l To use the settings of an existing presentation event as the starting point for
your new event, select Copy an existing Event and select the existing event
from the Training and Awareness Events list.
l To select new settings for the event, select Create a new Event from
scratch and select Presentation from the Event Types list.
5. Click OK.
6. If you selected to create a new event, the Add New dialog box opens, enabling
you to select whether to create an email presentation event or a prompt
presentation event. Select Email or Prompt and click OK.
The Manage Event page is displayed for the new event.
Next Steps
Update General Information for a Presentation Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
Next Steps
Define the Content of a Presentation Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
Next Steps
Select delivery options. Depending on the type of presentation event, see one of the
following topics:
l Select Delivery Options for a Prompt Presentation Event
l Select Delivery Options for an Email Presentation Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
2. Click the Delivery tab and perform the following steps:
a. In the Delivery Date field, click and select a date to deliver the event.
b. In the Subject field, enter a subject for the event to provide to end users.
c. In the From Address field, enter the email address that you want to be
displayed as the From line in the header of reminder emails.
This must be a valid, deliverable email address. Depending on the
configuration of your email system, notifications may not process if the
From address is not deliverable.
d. In the From Alias field, enter a name to identify the group or individual
associated with the From address.
For example, if the From address is [email protected], the
alias might be "Policy Team".
3. Click Apply.
If you have not completed all the required fields, a warning message is
displayed. Continue with the next topic or topics to complete the remaining
fields.
Next Steps
Select Recipients for a Presentation Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
2. Click the Delivery tab and perform the following steps:
a. Under Delivery Options, in the Title field, enter a title for the event.
b. To specify whether users can skip the event, select whether to allow
unlimited skips, a specific number of skips, or whether to force the user to
accept the event from the Skip Setting list.
c. In the Begin Presentation Prompt field, click and select a date to begin
the event.
d. To specify an end date so that the event is active for only a range of dates,
click in the End Presentation Prompt field and select a date to end the
event.
e. Under Reminders, from the Event Reminder list, select whether to not
send reminders or whether to send a reminder after a specified number of
days. If you select to send a reminder, specify the Reminder Frequency,
From Address, and From Alias in the fields provided.
3. Click Apply.
If you have not completed all the required fields, you cannot save the event.
Continue to complete the remaining fields.
Next Steps
Select Recipients for a Presentation Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
2. Click the Recipients tab.
3. From the Available list, select the users and groups who you want to receive the
event.
To search for a specific user or group, enter the name in the Find field, select
the name type from the adjacent list and click . The results of your search are
displayed in the Available list.
4. To remove a user or group from the list of recipients, click to the right of the
appropriate name in the Selected list.
5. Click Save.
Delete an Event
If you no longer need an event, you can delete it from the system.
Procedure
1. Navigate to the Manage Training and Awareness page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
2. Click the campaign from which you want to delete the event.
3. On the Manage Training and Awareness Events page, click the row and view
the description of the event that you want to delete.
Procedure
1. Navigate to the Manage Training and Awareness page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
2. Click the campaign in which you want to create a new event.
The Manage Training and Awareness Events page is displayed.
3. Click Add New in the Training and Events section header.
The Add Event dialog box opens.
4. Do one of the following:
l To use the settings of an existing acceptance event as the starting point for
your new event, select Copy an existing Event and select the existing event
from the Training and Awareness Events list.
l To select new settings for the event, select Create a new Event from
scratch and select Acceptance from the Event Types list.
5. Click OK.
The Manage Event page is displayed for the new event.
Next Steps
Update General Information for an Acceptance Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
Next Steps
Define the Content of an Acceptance Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
2. Click the Content tab.
3. In the Introduction field, enter the text that you want to be displayed at the top
of the event email or prompt.
You can format the text that you enter in this field using the Rich Text Editor
toolbar at the top of the page.
4. (Optional) To provide content from an application after the introductory text:
Next Steps
Select Delivery Options for an Acceptance Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
Next Steps
Select Recipients for an Acceptance Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
4. To remove a user or group from the list of recipients, click to the right of the
appropriate name in the Selected list.
5. Click Save.
Delete an Event
If you no longer need an event, you can delete it from the system.
Procedure
1. Navigate to the Manage Training and Awareness page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
2. Click the campaign from which you want to delete the event.
3. On the Manage Training and Awareness Events page, click the row and view
the description of the event that you want to delete.
Procedure
1. Navigate to the Manage Training and Awareness page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
2. Click the campaign in which you want to create a new event.
The Manage Training and Awareness Events page is displayed.
3. Click Add New in the Training and Events section header.
The Add Event dialog box opens.
4. Do one of the following:
l To use the settings of an existing presentation event as the starting point for
your new event, select Copy an existing Event and select the existing event
from the Training and Awareness Events list.
l To select new settings for the event, select Create a new Event from
scratch and select Quiz from the Event Types list.
5. Click OK.
The Manage Event page is displayed for the new event.
Next Steps
Update General Information for a Quiz Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
2. Complete the General Information section:
a. In the Name field, enter a name for the event.
b. To prevent the event from running, select Inactive from the Status list.
Otherwise, select Active.
c. In the Description field, enter a brief description.
3. Click Apply.
If you have not completed all required fields for the event, you cannot save the
event. Continue to complete the remaining fields.
Next Steps
Define the Content of a Quiz Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
Next Steps
Select Delivery Options for a Quiz Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
Next Steps
Select Recipients for a Quiz Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
4. To remove a user or group from the list of recipients, click to the right of the
appropriate name in the Selected list.
5. Click Save.
Next Steps
Configure Question and Answer Settings
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
Next Steps
Determine Quiz Behavior
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
2. Click the Questions tab.
3. (Optional) To require users to pass the quiz with a specific grade, in the Quiz
Behavior section, enter the percentage required to receive a passing grade in
the Passing Grade field.
Users who pass the quiz are allowed to continue on to the application. The
process for users failing to meet the required percentage is based on other
specific settings in this section.
4. (Optional) To require users to pass the quiz, select Force retakes from the
Passing Requirements list.
If a user does not pass the quiz, he or she is prompted to retake the quiz up to
the maximum number of retakes specified in the Retake Limit field. If a user
cannot pass the quiz within the specified number of retakes, he or she is
allowed to continue on to the application.
5. To limit the number of times a user can retake a quiz, specify that number in the
Retake Limit field.
6. To allow users to view incorrect answers when retaking a quiz, select Mark
incorrect quiz answers on retakes from the Show Grading list.
Incorrect answers are displayed with a red X, and correct answers are indicated
with a green checkmark.
7. To allow users to review the content you added in the Content tab while they
take the quiz, select Allow content review during the quiz from the Review
Content list.
