Table 14 Changing User Preferences for Event Manager (continued)

If you want...

Do the following...

 

 

Change the

Select a severity level you want displayed in Event Manager from the

severities to be

Severities to be Included drop-down menu. See the topic, Selecting

included

a Severity Level” on page 421.

 

If you want to customize the filter for the severity levels, click the

 

Custom button. See the topic, Customizing the Severity Level Filter

 

on page 422 for more information.

 

 

Change the

Select the element types you want to be included from the Element

element types to be

types to be included drop-down menu. Events from these elements

included

are displayed in Event Manager. See the topic, Selecting an Element

 

Type for Events” on page 423.

 

If you want to customize the filter for the element types, click the

 

Custom button. See Customizing the Element Type Filter for Events

 

on page 423.

 

 

Warnings for Slow Systems Operations

By default, the management server warns you when it encounters issues with handling large amounts of data from storage systems, such as long load times.

If you do not want to be warned, clear the Warn about slow storage system operations option on the User Preferences tab. See Modifying Your User Preferences” on page 134 for information on how to access the User Preferences tab.

Viewing the Properties of a Role

You can quickly determine which components a user can access by viewing the properties of the user's role.

To view the properties of a role:

1.Access Storage Essentials through one of the menu options, such as Options > Storage Essentials > Email Settings.

2.In the upper-right corner, select Security > Users.

1.Click Security > Users.

2.In the Role column, click the name of the role.

This page displays the following information:

Role Name - The name of the role. This name appears in the users table (Security > Users)

Role Description - A description of the role.

Access Level - Determines how much access the user has to a type of element, such as hosts, storage systems, switches, and applications. See About the Security for the Management Server” on page 125 for more information.

136 Managing Security