16.In this example, we use TSCM in the Name field and IBM Security Compliance in the Description field, as shown in Figure 7-38.

Figure 7-38 IBM TSCM policy creation

256Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 274
Image 274
IBM Tivoli and Cisco manual IBM Tscm policy creation