This allows users to navigate back and forth between the quiz and the content,
enabling them to take an "open-book" style quiz.
8. Click Apply.
If you have not completed all the required fields, a warning message is
displayed. Continue with the next topic or topics to complete the remaining
fields.
Next Steps
Create Questions for a Quiz Event
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
2. Click the Questions tab.
3. In the Questions section, click Add New.
4. Do one of the following:
l To use the settings of an existing question as a starting point for your new
question, select Copy an existing Question and select the existing question
from the list.
l To select new settings for a question, select Create a new Question from
scratch.
5. Click OK.
The Manage Question dialog box opens.
6. In the Question field, enter the question text.
7. In the fields under Answer, enter the answer text.
8. To add a new answer to the question, click Add New and enter the answer in
the blank field. Repeat this step as necessary to create the number of answers
for the question.
Note: Once you have created an answer, you can edit it directly in the field.
9. Select the checkbox to the right of the answer that you want to serve as the
correct answer for the question.
10. From the list below the Answers fields, select the appropriate method for
ordering the answers. If you want the answers to be sorted in random order for
each quiz participant, select Random Answer Order from the list. To arrange
the answers in a specific order, select Manual Answer Order.
11. To allow users to select more than one answer when responding to the question,
select Users can select more than one answer for this question.
12. To provide a hint for quiz participants if they answer the question incorrectly,
enter the hint in the Hint field.
You can format the text in this field using the Rich Text Editor toolbar.
13. If you selected Manual Answer Order and you want to change the display
order of the questions, click Configure Display Order in the Questions
section, and in the Question Display Order dialog box, drag the questions into
the correct order and click OK.
14. Click OK to save your question and answers.
15. Click Apply.
If you have not completed all the required fields, a warning message is
displayed. Continue with the next topic or topics to complete the remaining
fields.
Next Steps
Configure Display Order of Questions
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
2. Click the Questions tab.
3. In the Questions section, click Configure Display Order.
4. In the Question Display Order dialog box, click and drag the questions to the
correct order.
5. Click OK.
The questions are displayed in the revised order in the Questions section.
6. Click Save.
Procedure
1. Select the event that you want to update:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
d. Click the campaign that contains the event.
e. Click the event.
2. Click the Questions tab.
3. In the Questions section, click Import.
The Import Questions page is displayed.
4. Select a quiz from the list and click OK.
The questions are displayed in the Questions section.
5. Click Apply.
If you have not completed all the required fields, a warning message is
displayed. Continue with the next topic or topics to complete the remaining
fields.
Next Steps
Configure Display Order of Questions
Delete an Event
If you no longer need an event, you can delete it from the system.
Procedure
1. Navigate to the Manage Training and Awareness page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Training and Awareness.
c. Click Manage Training and Awareness Campaigns.
This page lists all of the campaigns in the system and enables you to edit
campaigns for which you have ownership rights.
2. Click the campaign from which you want to delete the event.
3. On the Manage Training and Awareness Events page, click the row and view
the description of the event that you want to delete.
Chapter 6: Reports
Report Description
Campaign Response This report allows you to view individual user responses to
Detail Training and Awareness events. The report provides the
name of each user who participated in an event, the event
name, the response type, the response date, and any
comments the user included with his or her response. You
can filter this report by campaign, event, and response type.
Campaign Status This report lists all events within individual Training and
Details Awareness campaigns and provides the current status of
each event. You can filter this report by campaign.
Chapter 6: Reports 41
RSA Archer GRC Platform Training and Awareness
Report Description
Quiz Event Question This report provides question details for Training and
Detail Awareness quizzes. For each quiz question, you can view
the percentage of users who selected each answer. You can
filter this report by campaign, quiz, and question.
Quiz Event Results This report provides results for Training and Awareness
Detail quizzes. For each quiz, you can view results for individual
participants, including the percentage of questions each
user answered correctly and the number of times each user
retook the quiz. You can filter this report by campaign and
by quiz.
Quiz Event Results This report provides results for Training and Awareness
Summary quizzes. For each quiz, you can view the number of users
who passed or failed the quiz along with the number of
users who skipped the quiz or never responded. You can
filter this report by campaign and by quiz.
Quiz Event User This report provides user details for Training and
Detail Awareness quizzes. For each quiz question, you can view
the user’s entry, the correct answer and the status (correct or
incorrect) of the user’s entry. You can filter this report by
campaign, quiz, and user.
42 Chapter 6: Reports
RSA Archer GRC Platform 5.4
Values Lists
June 2013
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm.
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and EMC are either registered trademarks or trademarks of EMC
Corporation ("EMC") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This
software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Values Lists
Contents
Preface 5
About this Guide 5
Product Documentation 6
Support and Service 6
Chapter 1: Values Lists 9
Create Values 9
Modify List Values 11
Configure the Sort Order for a Values List 12
Nest Values in a Values List 14
Values List Attributes in XML 15
Import a Values List 16
Export a Values List 17
Delete a Value from a Values List 18
Delete Multiple Values from a Values List 19
Chapter 2: Field-Specific Values Lists 21
Managing Field-Specific Values Lists 21
Creating a Field-Specific Values List 21
Add a New Field-Specific Values List 22
Define Field-Specific Values for a Matrix Field 22
Define General Information for a Field-Specific Values List 24
Modify a Field-Specific Values List 24
Convert a Field-Specific Values List to a Global Values List 25
Chapter 3: Global Values Lists 27
Managing Global Values Lists 27
Creating a Global Values List 27
Add a New Global Values List 28
Define General Information for a Global Values List 28
Modify a Global Values List 29
3
RSA Archer GRC Platform Values Lists
Preface
From the Application Builder, you can quickly establish global and field-specific
values lists by entering the values manually or by importing them from an external
XML file.
You can perform the following tasks to manage Values List fields:
l Add a New Field-Specific Values List or Add a New Global Values List
l Configure the Sort Order for a Values List
l Create Values
l Delete a Value from a Values List
l Delete Multiple Values from a Values List
l Export a Values List
l Import a Values List
l Modify List Values
l Nest Values in a Values List
Preface 5
RSA Archer GRC Platform Values Lists
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
6 Preface
RSA Archer GRC Platform Values Lists
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 7
RSA Archer GRC Platform Values Lists
Create Values
You can create the values that are displayed to users as the available selections in
global, field-specific, and questionnaire values lists. The process for adding values
to these types of lists is identical.
Procedure
1. Navigate to the appropriate Values List page according to one of the following
values list type procedures.
2. On the Values List page for the values list that you want to update, in the
Values section, click Add New.
