The following table outlines the steps that you must complete to deploy and configure this module for the first time.
These tasks may be completed by multiple people in your organization. We recommend, however, that the tasks be completed in the order in which they are listed.
Note:
Step | Task | Notes |
---|---|---|
1 | Assign Security Users to one or more of the ACA Security Groups and Roles. | This step is required. |
2 | Review the ACA data model to determine which relationship definitions you will need to modify to include your custom equipment and location families. Via Configuration Manager, modify the relationship definitions as needed. | This step is required only if you store equipment and location information in families other than the baseline Equipment and Functional Location families. |
|
This step is required only if you do not want risk values to be specified manually via the Risk Matrix. |
Copyright © 2018 General Electric Company. All rights reserved.