About system configuration
After installation, the system is configured as follows:
The System Administrator defines the location and contents of the data sources.
The System Administrator sets up business users who will define the components and trigger systems.
Business users assemble components and trigger systems that are used to analyze the data from the data sources and decide outcomes based on the analysis. (This chapter provides overview information; for details about components and trigger systems, refer to the
Detect
User Guide
.)
The system administrator and business users perform these tasks using a set of tools accessible from a web-based application. The information entered during configuration is saved in the
Detect
database in the rule schema. The G_RUN table shows the names of the database tables that save information about each object.
Copyright IBM Corporation 2012. All Rights Reserved.