About system configuration
After installation, the system is configured as follows:
*
*
*
The system administrator and business users perform these tasks using a set of tools accessible from a web-based application. The information entered during configuration is saved in the Detect database in the rule schema. The G_RUN table shows the names of the database tables that save information about each object.