3. In the Text Value field, enter the value as you want it to display in the values
list.
4. (Optional) In the Description field, enter a description.
If the field is configured to display description links, users will be able to view
this description by clicking the linked value.
5. By default, Active is selected, which makes the value available for selection on
the user interface. If you do not want users to be allowed to select the value,
clear Active.
Inactive values are not available for selection, but existing usages of the value
are preserved.
6. (Optional) To set the value you are working with as a default selection when the
values list is displayed to users, select Default Selection.
7. To associate a numeric value with your text value, enter the appropriate number
in the Numeric Value field.
For example, if your text value is "High," you might assign it a numeric value of
"10." The Numeric Value field accepts positive, negative, and decimal values.
Using the Calculations feature, you can reference these numeric values in
calculated field formulas.
8. To apply color to the value's text, follow these steps:
Note: If you associate a color with a values list item, the color is displayed in
records in view mode. Values list items are not displayed in color when users
add or edit records unless the user has read-only access to the field.
9. To include an image to represent your value, in the Image field, click and
in the Graphic Selector dialog box, select from the following options:
l Select a Graphic from a Library. In the Available Graphics control group,
select the option next to the graphic that you want to assign to the values list
Note: If you associate an image with a values list item, the image is displayed
in records in view mode in place of the value name. Values list items are not
displayed as an image when users add or edit records unless the user has read-
only access to the field.
10. If you want users to enter descriptive text associated with the value, perform the
following steps:
a. Select Other.
b. From the Height list, select the desired height for the text box.
c. In the Default Text field, enter the text that you want to be displayed by
default next to the values list control.
Note: Enabling this property causes the values list control to display a required
text box on the user interface. For example, if you have a value of "N/A," you
can use the Other option to force users to enter information supporting their
selection of the "N/A" value.
Only one value for each values list may have the Other option enabled.
Changing the Other option from one value to another results in the loss of all
data entered in the “Other” field associated with the original value. For
example, suppose you have a values list where the value “N/A” is enabled with
the Other option. If you enable the value “None of the Above” with the Other
option, all data contained in the “Other” field associated with the “N/A” value
is erased.
Procedure
1. Navigate to the appropriate Values List page according to one of the following
values list type procedures.
2. On the Values List page for the values list that you want to update, in the
Values section, in the Structure pane, click the linked value name that you
want to modify.
3. Edit properties as necessary.
4. Click Save.
Note: Alphanumeric sort is not supported for values lists that contain values in
multiple languages.
Procedure
1. Navigate to the appropriate Values List page according to one of the following
values list type procedures.
2. On the Values List page for the values list that you want to update, in the
Values section, from the Sort Order list located below the Structure pane,
select one of the following options:
l Custom. The values are displayed in the specific order that you define. To
adjust the order of values, click and drag the value to the desired position in
the list.
l Ascending. The values are displayed in ascending alphanumeric order. For
example, the values "High," "Medium," and "Low" would be displayed in the
following order: High, Low, Medium.
l Descending. The values are displayed in descending alphanumeric order.
For example, the values "High," "Medium," and "Low" would be displayed in
the following order: Medium, Low, High.
l Random. The values are displayed in a different order in every record. This
variation in display order minimizes the chance that end users detect patterns
in the values' display or make assumptions about the “correctness” of a
particular response based on the values' presentation.
3. Click Save.
Procedure
1. Navigate to the appropriate Values List page according to one of the following
values list type procedures.
2. On the Values List page for the values list that you want to update, in the
Values section, click to select the value that you want to nest.
The properties of that field are displayed in the fields to the right.
3. Drag the value to the desired position in the values list. To make the value a
child of another value, drop it directly on top of the desired field.
Pop-up text indicates whether you are dropping in (to become a child), dropping
after (to become a child value), or dropping before (to promote the field one
level).
4. If a parent value functions as the title for a list of child values, and you do not
want the user to be able to select it, select the parent value and clear the This
value is available for selection checkbox.
5. Click Save.
Attribute Description
name This required attribute is the name of the value as you want it
to display in the values list. It maps to the Text Value field on
the Edit Value page.
active This required attribute defines whether the values list item is
available for selection on the user interface. It maps to the
Active field on the Edit Value page. Use the value "true" or
"false" with this attribute.
value This optional attribute is the numeric value associated with the
text value name. For example, you could associate the numeric
value "10" with the text value "High." This attribute maps to
the Numeric Value field on the Edit Value page.
selectedDefault This required attribute defines whether the values list item is
the default selection. It maps to the Default Selection field on
the Edit Value page. Use the value "true" or "false" with this
attribute.
textColor This optional attribute is the HTML color code to apply to the
value. It maps to the Text Color field on the Edit Value page.
otherTextEnabled This optional attribute associates the "Other" text field with
the values list item. It maps to the Other field on the Edit
Value page. Use the value "true" or "false" with this attribute.
Only one value per values list can be defined as "Other."
Attribute Description
otherTextHeight This optional attribute defines the height of the "Other" text
field. This attribute can be used only in conjunction with the
otherTextEnabled attribute.
otherTextDefault This optional attribute defines the default text for the "Other"
text field. This attribute can be used only in conjunction with
the otherTextEnabled attribute.
image This optional attribute is the name of the image file associated
with the values list item. When you import a values list item
that has an image attribute (the filename of the image), the Plat-
form maps the image attribute to a file name on the server. The
Platform displays the image associated with the filename on
the server. If an exact match cannot be found, no image is dis-
played. This attribute does not accommodate the import of
new or updated images.
Procedure
1. Navigate to the appropriate Values List page according to one of the following
values list type procedures.
2. On the Values List page for the values list that you want to update, in the
Values section, click Import.
3. Click Add New to browse for and select the XML file.
Your XML file must have a structure similar to the following example.
Procedure
1. Navigate to the appropriate Values List page according to one of the following
values list type procedures.
2. On the Values List page for the values list that you want to update, in the
Values section, click Export.
3. Select to Open or Save the XML file.
Procedure
1. Navigate to the appropriate Values List page according to one of the following
values list type procedures.
2. On the Values List page for the values list that you want to update, in the
Structure pane in the Values section, select the value that you want to delete.
3. In the Properties pane, click Delete for the value that you want to delete.
4. Click Save.
Procedure
1. Navigate to the appropriate Values List page according to one of the following
values list type procedures.
2. On the Values List page, click Bulk Delete in the Values toolbar.
The File Upload dialog box opens.
3. Click Add New and browse to the revised values list XML file.
4. Click Open.
5. Click OK.
The values list is updated according to the selected XML file.
