The following table describes the CIM elements used to implement the Access Monitor feature.
Element Name |
Description |
Instance Creation** |
Cardinality |
Classes | |||
Represents an Audit Log. |
Static |
1 | |
Represents event policies. |
Static |
1 | |
Associations | |||
Associates between the Intel AMT CIM_ComputerSystem and the AMT_AuditLog. |
Implicit |
3 | |
Associates between the Intel AMT CIM_ComputerSystem and the AMT_AuditPolicyRule. |
Static |
1 | |
Associates between the AMT_AuditLog and the AMT_AuditPolicyRule. |
Static |
1 | |
** Instance Creation: • Implicit: Instances created implicitly by Intel AMT in response to a user CIM operation • Static: Instances created by Intel AMT on initialization • User: The class supports create/delete |
The following diagram illustrates the CIM elements used in the Access Monitor feature.
Copyright © 2006-2022, Intel Corporation. All rights reserved. |