6. Click Save.
l Create Values
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Next Steps
Define General Information for a Field-Specific Values List
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Note: If you selected to use global values lists to populate the Matrix field's
column and row values, the Column Values and Row Values links are not
displayed on the Fields tab of the Manage Applications page.
3. In the Field Type column, click Column Values to open the Manage Global
Values List page.
This page provides controls for naming and arranging column values.
4. To add a new value, click Add New in the Values control group.
5. To edit the properties of an existing value, in the Structure list of the Values
control group, click the name.
6. In the Text Value field, enter the value as you want it to display in the values
list. Enter a description in the Description field.
7. To make the value available for selection by the user, select Active. If you do
not want users to be allowed to select the value, clear the Active checkbox.
Inactive values are not available for selection, but existing usages of the value
are preserved.
8. Click Save in the page toolbar to save the value and return to the Manage Fields
page.
9. In the Field Type column , click Row Values to open the Manage Field -
Specific Values List page.
10. Repeat steps 4-8 above to create row values for the Matrix field.
11. Click to return to the Manage Applications page.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Next Steps
Create Values
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Procedure
1. Select the application that you want to update:
a. Click the Administration workspace.
b. From the Navigation Menu, select Application Builder > Manage
Applications.
c. Click the application.
Note: If you cannot select the application, you do not have access rights to
the application.
Important: If you grant a user or group access to the Manage Global Values Lists
page on the Manage Access Roles page, these individuals have access to all global
values lists in the Platform. If you want a user to have access to specific global
values lists and not all lists, select the appropriate CRUD access for the individual
global values list on the Manage Access Roles page.
When creating a global values list, you can perform the following tasks:
l Add a New Global Values List
l Define General Information for a Global Values List
l Create Values
Procedure
1. Navigate to the Manage Global Values Lists page:
a. Click the Administration workspace.
b. On the Navigation Menu, click Application Builder > Manage Global
Values Lists.
2. In the Manage Global Values Lists page toolbar, click Add New.
3. Do one of the following:
l To use the settings of an existing global values list as a starting point, select
Copy an existing Values List and select the existing values list from the
Available Actions list.
l To select new settings for a global values list, select Create a new Values
List from scratch.
4. Click OK.
New Steps
Define General Information for a Global Values List
Procedure
1. Navigate to the Manage Global Values Lists page:
a. Click the Administration workspace.
b. On the Navigation Menu, click Application Builder > Manage Global
Values Lists.
2. Click the global values list.
The Manage Global Values List page is displayed for you to configure the
properties for the global values list.
3. In the General Information section, do the following:
a. In the Name field, enter the name for the list.
b. In the Description field, enter a description.
4. Click Apply and in the Alias field, update the alias for the list. For more
information, see Alias Names.
Next Steps
Create Values
Important: If you grant a user or group access to the Manage Global Values Lists
page on the Manage Access Roles page, these individuals have access to all global
values lists in the Platform. If you want a user to have access to specific global
values lists and not all lists, select the appropriate CRUD access for the individual
global values list on the Manage Access Roles page.
Procedure
1. Navigate to the Manage Global Values Lists page:
a. Click the Administration workspace.
b. On the Navigation Menu, click Application Builder > Manage Global
Values Lists.
2. In the Name column, click the linked list name that you want to modify.
The Manage Global Values List page is displayed in edit mode.
3. Edit properties as necessary.
4. Click Save.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Workflows
Contents
Preface 5
About this Guide 5
Product Documentation 6
Support and Service 7
Chapter 1: Workflows 9
Activate a Workflow Process for an Application or Questionnaire 9
Configure Workflow Options 9
Configure Workflow End Stage 10
Inactivate a Workflow Process for an Application 11
Chapter 2: Workflow Stages 13
Managing Workflow Stages 13
Create a Workflow Stage 13
Configure Workflow Stage Properties 14
Specify the Assignment Criteria for a Workflow Stage 15
Specify Default Assignees 16
Configure Advanced Stage Properties 17
Reorder the Stages of a Workflow Process 18
Delete a Workflow Stage 19
Chapter 3: Workflow Notifications 21
Managing Workflow Notifications 21
Create a Workflow Notification 21
Update the General Properties of a Workflow Notification 22
Define the Layout of a Workflow Notification 23
Select the Content of a Workflow Notification 24
Define the Email Properties of a Workflow Notification 25
Delete a Workflow Notification 26
3
RSA Archer GRC Platform Workflows
Preface
When a user assigned to a record displays it within the workflow process, the
Workflow toolbar is displayed at the top of the record. This toolbar includes the
following options:
l Accept. Saves any changes made to the record and advances it to the next stage
in the workflow process.
l Reject. Saves any changes made to the record and demotes it to the previous
stage in the workflow process.
Preface 5
RSA Archer GRC Platform Workflows
Record permissions still apply for records in workflow process. All users with
proper access privileges can view a record in the workflow process. However, only
users that have been assigned a record in the workflow process can accept or reject
it.
You can perform the following tasks to manage workflow:
l Activate a Workflow Process for an Application
l Configure Workflow Options
l Create a Workflow Stage
l Create a Workflow Notification
l Configure the End Stage
l Inactivate a Workflow Process for an Application
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
6 Preface
RSA Archer GRC Platform Workflows
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
Preface 7
RSA Archer GRC Platform Workflows
8 Preface
RSA Archer GRC Platform Workflows
Chapter 1: Workflows
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
Chapter 1: Workflows 9
RSA Archer GRC Platform Workflows
Note: If you cannot select one, you do not have Edit privileges to it.
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
10 Chapter 1: Workflows
RSA Archer GRC Platform Workflows
Note: You cannot inactivate a workflow process if there are records enrolled in any
of the workflow stages.
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
Chapter 1: Workflows 11
RSA Archer GRC Platform Workflows
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
Next Steps
Configure Stage Properties
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
8. Click Apply.
If you have not completed all of the required fields, a warning message is
displayed.
Next Steps
Specify the Assignment Criteria for a Workflow Stage
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
9. In the Criteria section, each row on this page represents one set of filter
criteria. Use the fields provided to specify the field to evaluate, the operator, the
value or values and, if applicable, the relationship to the subsequent row of filter
criteria:
a. In the Field To Evaluate column, select the field to evaluate for one or
more specific values.
b. In the Operator column, select the filter operator.
c. In the Value(s) column, select the values for the condition.
d. If you have created more than one condition, you can apply advanced logic
to your search criteria.
10. In the Assignment section, select the groups, users, and fields to be assigned
the record in the workflow process:
a. Click Select to open the selection box.
b. In the Available section, double-click a group, user, or field to display it in
the Selected section
c. Click OK.
Note: To search for a specific user or group, expand the User or Group node
and double-click the value. Your selection is displayed in the Selected column.
Next Steps
Specify Default Assignees
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
Note: To search for a specific user or group, expand the User or Group node
and double-click the value. Your selection is displayed in the Selected section.
7. Click Apply.
Next Steps
Configure Advanced Stage Properties
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
7. Click OK.
Important: Even though the stage is no longer visible in the Stages section, it is
not deleted from the system until you click Apply or Save.
8. Click Apply.
If any records are enrolled in the stage, a warning message displays and you
cannot delete the stage.
You can configure a workflow notification for any stage in the workflow process.
You can use the same notification for multiple stages or create unique notifications
for each stage.
You can perform the following tasks to manage workflow notifications:
l Create a Workflow Notification
l Update the General Properties of a Workflow Notification
l Define the Layout of a Workflow Notification
l Select the Content of a Workflow Notification
l Define the Email Properties of a Workflow Notification
l Delete a Workflow Notification
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
4. If the application is leveled, select the tab for the level for which you want to
configure a workflow process.
5. In the Stages section, select the stage that you want to configure.
6. In the Stage Properties section, in the Notifications field, click Edit.
If you have made changes to the workflow process but have not saved the
changes, a warning dialog opens. Click Yes to save changes and continue. The
Manage Workflow Notifications page is displayed.
7. Click Add New.
8. Do one of the following:
l To use the settings of an existing workflow notification as a starting point for
your new workflow notification, select Copy an existing Workflow
Notification and select the existing workflow notification from the list.
l To select new settings for the workflow notification, select Create a new
Workflow Notification from scratch.
9. Click OK.
Next Steps
Update the General Properties of a Workflow Notification
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
5. In the Stages section, select the stage that you want to configure.
6. In the Stage Properties section, in the Notifications field, click Edit.
The Manage Workflow Notifications page is displayed.
7. In the Workflow Notifications section, click the notification that you want to
edit.
8. On the General tab, complete the General Information section:
a. In the Name field, enter a name for the notification.
b. In the Description field, describe the notification.
9. Review the information in the remaining fields in this section.
10. Click Apply.
Next Steps
Define the Layout of a Workflow Notification
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
10. In the Body Layout field, click to open the Body Layouts page.
11. Select a layout, and click OK.
12. Verify that the preview displayed in the Preview field meets your needs.
13. Click Apply.
Next Steps
Select the Content of a Workflow Notification
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
9. In the Subject field, enter the text that you want to display in the email subject
line.
You can also include fields (but not reports or links) in the subject line as
dynamic information. To enter a field, place your cursor in the desired location,
click the Select a Field arrow and select the appropriate field from the list.
Note: You cannot include the following fields in the subject line: Attachment,
Cross-Application Status Tracking, Image, Record Permissions, Risk
Assessment, Sub-Form, Questionnaire Reference, Access History, and History
Log.
10. In the Body fields, enter the text that you want to display in the body of the
message. You can use the options in the Rich Text Editor toolbar to modify the
appearance of the text.
l To include fields, reports, and links in the body, place your cursor in the
desired location and click the Select a Field drop-down, the Select a Report
drop-down, or the Select a Link select icon. Select the desired information to
insert it into the body.
l To change the layout of the boxes that make up the Body fields, click the
General tab and from the Body Layout field in the Template Design
section, select a layout.
11. Click Apply.
Next Steps
Define the Email Properties of a Workflow Notification
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
Note: If you cannot select one, you do not have Edit privileges to it.
Procedure
1. Navigate to the Manage Applications or Manage Questionnaires page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Application Builder.
c. Click Manage Applications or Manage Questionnaires.
2. Click the application or questionnaire that you want to update.
Note: If you cannot select one, you do not have Edit privileges to it.
4. If the application is leveled, select the tab for the level for which you want to
configure a workflow process.
5. In the Stages section, select the stage that you want to configure.
6. In the Stage Properties section, in the Notifications field, click Edit.
7. Click the row of the notification that you want to delete.
The row expands to display a description of the notification.
Copyright © 2010-2013 EMC Corporation All Rights Reserved. Published in the USA.
RSA Archer GRC Platform Workspaces and Dashboards
Contents
Preface 5
About this Guide 5
Product Documentation 6
Support and Service 6
Chapter 1: Workspaces 9
Managing Workspaces 9
Create a Workspace 10
Update the General Properties of a Workspace 10
Select the Options for a Workspace 11
Attach Documentation to a Workspace 12
Configure the Navigation Menu Options for a Workspace 13
Add Quick Reference Links to a Workspace 14
Create and Manage Folders for a Quick Reference Link 15
Select Dashboards for a Workspace 16
Configure the Display Order for Dashboards within a Workspace 17
Assign Access Rights to a Workspace 18
Configure the Display Order for Workspaces 19
Delete a Workspace 19
Chapter 2: Dashboards 21
Managing Dashboards 21
Create a Dashboard 21
Update the General Properties of a Dashboard 22
Determine the Layout Design of a Dashboard 23
Attach Documentation to a Dashboard 24
Select iViews to Display on a Dashboard 24
Define the Layout of a Dashboard 25
Create a Global iView 26
Assign Access Rights to a Dashboard 27
Delete a Dashboard 28
Chapter 3: Global iViews 31
Managing Global iViews 31
Create a Global iView 31
Update the General Properties of a Global iView 33
Create and Manage the Folder for a Global iView 34
Change the Options for a Global iView 35
Attach Documentation to a Global iView 37
Assign Access Rights to a Global iView 38
Delete a Global iView 39
3
RSA Archer GRC Platform Workspaces and Dashboards
Preface
Preface 5
RSA Archer GRC Platform Workspaces and Dashboards
Product Documentation
For information about the RSA Archer GRC Platform 5.x, see the following
documentation.
Guide Description
Web Services API Reference Provides IT managers and programmers with a list of
Guide the available web services for programmatically
interfacing with the release. This guide provides
formatting guidelines for field results, field inputs, and
search inputs, and provides sample code for searching,
adding and updating users, and updating assets.
You can access the Platform 5.x documentation from the RSA Archer Community
at https://community.emc.com/community/connect/grc_ecosystem/rsa_archer.
Customer [email protected]
Support E-mail
6 Preface
RSA Archer GRC Platform Workspaces and Dashboards
RSA SecurCare https://knowledge.rsasecurity.com/cleartrust/ct_
Online logon.asp?CTAuthMode=BASIC&language=en&CT_ORIG_
URL=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fknowledge.rsasecurity.com%3A443%2F&c
t_orig_uri=%2F
The RSA Archer Community enables collaboration among eGRC clients, partners,
and product experts. Members actively share ideas, vote for product enhancements,
and discuss trends that help guide the RSA Archer product roadmap.
The RSA Archer Exchange is an online marketplace dedicated to supporting eGRC
initiatives. The Exchange brings together on-demand applications along with
service, content, and integration providers to fuel the success of RSA Archer
clients.
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
The RSA SecurCare Online provides unlimited access to a wealth of resources on
the web, 24 hours a day. The secure system provides members access to a support
knowledgebase, to download current platform patches and bug fixes, to sign up for
notifications, to manage your support cases and more.
Preface 7
RSA Archer GRC Platform Workspaces and Dashboards
Chapter 1: Workspaces
Managing Workspaces
Workspaces are tabbed groupings of dashboards and iViews with related content.
Users can access a workspace from any page in the system by clicking the
Workspace tab at the top of the page.
Note: When there are more tabs than can fit across the top of the page, a More tab
is displayed to the right of the workspace tab strip to allow users to select from a
list of workspaces.
By grouping iViews with related content into dashboards, administrators can create
custom views for specific user audiences. For example, an administrator could
create an Incidents workspace for personnel involved in investigating and resolving
security incidents. This workspace could contain dashboards with iViews that
display investigation assignments in each user’s queue, which show the status of all
unresolved investigations and provide links to internal and external resources.
Dashboards can be configured to display multiple iViews, a single iView that
consumes the entire page, or an embedded web page.
Chapter 1: Workspaces 9
RSA Archer GRC Platform Workspaces and Dashboards
Create a Workspace
Complete this task to add new workspaces or edit existing workspaces.
For an overview of the complete configuration process, see Managing Workspaces.
Procedure
1. Navigate to the Manage Workspaces page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
2. Click Add New to open the Add Workspace window.
3. Do one of the following:
l To create a new workspace, select Create a new Workspace from
scratch.
l To copy an existing workspace, select Copy an existing Workspace and
select the workspace that you want to copy from the Workspaces list.
4. Click OK.
5. Complete the General Information section:
a. In the Name field, enter a name for the workspace.
b. In the Description field, enter a description for the workspace.
This description is displayed on the Manage Workspaces page in list mode.
6. Click Apply.
Next Steps
Update the General Properties of a Workspace
10 Chapter 1: Workspaces
RSA Archer GRC Platform Workspaces and Dashboards
Procedure
1. Select the workspace that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
d. In the Name column, click the workspace.
2. Complete the General Information section:
a. In the Name field, enter a name for the workspace.
b. To activate the workspace, select Active from the Status list. To inactivate
the workspace, select Inactive from the Status list.
Next Steps
Select the Options for a Workspace
Procedure
1. Select the workspace that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
d. In the Name column, click the workspace.
Chapter 1: Workspaces 11
RSA Archer GRC Platform Workspaces and Dashboards
2. To determine the behavior of the workspace, select one of the following options
from the Behavior list in the Options section:
l Required. The workspace is always displayed in the workspace tab strip for
users with access to it, and those users cannot remove it.
l Default. The workspace is displayed in the workspace tab strip by default
for all users with access to it, and those users can remove it.
l Optional. The workplace is available for users who have access to it, but it
is not displayed by default.
3. To allow users to create personal dashboards in the workspace, select Enable
from the Personal Dashboards setting.
4. Click Apply.
Next Steps
Attach Documentation to a Workspace
Procedure
1. Select the workspace that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
d. In the Name column, click the workspace.
2. To attach documentation to the workspace:
a. In the Documentation section, click Add New.
The File Upload dialog box opens.
b. Click Add New and select the file that you want to upload.
c. Click OK.
3. To download attached documentation to the workspace:
a. In the Name column, click the filename.
b. In the File Download dialog box, click Save.
12 Chapter 1: Workspaces
RSA Archer GRC Platform Workspaces and Dashboards
c. Select the location where you want to save the document and click Save.
4. Click Apply.
Next Steps
Configure the Navigation Menu Options for a Workspace
Procedure
1. Select the workspace that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
d. In the Name column, click the workspace.
2. Click the Navigation Menu tab.
3. In the Navigation Menu Display section, select from the following options:
l Collapsed. Select to have the Navigation Menu for the workspace default to
a collapsed state.
l Expanded. Select to have the Navigation Menu for the workspace default to
an expanded state.
l Hidden. Select to remove the Navigation Menu from display when users
view the workspace. When this option is selected, users cannot access the
Navigation Menu when they view the workspace.
4. If you selected the Collapsed or Expanded option, define how you want
solutions and applications to be displayed in the Navigation Menu according to
the following options:
l Display All. Select to have the Navigation Menu display all solutions and
applications that are available to users when they view the workspace.
l Selected. Select to filter the solutions that are displayed in the Navigation
Menu when users view the workspace. From the Available list that is
displayed, select the solutions that you want to be displayed in the Navigation
Menu.
Chapter 1: Workspaces 13
RSA Archer GRC Platform Workspaces and Dashboards
5. To further customize the Navigation Menu for the workspace, select Expanded
from the Selected list for individual solutions and their corresponding
applications.
When a solution is expanded, all applications in that solution are displayed by
default. If an application is expanded, all operation links that are available for
that application are displayed by default.
Note: You can collapse a solution and expand an application in that solution. In
this case, when users expand the solution, the application expands by default.
Next Steps
Add Quick Reference Links to a Workspace
Procedure
1. Select the workspace that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
d. In the Name column, click the workspace.
2. Click the Quick Reference tab.
3. Click Add New Link in the Quick References Links list.
The link settings are displayed in the Properties list.
14 Chapter 1: Workspaces
RSA Archer GRC Platform Workspaces and Dashboards
Next Steps
Create and Manage the Folders for a Quick Reference Link
Chapter 1: Workspaces 15
RSA Archer GRC Platform Workspaces and Dashboards
Procedure
1. Select the workspace that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
d. In the Name column, click the workspace.
2. Click the Quick Reference tab.
3. To add a folder, click Add New Folder in the Quick Reference Links list.
The Display Name field is displayed in the Properties list.
4. In the Display Name field, enter a name for the folder.
The new folder is added to the Quick References Links list.
5. To organize the folder, drag and drop the folder name in the Quick Reference
Links section.
You can organize multiple folders by sequence and by hierarchy. To place one
folder inside of another folder, drag and drop the folder name over the parent
folder where you want it to be displayed.
6. To organize the links, drag and drop the link names in the Quick Reference
Links section.
You can organize the links by sequence and by folder. To place a link inside of
a folder, drag and drop the link name over the parent folder where you want it to
be displayed.
7. Click Apply.
Next Steps
Select Dashboards for a Workspace
16 Chapter 1: Workspaces
RSA Archer GRC Platform Workspaces and Dashboards
Procedure
1. Select the workspace that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
d. In the Name column, click the workspace.
2. Click the Dashboards tab.
3. Click Select Dashboards to open the Add Dashboards dialog box.
4. Select the dashboards from the Name column and click OK.
5. Click Apply.
Next Steps
Configure the Display Order for Dashboards within a Workspace
Procedure
1. Select the workspace that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
d. In the Name column, click the workspace.
2. Click the Dashboards tab.
3. Click Configure Display Order.
4. In the Dashboard Display Order dialog box, drag and drop the dashboards in
the sequence that you want them presented for the user and click OK.
5. (Optional) To remove a dashboard from the workspace, click in the Actions
column.
6. Click Apply.
Chapter 1: Workspaces 17
RSA Archer GRC Platform Workspaces and Dashboards
Next Steps
Assign Access Rights to a Workspace
Procedure
1. Select the workspace that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
d. In the Name column, click the workspace.
2. Click the Access tab.
3. Select whether the workspace is public or private:
l Public. Allow all users in the system access to this workspace.
l Private. Allow only specific users and groups access to this workspace.
4. If you selected Private, select one of the following options from the Available
list to assign or revoke access rights for the workspace:
l Group. In the Available list, expand the Group node and select the groups
whose members you want to have access to the workspace.
l User. In the Available list, expand the User node and select the users who
you want to have access to the workspace.
l Role. In the Available list, expand the Role node and select the roles whose
assigned users you want to grant workspace access rights.
l Solution. In the Available list, expand the Solution node and select the
solutions whose users you want to assign workspace access rights.
5. To revoke access rights from a group, solution, role, or user, click in the
Selected list.
6. Click Save.
Next Steps
Configure the Display Order for Workspaces
18 Chapter 1: Workspaces
RSA Archer GRC Platform Workspaces and Dashboards
Note: Not all users have access to all workspaces, but the order of the workspaces
still pertains to each user.
Procedure
1. Navigate to the Manage Workspaces page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
2. In the Workspaces toolbar, click Configure Display Order.
The Workspace Display Order dialog box opens.
3. Drag and drop the workspaces in the sequence that you want them displayed for
the user.
4. Click OK to return to the Manage Workspaces page.
Delete a Workspace
Complete this task to delete a workspace from the system. This permanently purges
the workspace from the database as well as any personal dashboards associated
with it. Global dashboards associated with it are not deleted.
Procedure
1. Navigate to the Manage Workspaces page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Workspaces.
Chapter 1: Workspaces 19
RSA Archer GRC Platform Workspaces and Dashboards
Chapter 2: Dashboards
Managing Dashboards
Dashboards are groupings of iViews with related content. Users can access a
dashboard from within a workspace by selecting from the Dashboard list in the page
toolbar. This feature allows administrators to group multiple iViews into a single
dashboard so the user can easily access multiple iViews from one workspace.
Administrators can build global dashboards and enable users to build personal
dashboards:
l Global dashboards. Can be viewed by all users that have been assigned global
access by administrators on the Access tab of the Manage Dashboards page.
These dashboards cannot be edited by users, but can be rearranged. Any
modifications to the layout or size of the iViews are saved for that user's current
session only.
l Personal dashboards. Can be created and viewed by all users that have been
assigned access by group, user, role, or solution on the Access tab of the
Manage Dashboards page. Personal dashboards are specific to the user and are
not confined to the user's current session only. Users can modify the layout and
size of the iViews, and the changes are saved in real time.
Create a Dashboard
Complete this task to add new dashboards or edit existing dashboards. You can
also determine the layout and assign user access for the dashboards.
For an overview of the complete configuration process, see Managing Dashboards.
Chapter 2: Dashboards 21
RSA Archer GRC Platform Workspaces and Dashboards
Procedure
1. Navigate to the Manage Dashboards page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
A menu of Workspaces and Dashboards pages is displayed.
c. Click Manage Dashboards.
2. Click Add New.
3. Do one of the following:
l To create a new dashboard, select Create a new Dashboard from scratch.
l To copy an existing dashboard, select Copy an existing Dashboard and from
the Dashboards list, select a dashboard to copy.
4. Click OK.
5. Complete the General Information section:
a. In the Name field, enter a name for the dashboard.
b. In the Description field, enter a description for the dashboard.
This description is displayed on the Manage Dashboards page in list mode.
6. Click Apply.
Next Steps
Update the General Properties of a Dashboard
Assign Access Rights to a Dashboard
Procedure
1. Select the dashboard that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
A menu of Workspaces and Dashboards pages is displayed.
c. Click Manage Dashboards.
d. Click the dashboard.
22 Chapter 2: Dashboards
RSA Archer GRC Platform Workspaces and Dashboards
Next Steps
Determine the Layout Design of a Dashboard
Procedure
1. Select the dashboard that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
A menu of Workspaces and Dashboards pages is displayed.
c. Click Manage Dashboards.
d. Click the dashboard.
2. From the Column Layout list in the Layout Design section, select options to
determine the layout design.
These options determine the number of columns displayed on the dashboard and
the percentage of the page each column occupies. You can preview the layout
of your selection in the Preview control.
3. Click Apply.
Next Steps
Attach Documentation to a Dashboard
Chapter 2: Dashboards 23
RSA Archer GRC Platform Workspaces and Dashboards
Procedure
1. Select the dashboard that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
A menu of Workspaces and Dashboards pages is displayed.
c. Click Manage Dashboards.
d. Click the dashboard.
2. In the Documentation section, click Add New.
The File Upload dialog box opens.
3. Click Add New, select the file that you want to upload and click OK.
4. To download attached documentation to the dashboard:
a. Click the filename in the Name column.
b. Click Save in the File Download dialog box.
c. Select the location where you want to save the document and click Save.
5. Click Apply.
Next Steps
Select iViews to Display on a Dashboard
24 Chapter 2: Dashboards
RSA Archer GRC Platform Workspaces and Dashboards
Procedure
1. Select the dashboard that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
A menu of Workspaces and Dashboards pages is displayed.
c. Click Manage Dashboards.
d. Click the dashboard.
2. Click the Layout tab.
3. Click Select iViews in the Dashboard Layout toolbar and in the Method
section of the iView Type Selection dialog box, select one of the following
options:
l Create a new Global iView from scratch. To create a new global iView
from existing iView types, select this option. For more information on
creating a Global iView, see Create a Global iView.
l Select from Global iView Library. To select from existing global iViews
organized by folders of related content, select this option and click OK.
4. Click Apply.
Next Steps
Define the Layout of a Dashboard
Procedure
1. Select the dashboard that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
A menu of Workspaces and Dashboards pages is displayed.
Chapter 2: Dashboards 25
RSA Archer GRC Platform Workspaces and Dashboards
Procedure
1. Select the dashboard that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
A menu of Workspaces and Dashboards pages is displayed.
c. Click Manage Dashboards.
d. Click the dashboard.
2. Click the Layout tab.
3. Click Select iViews.
4. Do one of the following:
l To create a new iView, select Create a new Global iView from scratch.
l To copy an existing iView, select Copy an existing Global iView.
5. If you selected Create a new Global iView from scratch, select one of the
following iView types.
26 Chapter 2: Dashboards
RSA Archer GRC Platform Workspaces and Dashboards
Embedded URL Enables you to embed entire web pages directly in an iView.
Links List Enables you to create links to websites, intranet sites, and
frequently used internal application pages, such as Add New
Record, Advanced Search, and Discussion Forums within a
single iView.
RSS Feed Enables you to display data from an RSS feed. RSS feeds
contain headlines and summary information from articles on
websites supporting RSS.
6. If you selected Copy an existing Global iView, select an iView from the
Available iViews list to copy.
7. Click OK.
The iView Configuration page is displayed, ready for you to add or edit iView
information.
Next Steps
Update the General Properties of a Global iView
Chapter 2: Dashboards 27
RSA Archer GRC Platform Workspaces and Dashboards
Procedure
1. Select the dashboard that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
A menu of Workspaces and Dashboards pages is displayed.
c. Click Manage Dashboards.
d. Click the dashboard.
2. Click the Access tab.
3. Select whether the dashboard is public or private:
l Public. Allow all users in the system access to this dashboard.
l Private. Allow only specific users and groups access to this dashboard.
4. If you selected Private, select whether to assign or revoke access rights for the
dashboard from the Available list according to the following options:
l Group. In the Available list, expand the Group node and select the groups
whose members should have access to the dashboard.
l User. In the Available list, expand the User node, and select the users who
should have access to the dashboard.
l Role. In the Available list, expand the Role node and select the roles with
assigned users you want to assign dashboard access rights.
l Solution. In the Available list, expand the Solution node and select the
solutions with users you want to assign dashboard access rights.
5. To revoke access rights from a group, solution, role, or user, click in the
Selected list.
6. Click Save.
Delete a Dashboard
Complete this task to delete a dashboard from the system. This permanently purges
the dashboard from the database as well as any personal iViews associated with it.
Global iViews associated with it are not deleted.
28 Chapter 2: Dashboards
RSA Archer GRC Platform Workspaces and Dashboards
Procedure
1. Navigate to the Manage Dashboards page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
A menu of Workspaces and Dashboards pages is displayed.
c. Click Manage Dashboards.
Chapter 2: Dashboards 29
RSA Archer GRC Platform Workspaces and Dashboards
Procedure
1. Navigate to the Manage Global iViews page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Global iViews.
2. Click Add New.
3. Do one of the following:
l To create a new iView, select Create a new Global iView from scratch.
l To copy an existing iView, select Copy an existing Global iView.
4. If you selected Create a new Global iView from scratch, select one of the
following iView types.
Embedded URL Enables you to embed entire web pages directly in an iView.
Links List Enables you to create links to websites, intranet sites, and
frequently used internal application pages, such as Add New
Record, Advanced Search, and Discussion Forums within a
single iView.
RSS Feed Enables you to display data from an RSS feed. RSS feeds
contain headlines and summary information from articles on
websites supporting RSS.
5. If you selected Copy an existing Global iView, select an iView from the
Available iViews list to copy.
6. Click OK.
The Manage Global iView page is displayed, ready for you to add or edit
workspace information.
Next Steps
Update the General Properties of a Global iView
Procedure
1. Select the iView that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Global iViews.
d. In the Name column, click the iView.
2. Complete the General Information section:
a. In the Name field , enter a name for the iView.
b. To activate the iView, select Active from the Status list. To inactivate the
iView, select Inactive from the Status list.
Next Steps
Create and Manage the Folder for a Global iView
Procedure
1. Select the iView that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Global iViews.
d. In the Name column, click the iView.
2. Create a folder for the iView:
a. In the Folder control of the General Information section, click Edit.
b. In the Manage Folders window, click Add New.
c. Enter the name of the folder and click OK.
d. In the Folder list, ensure the correct folder is selected.
3. To display the iView in a different folder, select the desired folder from the
Folder list in the General Information section.
4. Click Apply.
Your changes are displayed in the Manage iViews page.
Next Steps
Change the Options for a Global iView
Procedure
1. Select the iView that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Global iViews.
d. In the Name column, click the iView.
2. On the General tab, update the options for the iView in the Options section
based on the following iView types.
Canvas
1. In the Canvas Style field, click to select a layout
in the Selected Layout Template dialog box.
2. Browse through the layouts, select the layout and
click OK.
3. Enter a name in the Title field and enter the content in
the Content field.
Custom Enter the content in the Custom Content field and select
an option from the Refresh Rate list.
Embedded URL 1. Select an address from the URL list and enter the
address in the URL field.
2. Select an option from the Refresh Rate list.
RSS Feed 1. Select an address from the URL list and enter the URL
address in the URL field.
2. From the Feed Elements control, select the display
options that you want. From the Articles Displayed
list, select the number of articles that you want
displayed.
3. From the Refresh Rate list, select how often you want
the feed refreshed.
4. From the Authentication list, select your
authentication preferences. From the Days Displayed
list, select the number of days to display the feed.
3. Click Apply.
Next Steps
Attach Documentation to a Global iView
Procedure
1. Select the iView that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Global iViews.
d. In the Name column, click the iView.
2. To attach documentation to the iView:
a. In the Documentation section, click Add New.
The File Upload dialog box is displayed.
b. Click Add New and select the file that you want to upload.
c. Click OK.
3. To download attached documentation to the global iView:
a. In the Name column in the Documentation section, click the filename that
you want to download.
b. In the File Download dialog box, click Save.
c. Select the location where you want to save the document and click Save.
4. Click Apply.
Next Steps
Assign Access Rights to a Global iView
Procedure
1. Select the iView that you want to modify:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Global iViews.
d. In the Name column, click the iView.
Next Steps
Select iViews to Display on a Dashboard
Procedure
1. Navigate to the Manage Global iViews page:
a. Click the Administration workspace.
b. In the Navigation Menu, click Workspaces and Dashboards.
c. Click Manage Global iViews.